Network Security List of Programs : PROGRAM - : 1 Implement a menu driven program for Encryption and Decryption of a file using Caesar cipher. PROGRAM - : 2 Perform Encryption and Decryption of a file using Atbash substitution cipher. PROGRAM - : 3 Implement a mixed mono alphabetic substitution cipher where each plaintext letter maps to a different random cipher text letter and the key is 26 letters long. PROGRAM - : 4 Perform the Encryption and Decryption of a text data using general mono alphabetic substitution, i.e. given a keyword: a. write key (with repeated letters deleted) b. then write all remaining letters in columns underneath c. then read off by columns to get cipher text equivalents PROGRAM - : 5 Implement the poly alphabetic substitution using Vignere cipher. PROGRAM - : 6 Perform the encryption and decryption of some text data using rail fence cipher pattern. PROGRAM - : 7 Perform the encryption and decryption of some text data using route cipher pattern, where you have to write the message vertically in columns, but instead of reading off the secret message horizontally, you read it off using a predetermined pattern. For example, a spiral pattern. PROGRAM - : 8 Implement a menu driven program for data Encryption and Decryption using single columnar transposition. PROGRAM - : 9 Implement a menu driven program for data Encryption and Decryption using double columnar transposition. PROGRAM - : 10 Encipher and Decipher a text using auto key cipher poly alphabetic substitution, where plain text itself is appended at the end of the keyword. PROGRAM - : 11 Design your own cipher where different types of ciphers may be concatenated together to form a product cipher. PROGRAM - : 12 Design a menu driven program for data Encryption and Decryption using Playfair cipher (Digraph Substitution). PROGRAM - : 13 Perform the encryption and decryption of some text data using Vernam Cipher/ XOR Encryption. PROGRAM - : 14 Implement the poly graphic substitution using Hill cipher technique. PROGRAM - : 15 Improve the mono alphabetic substitution using Gauss cipher technique. PROGRAM - : 16 Implement the RSA algorithm for Encryption/ Decryption of a text file. PROGRAM - : 17 Design a menu driven program for data Encryption and Decryption using S-DES. PROGRAM - : 18 Design a menu driven program for data Encryption and Decryption using 3-DES. PROGRAM - : 19 Design a menu driven program for data Encryption and Decryption using AES. PROGRAM - : 18 Design a menu driven program for data Encryption and Decryption using Electronic Code Book (ECB) mode for S-DES/ 3-DES/ AES/ Any other technique. PROGRAM - : 19 Design a menu driven program for data Encryption and Decryption using Counter (CTR) mode for S-DES/ 3-DES/ AES/ Any other technique. PROGRAM - : 20 Design a menu driven program for data Encryption and Decryption using Cipher Block Chaining (CBC) mode for S-DES/ 3-DES/ AES/ Any other technique. PROGRAM - : 21 Design a menu driven program for data Encryption and Decryption using Output Feed Back (OFB) mode for S-DES/ 3-DES/ AES/ Any other technique. PROGRAM - : 22 Design a menu driven program for data Encryption and Decryption using Cipher Feed Back (CFB) mode for S-DES/ 3-DES/ AES/ Any other technique. PROGRAM - : 23 Generate digital signature using Hash code. PROGRAM - : 24 Generate digital signature using Message Authentication Code (MAC). PROGRAM - : 25 Implement the hash code using Message Digest MD5. PROGRAM - : 26 Implement the hash code using Secure Hash Algorithm SHA-1. PROGRAM - : 27 Implement the Diffie-Hellman key exchange algorithm. PROGRAM - : 28 Implement the Knapsack cryptosystem using Merkle-Hellman algorithm. PROGRAM - : 29 Implement the Steganography for hiding data in an image file. PROGRAM - : 30 Cryptanalyse any encryption algorithm (e.g, using brute force method or using frequency analysis etc.) PROJECTS PROGRAM - : 31 Download PGPMail freeware and use it to encrypt and sign email messages and individual files that you exchange with others. (Demonstrate exchanging mails containing sensitive information to better secure the messages by encrypting them e.g.exchanging question papers.) PROGRAM - : 32 Encrypt/Decrypt a speech signal so that it could be transmitted without any worry of being intercepted and translated by an unwanted third party. Use any encryption algorithm DES/3-DES/AES.