HamiIT
Sign inGet started
Home
Theme
ADD CONTENT

Sign in Required

Please sign in to add content

Sign In
ProgramsBsc CSITSemester 5CryptographyUnit 3. Asymmetric Ciphers
Chapter Study

Bsc CSIT Semester 5 – Cryptography – Unit 3. Asymmetric Ciphers

Comprehensive questions and detailed answers for Unit 3. Asymmetric Ciphers. Perfect for exam preparation and concept clarity.

12
Questions
85
Marks
Back to All Chapters
1

Given p = 61, q = 53. Calculate the public key, private key, and encrypt the message “42”. Then, decrypt the ciphertext to retrieve the original message.

MediumTHEORY10 marks2076(TU Final)
2

Find the value of 7^2019 MOD 13 using Fermat’s Little theorem. Define Euler totient function with an example.

MediumTHEORY5 marks2078(TU Final)
3

Show that Z 5is a field. John publishes the ElGamal public key (q, α, YA) =(101, 2, 14). Jane desired to send the secret message CSIT to John. Using the equivalence A = 0, B=1, … , Z=25, encrypt the message using John’s public key. Use a random number k = 4.

MediumTHEORY10 marks2079(TU Final)
4

Define discrete logarithms. How key generation, encryption and decryption is done in RSA. In a RSA cryptosystem, given p=13 and q=7, determine private key, public key and perform encryption and decryption for the text M=”hi” using 0 to 25 for letters from a to z.

MediumTHEORY10 marks2080(TU Final)
5

How Miller Rabin test is used for primality testing? Show whether the number 561 passes the test.

MediumTHEORY5 marks2080(TU Final)
6

How does meet in middle attack work in Diffie Helman key exchange protocol? Explain.

MediumTHEORY5 marks2080(TU Final)
7

Why do we need discrete logarithm? Illustrate with an example. Consider a Diffie-Hellman scheme with a common prime p = 13 between user A and user B. Suppose public key of A is 10 and public key of B is 8. Now determine their private keys and shared secret key. Select any valid primitive root of 13.

MediumTHEORY10 marks2081(TU Final)
8

Find the multiplicative inverse of polynomial {95} using extended euclidean Algorithm.

MediumTHEORY5 marks2081(TU Final)
9

Illustrate the man in middle attack in Diffie - Hellman key exchange protocol. Assume the prime number be 19 and 10 as its primitive root. Select 5 as private key and 4 as random integer. Find the cipher text of M = 2 using Elgamal crypto system.

MediumTHEORY10 marks2082(TU Final)
10

State Fermat’s theorem with example. What is the implication of discrete logarithm?

MediumTHEORY5 marks2082(TU Final)
11

What is the condition for two integers, x and y, to be relatively prime? Find whether 61 is prime or not using Miller-Rabin algorithm.

MediumTHEORY5 marks2079(TU Final)
12

Why do we need discrete logarithm over normal logarithm? Find out whether 3 is primitive root of 7 or not.

MediumTHEORY5 marks2079(TU Final)
Showing 12 questions

Sample Questions

Given p = 61, q = 53. Calculate the public key, private key, and encrypt the message “42”. Then, decrypt the ciphertext to retrieve the original message.

Marks: 10Chapter: Unit 3. Asymmetric Ciphers

Find the value of 7^2019 MOD 13 using Fermat’s Little theorem. Define Euler totient function with an example.

Marks: 5Chapter: Unit 3. Asymmetric Ciphers

Show that Z 5is a field. John publishes the ElGamal public key (q, α, YA) =(101, 2, 14). Jane desired to send the secret message CSIT to John. Using the equivalence A = 0, B=1, … , Z=25, encrypt the m

Marks: 10Chapter: Unit 3. Asymmetric Ciphers

Define discrete logarithms. How key generation, encryption and decryption is done in RSA. In a RSA cryptosystem, given p=13 and q=7, determine private key, public key and perform encryption and decryp

Marks: 10Chapter: Unit 3. Asymmetric Ciphers

How Miller Rabin test is used for primality testing? Show whether the number 561 passes the test.

Marks: 5Chapter: Unit 3. Asymmetric Ciphers

And more questions available on this page.

About Unit 3. Asymmetric Ciphers Questions

This page contains comprehensive questions from the Unit 3. Asymmetric Ciphers chapter of Cryptography, part of the Bsc CSIT Semester 5 curriculum. All questions include detailed model answers from past TU exam papers.

Study Tips

  • Review concepts before attempting questions
  • Practice writing complete answers
  • Compare your answers with model solutions
  • Focus on questions from recent years
  • Use direct links (#question-ID) to bookmark and share specific questions

Related Resources

← Back to Cryptography Chapters

Unit 3. Asymmetric Ciphers chapter questions with answers for Cryptography (Bsc CSIT Semester 5). Prepare for TU exams with our comprehensive question bank and model answers.

H
Hami IT

Empowering IT students with quality education resources and comprehensive exam preparation materials.

Programs

  • Flutter
  • Java
  • DevOps

Company

  • About Us
  • Contact
  • Terms of Service
  • Privacy Policy

Contact

  • 📧contact@hamiit.com
  • 📞+977 9813706443
  • 📍Kathmandu, Nepal

Community

  • Join Discord
  • Report a bug
  • Request feature

© 2026 Hami IT. All rights reserved.