You are on page 1of 2

Prgm

no.

1.

Name of the
program
Additive Cipher

2.

Multiplicative Cipher

3.

Affine Cipher

4.

Statistical Attack on
Mono-Alphabetic
Cipher
Euclidean Algorithm

5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.

Extended Euclidean
Algorithm
Fast Exponential
Implementation of
SDES
Known Cipher Text
Attack on SDES
RSA Cryptosystem
Chosen Cipher Text
Attack on RSA
Cryptosystem
Chosen Plain Text
Attack on RSA
Cryptosystem
ElGamal Cryptosystem
Known Plain Text
Attack on ElGamal
Cryptosystem
Diffie-Hellman Key
Exchange Protocol
Man-In-Middle-Attack
in Diffie Hellman

Date

Signatur
e

Remarks

Protocol

17.
18.

Generation of
Irreducible Polynomial

You might also like