\apiltonelels
PracHcal No OG _
Pim: _lIvite 0 __progra mt —
Nesenam _Ciplaose =
eit 8
Vesnana Cipher isc enya aes
of encryption _olphatetical text
It ics one of the Trans position ——
— For convesing a__plain___
techniques
text into a cipher text. In this
mechanism we assign a number
to_eath of tle Plain
Text. Ui EGS Saaz = 2 See)
Aigo o thy, ue
Mflssign o Nurnbex_to each Chavate
of tie _plain text and the Kes
pes
accovding
“to alphabetical _ox
(2) Add =the um bes,
@) ne
\E_ the number js gy eaten
Cee eaten! aaR
GO—2__nurmbey bo each
_Chavackes, of ee oot andthe
| jena ees ioe alphabet Order.
Oe The _pumbey Corresponding.
aris base Eien eects
(2) Substract the numbex from 26
LP pecanelate each numberof the Sur
2eif
_
Noid main ©) aie
|
|
i oe ae a
print F Ga:
_Char_p text LJ = ‘OM CHAYAN”
cides eye Waele “ArcTI VES"
print eC eae 43° picts) coe
ipvint£ ("\ ey)
ae hy
Char a= CI= yee t @RSrUviNKyZ"
int arr {100} ayy [103 avy a ighe
int len;
seu vn [003 ch;
len (ize of Key) /cre cif dar) ) ~ 15
Eee =o, <= len pj tH)
forG-o jntk =o, k<- 285S)EH)
vk FECL ct ext 3);
Feud (vd Ld Se =
av Se, =
g
pRaEo Gey
For (nt}-0 54 4=len; jt
tae Qwaesos ke: 2s. Ett)
FOR EDUCATIONAL USEayy 9 Bec ye ial See very] tee
if aretij>asy
Ory Shi eave (ioe
diana) ie alc | aaah Vea
ar iy bf | lt
|
2 aig a I pal
FOR EDUCATIONAL USE_ PRACTICAL 7 L ge!
create and “verify Hash Code
hoeaiage =
hash ref 1 : value ¢
= a * 7
data- Hash vale are used fox worify "
| the _tinteary
i + The hash yaluey of. el. Y flake
as ik Was ;
Hash
keel > for 7
prepa eee ee
dei ingle hoa diffs nt feck
ees ng at deck eit
| { eeu ge et 2 And can :
thea ae ND Mps_ SHA-I ‘eke ae
as Ripe AD
Teacher's Sign.:™ Ee
\
=e ee St
Tice Sle =
—=4 e :
\ line
aa
Eck tga sdk “tins algerie ie
1
lise ax the slam Pash vale Hes
—+-
We :onon08 Bt OO AA OF De AD Se AF 98 SE FS 21 26 25 AN 96
|
|
|
|
ks
i
LE
F
&
(storiaie)
Meb°provide’anIe Bier + \whrite
+ Theory '- Tn
cipher fect
ere eee
Fa-l4
n)4joe
Practical No 08
a _pvrgram to implement rail
—fence technique
© eter cipher the order
Hof _the alphabet ise axranged _to_ebt air the
Ste Nectaaiphre nel eeas
the alphabet is written downwoeds and
on_succesive yails of imaginary
A aconal]
Raed
UGS NRI ERE Selah Mar thet Pan ret ee avec
eat
qos se -dicgenally, after reach acaching
Bieaie “Lhe Paine
4on_is_chencecd __-
4h —alphe bet hos been writ fen, -
Pisa Selina emai oat ac linea kenya
ot reme copies temps ect =
eee ae if We miseage ia” Omchawan” —
and the numberof rails = 3 te
a iia 4 —
Pupartd _c ae 2
a = z bac. f
ie 4
Se AXP FN,
Thy ener AS be done anrase wise
ict” Ome thsse include < 5,
jot mein C)
tdio.h>
fel Wass Bey
oO
re Se
DAD N47 <0)
reste (een eee
A. Gz
¢
iP Ciy Beer
ie
Omchowas Z
15 shen Cob}.
pals Cope
ake
oy ption ae ce
pitt)
st, (
43
nD Ste Cy .
pricl fC Cipher
Loa
hr 0}
4
* Conclusion:
SAL
Hence,
fanplom
[inefg -&24
‘i Ie|4]o2
- ae Practicad No -0q4
2} Bim tele a | prmgram +o implement sing. le
columnar! - Tans position techm'gue
etneo ye
ar Eponumner ee position Crp he fewes
x Ebro nspos ify, ; ; :
MEIC A Cai aioe) on_cipher just like
pher. columnar “Trans positon
involves_coriting the plasntext oud in rows aad
+hen qwacli'ng “the ciphertext of in column,
one by one th tandem oxder of sequence which _
a :
— Like the! rail fence Yechinque the
The buyer TRIM Ae dowmet IF jhe
‘public Key con't dec pt +e signature ama
"Jones ov has been Changed Since it wos
[Qigned The cigneture tc He considered as
Linvolid. oe -—arsine i eg
Bie caciss Digital Signature an
17 Open Cr yptoo| ‘and Select @D' tot
eC patie: Pr option on Ge
punubar __
ay Select Signatures —Demanstyet oo
© PE ter coo Signotuve Generation
window Will dicplay clicle on
—|__ Select hosh Punchion’— Mops :
> click on Gewrate alice 1a
generate _pahme num’ Re
4 eed cue . ees
AD Click on * provide Srosctificate Ente
“Nome, fyst name idetifies PIN
‘Clic’ on create Ficate andPse
> Click Corsputer nash vole = eocaypt
.
— Steve
> Hon Fro _Mmasc age & digi tet
Ne iti ceee
gs) til
Dieser
etoeatpsn wnat sone,
ed wie ung te 8 eeeeae19 26
a)s|oo
oe nla i
Sibaana oe aes
pea
ee $ hy —to_entnde and derode
oa ts te
Sackgmaund
— || sheomotical
| sTEGAN coRap! Nee
concn
Ly Stegenpeant eee es Laden
eee . ~C.— ngs ge that is 4m be ead coere. Oe
eg Ram iin, eK ge
People hide ai
ecret f i
ne mes sag ithin graphic
ionag teeta peep os et than el had id genre
message to send. ile can tat, Another image £41
cand 106 Can replace the Lass 4 ysre ae best bid
of each byte of shot irnage Jith dw bits of our
ecret message: the oresiltin tumage coould not
Joolc 40 differens 3 yed carry a secret me ye:
\al hen. steganography i employed alone te
is security b ah ity wihich might gesuit tn
Step to crease seganogzaphy message iatoa ee eerA
9-2
ro Jsloo
a Practical Wo tz
| Bien a3] os Fiversa on any bpesting
1 ae Ranta ure Firewall setting _¢ an Any
orale a cyolem.
Theory s- punta BS ath gs
= Pivevoa lh: A
A. Firewall is Wot nehooric
ty” Dinca
vk traffic based _on__Ovgartrzoction__
Pprevioudly ectablished Se curi> ined
Tost ema
amount oF voluoble_and confi
oO
data
cavhcal info mocheon te_comp a
ox Keaae danger frewadl ie beet ol
EtOmeipen
get Qtolen Gnd ‘to caeate a sofe
eae a ae
ars based 20n -ii t
ane Tilted. fuk Ee
Ki
»Y
2B pplication Grate wary ¢Po - 29
; te Protesluce Followed.
chick on update and
po fe sindbux seuunty
Fivetoaoll an
rote ct
a to“ Ddvorceat Settings
~ \n_ bound
___sparpce2s__O. fer ema else RGN Dreso,
In bound Qute ___
a on tte Pro
on tte ao SP lect seats
LT |
me
ay
cio xt and on the pao. tloem
ee mgatre =f
wo mute = |p the _ TYSEGA” wild
sue wizord _Sebect é
and ports
TAL ELT |
1
kahed A |
ey@® On Whe Name page of the uorard —
| 19 name FR eerety ewowle
nary and SHG ee
Atte, tis 4 gd can Niew parpgran—
| on ths jo
Is)_In_ “tho “Tree 00 the f+ oF +ho —
(7 eadwadovo Eryrewolt woth “advanced
| j nel OW ect apo nd ——system is secure
—— Se SR
a HO Pree nero
was HO ccc orpstic eters =51B Domain network
Aco oman neve
ui Hes Fen
© teens
Fscrsot eter FreelEe etme
© vet bes prcteton
A aco pteion
[1 ew & nema tecton
© sop towne cont
© oer prance heath
‘4 Famiyoptons
8 Private network
Active private networks
(Quick Heal Firewall
@ No action needed
Microsoft Defender Firewall
ft Dende Frew not active becae youre
ting othr prover,f9-@3)
$$ _alsfao_
i
Procicat Wo 13
Pires (Groner “ond an een Peremette digital
pcos ing Tore: Epo
= eorerepapenanes
t
Theory:
Fill— click op Shows “key name.
$vom te fic”
Bl Sect +e = fe you oe
poir_lick on ae LEST poe
a| Ente. PIN Foy —- elect _jocation —
even ue dovice Gnd Gaue it -
Conclusion’
Hence 13e 4 thot we Raue
Quecess! ify The
Cigite J ces: Bare sig —Conffrtnal-
=
ae14-1
PRAT EcaL [y
ny soln fa Hhe agin : email aa
Qnu too)
Bockical Cacia cama Bi
Maintain Securee) nelwork and describe
10 posmnation— Seat ee ae
stheocy +
—a_compute._used App-
Bicalion: =e ar Mes cage
peiween, x ft i
acu a ae ae
in“-ttane fine pare evil enw U |
lows complex uses foo.
An era a
pekiwork to Send text , geoph Oda anj=
Rite) images tn olfer “bens Via a
nebioork14-1
¢ elie dialog bax, ax hoon in as wil]
ye tor Kedar, och of wohich _}
Jeloun +
hav
pee ere SE imal
woh Te ooo
aan hows th tocatnn emailwo ae
eo
°
= ae }
ec aumy nace Jeon Dns
New Promotions! een ea
erat, a
sey nee te rao
seeecncsaretn
ne encarta
ppgUCL elnaail me» 4 2d
Uo s'h lo mle ie a Lew aeaeR ele
‘eMarTraskerPro by Visuaware
9 stata 00 vnc ten ot .
= Te sent @ i
omg aa @ 4
fetaeage
caeaaett 4
=e!
a ca
taveas osc
iniwne buoeratarcsc fe
istwas Biaiuratsnessa'n —— fost —
imateiee soma Gaiee
AS wien acaJn 10 cl mis mob ath de
etd mpl capt ip nya.com [Arence
Sct mse a cen Ane
x (24 68 2 YDB ODE TYGAmerLin. |
v9 2a
22\s]22
Practital Ne. \5
| Ain <>
Trace—the ath of website using tacent
Utility
Peo
—Te_tm tent ceramand tt
used_to__Shewr _sexverral
—facket takes
Sa command Prompt
details about the Path
from computer or device ,
Sending _tndenneh contro \
Message Protoco) CT Packeks to desdinacion ,
jIn these Packets TRACERT -use_Nanrying rp tfime-
jto- Live Values Tt means ft dace the deghna-
Itton of Sending Packets ox other message,
3-0 — ——— oes
—a_command —paomp}_ nn
the _tornmand faompl wwindous, 4yPe“Aracend
lowed by the destination ,etthey on Tp addros _
s
; the Domain -NMome and _alSn presg
2 Endow _ button26
Zz igh
4 The output fravinatig =
ieee, = 19 the, hoy 05 bd aca one
a aaa hop aa
ee \ Si SEE ll
Pi ute sont ieee ace ho
pan ats £ website using the +aacert Bee
~ a eS
a1 50-150 0:
IB boot
common
contig
Bi cusemess
ats orver
Mame
Be
Bi tro
2 SRA
eat eyPo 2%
a ga\e|oo
FRACT ICAL No 16
in
- To wn plement Par
Errol Uecusity.
ir paix
) J Ener ypt a and Dyes ,
— Y orY yessa
i. uss. Koay sais dee eg
Practical — OU cetae : ae
—Maininin
Secused nehe soy t_
[ond desermbo \afory i
mation secusites _
Companies — Standards ie
2 a
Pretty Good Panag PGP \eeiclian.
feel YyShenn Sed both Lea
Be
eMeole and enc Tp
Sen sia Files Since te eps
Bac ele 1199) SP CPs has She cae
sua de Facto standayd of em i} a
Seumty PGP uc6es both Symethic 4
plies GNd pubic _leoy encryption
users Lo} a
é ae Ane Btenut exchanging —Pprverte
kee
ea PGP wov ak
Omer tapas Ta mS Kay =
a Leck canaucsed andl As FOR ace,
y Used once.
tc eNeite Hey Seccion
lea 1S ence stern
This — done -Uding Ses
renchec!
ps Qf —_____
rots Ac Ere ecreptat! pe eee x
iia ne. —The public Key ye” a : Sat Qe
paorhartas pe Sone ji dot “ V
[tan use it !4o enc Tee Nw s
© _The Sendon ends Heir
er ery en): Os
PGP geecion Fort -to +e ip nee
the _cive able =F, decay pt ale uLing J
tery ee key Using “lis i
ce ciepteuct ic dus aie to
Yeh Ae actua) Massage
Ahyee mane Ueeoe Oh Pep
7 and recieving enceypled emails
B) Newity ily per Aor eae ,
who-has cent you Hie
3 ayptin. \ aa
Ouuice ot Zin tte