**Cry****ptography and Network Security****List of Experiments****1**. Find out the corresponding Caesar cipher of a plain text. And then find the original text from the cipher text.**2**. Find out the corresponding Transposition Cipher of a given message. Then perform the reverse operation to get original plain text.**3**. Find out the corresponding double Transposition Cipher of a given plain text. Then perform the reverse operation to get original plain text.**4.** Encrypt a given message using ONE TIME PAD technique. Then perform the reverse operation to get original plain text.**5**. Check whether the given number P is prime or not using Lehmann algorithm.**6**. Check whether the given number P is prime or not using Robin-Miller algorithm.**7**. Implement MD5 one way hash function.**8**. Implement Secured Hash Algorithm (SHA) one way hash function.**9**. Encrypt the plain text message using RSA algorithm. Then perform the reverse operation to get original plain text.**10**. Stenography.

**Theory Questions:**

- What is the difference between a private key and a public key?
- What are symmetric and asymmetric key systems?
- What kinds of threats exist for a cryptographic system?
- What is polyalphabetic encryption?
- What is a block cipher?
- What are the disadvantages of symmetric key cryptography?
- What are the mathematical algorithms used in symmetric cryptography?
- What is the hashing function?
- What is RSA in the field of Cryptography?
- What is Transposition Ciphers?