It8761 Set 3
It8761 Set 3
(Regulations 2017)
a. Rail-fence technique
a. Vigenere Cipher
b. Hill Cipher
b. Create a program to display contents of Playfair matrix and encrypt the given plaintext.
5. Implement an application that will be using AES algorithm with key size 128 bits.
6. Implement an application that will be using HTML as front end and Javascript to do RSA
encryption/decryption.
7. a. Create a program that can do key exchange between two parties and generate secret key. You can
make use of Diffie-Hellman Key Exchange algorithm.
b. Make a vulnerability assessment scan of your college web application using N-Stalker.
8. a. Implement Rail-fence technique to do encryption of plaintext
b. Implement SHA-1 hashing algorithm to generate message digest from given text.
b. Create a Trojan or download SubSeven like Trojan and demonstrate it in a virtual machine.
b. Do penetration testing using N-Stalker web security scanner in your college security lab server. Use
manual setup (spider only) option.
12. a. Implement decryption using Hill Cipher technique with given plaintext and K-1
13. a. Create a program to implement Playfair cipher to do encryption of the given cleartext.
14. a. Implement rail-fence cipher technique with depth given as a command line argument
b. Configure snort intrusion detection tool and set rules for various options.
18. Implement an application that will be using AES algorithm with key size 192 bits.
19. a. Create a transposition cipher program that will perform row and column transformation.
b. Build a Trojan like SubSeven or equivalent in a virtual machine environment and observe how
client takes over the host system.