APC811S - APPLIED CRYPTOGRAPHY - 1ST OPP - JUNE 2024


APC811S - APPLIED CRYPTOGRAPHY - 1ST OPP - JUNE 2024



1 Page 1

▲back to top


n Am I BI A u n IVER s ITY
OF SCIEnCE Ano TECHn OLOGY
FACULTYOF COMPUTING AND INFORMATICS
DEPARTMENTOF CYBERSECURITY
QUALIFICATION:BACHELOROF COMPUTERSCIENCE(HONS INFORMATION SECURITY)
QUALIFICATIONCODE: 08 BHIF
LEVEL:8
COURSE:APPLIEDCRYPTOGRAPHY
COURSECODE: APC811S
DATE: JUNE2024
SESSION: THEORY
DURATION: 2 HOURS30 MINUTES
MARKS: 80
EXAMINER(S}
MODERATOR:
FIRSTOPPORTUNITYEXAMINATION QUESTIONPAPER
PROFATTLEEM. GAMUNDANI
MR STANFORDMUSARURWA
THIS QUESTIONPAPERCONSISTSOF 2 PAGES
(Excluding this front page)
INSTRUCTIONS
1. Answer ALL the questions.
2. Write clearly and neatly.
3. In answering questions, be guided by the allocated marks.
4. Number your answers following the numbering used in t_hisquestion
paper.
1. None
PERMISSIBLEMATERIALS

2 Page 2

▲back to top


Question 1: Overviewof Cryptography
Critically evaluate the legal implications of encryption technologies in the context of
personal privacy vs national security. Provide examples from current legislation or
notable cases to support your argu·ments.
[10 marks]
Question2: Mathematical Foundationsof Cryptography
Demonstrate how prime numbers are used in the RSAencryption algorithm. Include
key generation, encryption, and decryption in your answer.
[10 marks]
Question 3: SymmetricKeyCryptography
(a) Discussthe Advanced Encryption Standard (AES)and its application in secure
file transfer protocols.
[8 marks]
(b) How does AESensure data integrity and confidentiality?
[2 marks]
Question4: AsymmetricKeyCryptography
(a) Describe how the Diffie-Hellman key exchange algorithm enables secure
communication over an insecure channel.
[6 marks]
(b) Discussthe significance of the Diffie-Hellman key exchange algorithm in
developing secure internet protocols.
[4 marks]
Question 5: HashFunctionsand Digital Signatures
(a) Compare and contrast the security features of SHA-256 and MOS hash
functions.
[6 marks]
(b) Discussthe implications of hash collisions in digital signatures.
[4 marks]
Page 2

3 Page 3

▲back to top


Question6: CryptographicProtocols
(a) Evaluate the security features of the IPSecprotocol in VPNs.
(b) How does the IPSecprotocol provide confidentiality, integrity, and
authentication?
(2 marks]
[8 marks]
Question7: AdvancedTopics
(a) Discussthe concept of homomorphic encryption and its potential applications
in cloud computing.
(6 marks]
(b) What challenges must be addressed to make homomorphic encryption
. practical for widespread use?
(4 marks]
Question8: Applicationsof Cryptography
(a) Analyse the use of cryptography in securing mobile banking applications.
[3 marks]
(b) Discussthe combination of cryptographic techniques that ensure transaction
security.
[7 marks]
*****ENDOFEXAMINATIOPNAPER*****
Page 3