0% found this document useful (0 votes)
25 views

Sarvajanik College of Engineering and Technology Information Technology Department Practical List BE IV Semester 7 Information and Network Security

The document contains a practical list for an Information and Network Security course, assigning students programs to implement various cryptographic algorithms. The list includes having students write programs to find the GCD of numbers and check for primality, and to implement Caesar, Monoalphabetic, Playfair, Hill, Vigenere, Vernam, Railfence, Row Transposition, simplified DES, AES, RSA, Diffie-Hellman, and SHA-1 algorithms. It also includes having students implement two digital signature algorithms, DSA and Elgamal. The list was provided by two professors in the Information Technology Department at Sarvajanik College of Engineering and Technology.

Uploaded by

palak
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views

Sarvajanik College of Engineering and Technology Information Technology Department Practical List BE IV Semester 7 Information and Network Security

The document contains a practical list for an Information and Network Security course, assigning students programs to implement various cryptographic algorithms. The list includes having students write programs to find the GCD of numbers and check for primality, and to implement Caesar, Monoalphabetic, Playfair, Hill, Vigenere, Vernam, Railfence, Row Transposition, simplified DES, AES, RSA, Diffie-Hellman, and SHA-1 algorithms. It also includes having students implement two digital signature algorithms, DSA and Elgamal. The list was provided by two professors in the Information Technology Department at Sarvajanik College of Engineering and Technology.

Uploaded by

palak
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Sarvajanik College of Engineering and Technology

Information Technology Department

Practical List

BE IV Semester 7

Information and Network Security


1 Write a C program to find GCD of two numbers. Also check whether a number is prim or
not. Display a list of first 100 prime numbers.

2 Write a program to implement Caesar Cipher.

3 Write a program to implement Monoalphabetic Cipher.

4 Write a program to implement Playfair Cipher.

5 Write a program to implement Hill Cipher.

6 Write a program to implement Vigenere Cipher.

7 Write a program to implement Vernam Cipher.

8 Write a program to implement Railfence Cipher.

9 Write a program to implement Row Transposition Cipher.

10 Write a program to implement encryption and decryption using Simplified-DES scheme.

11 Write a program to implement encryption and decryption using AES scheme.

12 Write a program to implement RSA algorithm.

13 Write a program to implement Diffie-Hellman Key Exchange algorithm.

14 Implement SHA-1 Algorithm.

15 Write a program to implement two Digital Signature Algorithms: DSA and Elgamal.

Dr. Vivaksha Jariwala, Pro. Bhumika Patel,


I.T. Dept., I.T. Dept.,
SCET. SCET.

You might also like