This document contains an index of practical assignments related to computer security. It lists 18 assignments including studying security services, mechanisms, and attacks. Other assignments involve performing encryptions and decryptions using various cryptographic techniques like the Caesar cipher, Monoalphabetic cipher, Playfair cipher, and Hill cipher. Additional assignments include preparing reports on block cipher modes of operation, the Data Encryption Standard, and asymmetric encryption. The final assignments involve configuring security and firewall settings in Windows operating systems.
This document contains an index of practical assignments related to computer security. It lists 18 assignments including studying security services, mechanisms, and attacks. Other assignments involve performing encryptions and decryptions using various cryptographic techniques like the Caesar cipher, Monoalphabetic cipher, Playfair cipher, and Hill cipher. Additional assignments include preparing reports on block cipher modes of operation, the Data Encryption Standard, and asymmetric encryption. The final assignments involve configuring security and firewall settings in Windows operating systems.
This document contains an index of practical assignments related to computer security. It lists 18 assignments including studying security services, mechanisms, and attacks. Other assignments involve performing encryptions and decryptions using various cryptographic techniques like the Caesar cipher, Monoalphabetic cipher, Playfair cipher, and Hill cipher. Additional assignments include preparing reports on block cipher modes of operation, the Data Encryption Standard, and asymmetric encryption. The final assignments involve configuring security and firewall settings in Windows operating systems.
INDEX Date of Sr. No. Practical List Submission Grade Signature
1 To study various Security services.
2 To study various Security mechanisms.
3 To study various Security Attacks.
4 To study cryptanalysis.
5 Prepare report on various cryptographic technique.
Perform encryption of plain text and decryption of 6 cipher text of a using caesar cipher. Perform encryption of a plain text and decryption of 7 cipher text using Monoaplhabetic cipher.
Perform encryption of a plain text and decryption of
cipher text using play fair cipher. 8
Perform encryption of a plain text and decryption of
a cipher text using polyalphabetic cipher 9
Perform encryption of a plain text and decryption of
cipher text using one time pad method 10
Perform encryption of a plain text and decryption of
cipher text using rectangular cipher 11 Perform encryption of a plain text and decryption of cipher text using columnar cipher 12 Perform encryption of a plain text and decryption of cipher text using Hill cipher 13
Prepare report on block cipher modes of operation.