SHAHANI ENGINEERING COLLEGE
Computer Engineering Department
THADOMAL
Branch;
List of Experiments
Subject: SPCC
Name
‘Computer Sen vy
| 1. | Write program to implement Lexical Analyzer
Write @ program to eliminate left recursion from the given grammar
2, | To study and implement programs LEX and YACC tool cos
a Cor
__ | Write a program to implement the FIRST and FOLLOW set for the
3+ | given grammar
4, | Write a program to implement Parser C03
5. | Write @ program to implement Three Address Code (TAC) cos
6. | Writea program to implement Code Optimization cos
7, |) Write program to implement Pas 1 of Malt-Pass Assembler a
| b) Write a program to implement Pass 2 of Multi-Pass Assembler
‘Write a program to implement Multi Pass Macroprocessor con
‘Additional Experiments
Write a program to implement Code Generation co4
Cos
Subject Incharge.sapowns shai sweeten COLLEGE BANORAID
erat Arica thellze
Sect Inbar Dr, Shilpa Vetba
= | This or Experiment
No) obte Fouation wid PEAS pres
=f DAD seta ibe
|=} implica GCS seach leon Ta Python z
-TipfeniA® sewchalgorcin im PyThOH
Set SmaTeH Aan g1Genete Hic Amblie (ay ane) iH Python
Sa or Wapas World Preklirm |
ce epee
World Probiew
+ | Planning forztectos probes (ex, Bio
GS Staiy on existing AT eect
— Resigament on Hasiox oFATUoalItlligene
8) Various erations of AL |
1) Components of AL
5} Categorization of AL
[Ford ana Backward chaining
2023
Jan Ape VidTHADOMAL SHAHANI ENGINEERING COLLEGE
Department of Computer Engineering
Academic Year 2022-23
T. E, Computer Semester: VI
List of Experiments (Date : 9/01/2023
t: Cryptography and System Security Lab, (CSS Lab.)
Subj
No. Name of Experiments
Implementation of Extended Euclidean algorithm
Imptementation 0
Caesar Cipher
plementatio
Playfair
4. | Implementation of Euler's Totient Fu
5. | mp
mentation of RSA crypiosystem
6. | Implementation of Diffie Hellman Key exchange algocithm
| SIGRY the use of network reconnaissance tools and apply the Following: WHOIS, dig, meson
7
8. | Study and implementation of packets
fer tool: wireshark
[Desig Ipables
n of personal Firewall usi
9
(0|Simulation of Buffer Overflow Attack
LSimulation of SQL Injeetion At
k [Optional]
12| Simulation of port scanning attack using Nmap [Optional]
Written Assignment
Assignment 1:
A Explain diffe
services and mechanisms of security?”
1B what are various types of attacks? Explain with example
C list few Latest viruses on net and explain (out of syllabus, take print)
Assignment 2 : Write short note on digital signatures and digital ceriicates
Assignment 3: List software vulnerabilities, How are they exploited to launch an at
ack?
Subject Te-charge
/ Dr. Atti Deshpande