You are on page 1of 1

Subject : Information Security

Practical List
SrNo CO Marks
Study network analysis tool Wireshark. Filter TCP, UDP, ICMP, packet CO 10
format, and extract OSI model format. 1
1
Implement Ceaser cipher encryption and decryption processes. CO 10
1
2
Implement monoalphabetic cipher encryption and decryption processes. CO 10
1
3
Implement polyalphabetic cipher encryption and decryption processes. CO 10
1
4
Implement play fair cipher encryption and decryption processes. CO 10
1
5
Implement rail fence cipherr encryption and decryption processes. CO 10
1
6
Create a program for cryptanalysis using brute-force approach on Ceaser CO 10
7 cipher. 2
Implement Euclidean algorithm to find gcd and Extended Euclidian CO 10
8 algorithm to find multiplicative inverse. 3
Implement diffie-hellman key exchange algorithm to exchange keys. CO 10
9 5
Study various hashing algorithms for message integrity CO 10
10 4

You might also like