CSIT_Labs

Cryptography

Programs

Note:

  1. Almost all the programs have Encryption followed by Decryption.
  2. Key is taken from the user.

Lab 1: Implement Shift Cipher

Lab 2: Implement Playfair Cipher (display the key matrix as well)

Lab 3: Implement Rail Fence Cipher

Lab 4: Implement Vigenere Cipher

Lab 5: Implement Euclidean Algorithm to find GCD of given numbers

Lab 6: Compute additive inverse in given modulo n

Lab 7: Take two numbers and display whether they are relatively prime or not

Lab 8: Implement Extended Euclidean Algorithm (Display the results of iterations in tabular format)

Lab 9: Compute multiplicative inverse in given modulo n using Extended Euclidean Algorithm

Lab 10: Implement Hill Cipher (Key matrix of size 2*2)

Lab 11: Demonstrate how output of S-Box (S1) is generated in DES

Lab 12: Implement Robin Miller algorithm for primality test

Lab 13: Take any positive number and display the result after computing Totient value

Lab 14: Compute primitive roots of given number

Lab 15: Compute discrete log of given number (provided the modulo and primitive root)

Lab 16: Implement Diffie-Helman Key Exchange Algorithm

Lab 17: Implement RSA Algorithm (Encryption/Decryption/ Input Should be taken from user)

Lab 18: Implement Elgamal Cryptographic System

Lab 19: Malicious logic code (Trojan Horse/Virus) program that performs some malicious works