0% found this document useful (0 votes)
43 views1 page

Course Code Course Title Credits PSCSP4022 Practical Course On Specialization: Cyber & Information Security (Cryptography and Crypt Analysis) 02

This document outlines 10 practical experiments for a course on cyber and information security cryptography. The experiments involve writing programs to implement various cryptographic algorithms and techniques like the Chinese Remainder Theorem, Fermat's Little Theorem, RSA, ElGamal, Diffie-Hellman key exchange, MD5, DES, IDEA, and HMAC signatures. Students will gain hands-on experience with both symmetric and asymmetric cryptographic algorithms.

Uploaded by

vipulsaluja
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
43 views1 page

Course Code Course Title Credits PSCSP4022 Practical Course On Specialization: Cyber & Information Security (Cryptography and Crypt Analysis) 02

This document outlines 10 practical experiments for a course on cyber and information security cryptography. The experiments involve writing programs to implement various cryptographic algorithms and techniques like the Chinese Remainder Theorem, Fermat's Little Theorem, RSA, ElGamal, Diffie-Hellman key exchange, MD5, DES, IDEA, and HMAC signatures. Students will gain hands-on experience with both symmetric and asymmetric cryptographic algorithms.

Uploaded by

vipulsaluja
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Course Code Course Title Credits

PSCSP4022 Practical Course on Specialization: Cyber & 02


Information Security (Cryptography and Crypt
Analysis)
Sr List of Practical Experiments
No
1 Write a program to implement following:
Chinese Reminder Theorem
Fermats Little Theorem

2 Write a program to implement the (i) Affine Cipher (ii) Rail Fence Technique (iii)
Simple Columnar Technique (iv) Vermin Cipher (v) Hill Cipher to perform
encryption and decryption.
3 Write a program to implement the (i) RSA Algorithm to perform encryption and
decryption.
4 Write a program to implement the (i) Miller-Rabin Algorithm (ii) pollard p-1
Algorithm to perform encryption and decryption.
5 Write a program to implement the ElGamal Cryptosystem to generate keys and
perform encryption and decryption.
6 Write a program to implement the Diffie-Hellman Key Agreement algorithm to
generate symmetric keys.
7 Write a program to implement the MD5 algorithm compute the message digest.
8 Write a program to implement different processes of DES algorithm like (i) Initial
Permutation process of DES algorithm, (ii) Generate Keys for DES algorithm, (iii)
S-Box substitution for DES algorithm.
9 Write a program to encrypt and decrypt text using IDEA algorithm.
10 Write a program to implement HMAC signatures.

38

You might also like