- Caser Cipher
- Playfair Cipher
- Vigenere Cipher
- Brute Force Attack on Additive Cipher
- Implementation of Affine Cipher
- Brute-Force and Know Plain Text Attacks on Affine Cipher
- Implementation of Transposition Cipher
- RC4 Encrypt
- RC4 Decrypt
- BruteForce Attack
- Known Plain Text Attack
- DES Encrypt
- DES Decrypt
- Triple DES Encrypt
- Triple DES Decrypt
- Round Keys for Weak Keys
- Implement AES
- Analyze the possibilities of perpetrating an attack on AES
- Implement RSA
- Perform low exponent attack on RSA
Mid Semester Exams Week
- Implement Diffie-Hellman Key Agreement Protocols
- What happens when a primitive root (g) of p is not chosen ?
- Will every p has primitive roots?
Implement Elgamal Algorithm (Public Key Cryptosystem). What are your observations on Elgamal Cryptosystem? How is it different from its counterparts? How to implement Elliptic Curve Cryptography? (Possible Ways)
- Implement SHA-1
- Implement Elgamal Digital Signature Scheme
- A network in which each node can act as a client or server for the other computers in the network, allowing shared access to various resources such as files, peripherals, etc without the need for a central server.
- Design and implement a communication system with the following details
d. Each user maintains private keys in another table along with the id of the public key which is in encrypted form.
e. The encryption and decryption is based on the public key id sent along with the cipher text. Use any public key cryptography for encryption and decryption
- Explore Packet sniffing tools and make a report with practical screenshots possibly
Implement Kerberos Authentication Protocol