List of Program

advertisement
Network Security
List of Programs :
PROGRAM - : 1
Implement a menu driven program for Encryption and Decryption of a file using Caesar
cipher.
PROGRAM - : 2
Perform Encryption and Decryption of a file using Atbash substitution cipher.
PROGRAM - : 3
Implement a mixed mono alphabetic substitution cipher where each plaintext letter maps
to a different random cipher text letter and the key is 26 letters long.
PROGRAM - : 4
Perform the Encryption and Decryption of a text data using general mono alphabetic
substitution, i.e. given a keyword:
a. write key (with repeated letters deleted)
b. then write all remaining letters in columns underneath
c. then read off by columns to get cipher text equivalents
PROGRAM - : 5
Implement the poly alphabetic substitution using Vignere cipher.
PROGRAM - : 6
Perform the encryption and decryption of some text data using rail fence cipher pattern.
PROGRAM - : 7
Perform the encryption and decryption of some text data using route cipher pattern,
where you have to write the message vertically in columns, but instead of reading off the
secret message horizontally, you read it off using a predetermined pattern. For example,
a spiral pattern.
PROGRAM - : 8
Implement a menu driven program for data Encryption and Decryption using single
columnar transposition.
PROGRAM - : 9
Implement a menu driven program for data Encryption and Decryption using double
columnar transposition.
PROGRAM - : 10
Encipher and Decipher a text using auto key cipher poly alphabetic substitution, where
plain text itself is appended at the end of the keyword.
PROGRAM - : 11
Design your own cipher where different types of ciphers may be concatenated together to
form a product cipher.
PROGRAM - : 12
Design a menu driven program for data Encryption and Decryption using Playfair cipher
(Digraph Substitution).
PROGRAM - : 13
Perform the encryption and decryption of some text data using Vernam Cipher/ XOR
Encryption.
PROGRAM - : 14
Implement the poly graphic substitution using Hill cipher technique.
PROGRAM - : 15
Improve the mono alphabetic substitution using Gauss cipher technique.
PROGRAM - : 16
Implement the RSA algorithm for Encryption/ Decryption of a text file.
PROGRAM - : 17
Design a menu driven program for data Encryption and Decryption using S-DES.
PROGRAM - : 18
Design a menu driven program for data Encryption and Decryption using 3-DES.
PROGRAM - : 19
Design a menu driven program for data Encryption and Decryption using AES.
PROGRAM - : 18
Design a menu driven program for data Encryption and Decryption using Electronic
Code Book (ECB) mode for S-DES/ 3-DES/ AES/ Any other technique.
PROGRAM - : 19
Design a menu driven program for data Encryption and Decryption using Counter (CTR)
mode for S-DES/ 3-DES/ AES/ Any other technique.
PROGRAM - : 20
Design a menu driven program for data Encryption and Decryption using Cipher Block
Chaining (CBC) mode for S-DES/ 3-DES/ AES/ Any other technique.
PROGRAM - : 21
Design a menu driven program for data Encryption and Decryption using Output Feed
Back (OFB) mode for S-DES/ 3-DES/ AES/ Any other technique.
PROGRAM - : 22
Design a menu driven program for data Encryption and Decryption using Cipher Feed
Back (CFB) mode for S-DES/ 3-DES/ AES/ Any other technique.
PROGRAM - : 23
Generate digital signature using Hash code.
PROGRAM - : 24
Generate digital signature using Message Authentication Code (MAC).
PROGRAM - : 25
Implement the hash code using Message Digest MD5.
PROGRAM - : 26
Implement the hash code using Secure Hash Algorithm SHA-1.
PROGRAM - : 27
Implement the Diffie-Hellman key exchange algorithm.
PROGRAM - : 28
Implement the Knapsack cryptosystem using Merkle-Hellman algorithm.
PROGRAM - : 29
Implement the Steganography for hiding data in an image file.
PROGRAM - : 30
Cryptanalyse any encryption algorithm (e.g, using brute force method or using frequency
analysis etc.)
PROJECTS
PROGRAM - : 31
Download PGPMail freeware and use it to encrypt and sign email messages and
individual files that you exchange with others. (Demonstrate exchanging mails
containing sensitive information to better secure the messages by encrypting them
e.g.exchanging question papers.)
PROGRAM - : 32
Encrypt/Decrypt a speech signal so that it could be transmitted without any worry of
being intercepted and translated by an unwanted third party. Use any encryption
algorithm DES/3-DES/AES.
Download