BSc CS sem 5 Information and Network Security Practical solution Download |
List of Practicals
1.Write programs to implement the following Substitution Cipher Techniques:
- Caesar Cipher
- Monoalphabetic Cipher
2 Write programs to implement the following Substitution Cipher Techniques:
- Vernam Cipher
- Playfair Cipher
3 Write programs to implement the following Transposition Cipher Techniques:
- Rail Fence Cipher
- Simple Columnar Technique
4 Write program to encrypt and decrypt strings using
- DES Algorithm
- AES Algorithm
5 Write a program to implement RSA algorithm to perform encryption / decryption of a given
string.
6 Write a program to implement the Diffie-Hellman Key Agreement algorithm to generate
symmetric keys.
7 Write a program to implement the MD5 algorithm compute the message digest.
8 Write a program to calculate HMAC-SHA1 Signature
9 Write a program to implement SSL.
10 Configure Windows Firewall to block:
- A port
- An Program
- A website