Cryptography

Cryptography and Network Security
List of Experiments
1. Find out the corresponding Caesar cipher of a plain text. And then find the original text from the cipher text.
2. Find out the corresponding Transposition Cipher of a given message. Then perform the reverse operation to get original plain text.
3. Find out the corresponding double Transposition Cipher of a given plain text. Then perform the reverse operation to get original plain text.
4. Encrypt a given message using ONE TIME PAD technique. Then perform the reverse operation to get original plain text.
5. Check whether the given number P is prime or not using Lehmann algorithm.
6. Check whether the given number P is prime or not using Robin-Miller algorithm.
7. Implement MD5 one way hash function.
8. Implement Secured Hash Algorithm (SHA) one way hash function.
9. Encrypt the plain text message using RSA algorithm. Then perform the reverse operation to get original plain text.
10. Stenography.

1.Find out the corresponding Caesar cipher of a plaintext. And then find the original text from the cipher text.


2.Find out the corresponding Transposition Cipher of a given message. Then perform the reverse operation to get original plaintext.


3.Find out the corresponding double Transposition Cipher of a given plaintext. Then perform the reverse operation to get original plaintext.


4.Encrypt a given message using ONE TIME PAD technique. Then perform the reverse operation to get original plaintext.


5.Check whether the given number P is prime or not using Lehmann algorithm.


6.Check whether the given number P is prime or not using Robin-Miller algorithm.


7.Implement MD5 one way hash function.


8.Implement Secured Hash Algorithm (SHA) one way hash function.


9.Encrypt the plaintext message using RSA algorithm. Then perform the reverse operation to get original plaintext.


10.Steganography.


Theory Questions:

  1. What is the difference between a private key and a public key?
  2. What are symmetric and asymmetric key systems?
  3. What kinds of threats exist for a cryptographic system?
  4. What is polyalphabetic encryption?
  5. What is a block cipher?
  6. What are the disadvantages of symmetric key cryptography?
  7. What are the mathematical algorithms used in symmetric cryptography?
  8. What is the hashing function?
  9. What is RSA in the field of Cryptography?
  10. What is Transposition Ciphers?

What is Cryptography
About me