BSc CS sem 5 Information and Network Security Practical solution Download


List of Practicals

1.Write programs to implement the following Substitution Cipher Techniques: - Caesar Cipher - Monoalphabetic Cipher


2 Write programs to implement the following Substitution Cipher Techniques: - Vernam Cipher - Playfair Cipher


3 Write programs to implement the following Transposition Cipher Techniques: - Rail Fence Cipher - Simple Columnar Technique


4 Write program to encrypt and decrypt strings using - DES Algorithm - AES Algorithm


5 Write a program to implement RSA algorithm to perform encryption / decryption of a given string.


6 Write a program to implement the Diffie-Hellman Key Agreement algorithm to generate symmetric keys.


7 Write a program to implement the MD5 algorithm compute the message digest.


8 Write a program to calculate HMAC-SHA1 Signature


9 Write a program to implement SSL.


10 Configure Windows Firewall to block:


- A port - An Program - A website