Question 1: Overviewof Cryptography
Critically evaluate the legal implications of encryption technologies in the context of
personal privacy vs national security. Provide examples from current legislation or
notable cases to support your argu·ments.
[10 marks]
Question2: Mathematical Foundationsof Cryptography
Demonstrate how prime numbers are used in the RSAencryption algorithm. Include
key generation, encryption, and decryption in your answer.
[10 marks]
Question 3: SymmetricKeyCryptography
(a) Discussthe Advanced Encryption Standard (AES)and its application in secure
file transfer protocols.
[8 marks]
(b) How does AESensure data integrity and confidentiality?
[2 marks]
Question4: AsymmetricKeyCryptography
(a) Describe how the Diffie-Hellman key exchange algorithm enables secure
communication over an insecure channel.
[6 marks]
(b) Discussthe significance of the Diffie-Hellman key exchange algorithm in
developing secure internet protocols.
[4 marks]
Question 5: HashFunctionsand Digital Signatures
(a) Compare and contrast the security features of SHA-256 and MOS hash
functions.
[6 marks]
(b) Discussthe implications of hash collisions in digital signatures.
[4 marks]
Page 2