Question 1: Overview of Cryptography
(a) Discussthe role of cryptography in enforcing data protection laws such as the
General Data Protection Regulation (GDPR)or the Data Protection Bill in
Namibia.
[2 marks]
(b) How does cryptography aid in compliance with these regulations, and what are
the potential challenges or limitations?
[8 marks}
Question2: Mathematical Foundationsof Cryptography
(a) Describe the role of elliptic curve cryptography (ECC)in securing mobile
devices.
(2 marks]
(b) Compare its efficiency and security level to RSA'sin this specific application.
[8 marks]
Question3: SymmetricKeyCryptography
Evaluate the security and performance implications of using block cipher modes of
operation, such as CBCand GCM, in network security protocols.
[10 marks]
Question4: AsymmetricKeyCryptography
Explain the concept of public key infrastructure (PKI) and how it supports digital
signatures and certificates in e-commerce transactions.
(10 marks]
Question5: HashFunctionsand DigitalSignatures
(a) Explain the process of generating and verifying a digital signature using the
ECDSAalgorithm.
[7 marks]
(b) Discussits application in cryptocurrency transactions.
[3 marks]
Page 2