You are on page 1of 54
\apiltonelels PracHcal No OG _ Pim: _lIvite 0 __progra mt — Nesenam _Ciplaose = eit 8 Vesnana Cipher isc enya aes of encryption _olphatetical text It ics one of the Trans position —— — For convesing a__plain___ techniques text into a cipher text. In this mechanism we assign a number to_eath of tle Plain Text. Ui EGS Saaz = 2 See) Aigo o thy, ue Mflssign o Nurnbex_to each Chavate of tie _plain text and the Kes pes accovding “to alphabetical _ox (2) Add =the um bes, @) ne \E_ the number js gy eaten Cee eaten! a aR GO—2__nurmbey bo each _Chavackes, of ee oot andthe | jena ees ioe alphabet Order. Oe The _pumbey Corresponding. aris base Eien eects (2) Substract the numbex from 26 LP pecanelate each numberof the Sur 2eif _ Noid main ©) aie | | i oe ae a print F Ga: _Char_p text LJ = ‘OM CHAYAN” cides eye Waele “ArcTI VES" print eC eae 43° picts) coe ipvint£ ("\ ey) ae hy Char a= CI= yee t @RSrUviNKyZ" int arr {100} ayy [103 avy a ighe int len; seu vn [003 ch; len (ize of Key) /cre cif dar) ) ~ 15 Eee =o, <= len pj tH) forG-o jntk =o, k<- 285S)EH) vk FECL ct ext 3); Feud (vd Ld Se = av Se, = g pRaEo Gey For (nt}-0 54 4=len; jt tae Qwaesos ke: 2s. Ett) FOR EDUCATIONAL USE ayy 9 Bec ye ial See very] tee if aretij>asy Ory Shi eave (ioe diana) ie alc | aaah Vea ar iy bf | lt | 2 aig a I pal FOR EDUCATIONAL USE _ PRACTICAL 7 L ge! create and “verify Hash Code hoeaiage = hash ref 1 : value ¢ = a * 7 data- Hash vale are used fox worify " | the _tinteary i + The hash yaluey of. el. Y flake as ik Was ; Hash keel > for 7 prepa eee ee dei ingle hoa diffs nt feck ees ng at deck eit | { eeu ge et 2 And can : thea ae ND Mps_ SHA-I ‘eke ae as Ripe AD Teacher's Sign.: ™ Ee \ =e ee St Tice Sle = —=4 e : \ line aa Eck tga sdk “tins algerie ie 1 lise ax the slam Pash vale Hes —+- We : onon08 Bt OO AA OF De AD Se AF 98 SE FS 21 26 25 AN 96 | | | | ks i LE F & (storiaie) Meb°provide’an Ie Bier + \whrite + Theory '- Tn cipher fect ere eee Fa-l4 n)4joe Practical No 08 a _pvrgram to implement rail —fence technique © eter cipher the order Hof _the alphabet ise axranged _to_ebt air the Ste Nectaaiphre nel eeas the alphabet is written downwoeds and on_succesive yails of imaginary A aconal] Raed UGS NRI ERE Selah Mar thet Pan ret ee avec eat qos se -dicgenally, after reach acaching Bieaie “Lhe Paine 4on_is_chencecd __- 4h —alphe bet hos been writ fen, - Pisa Selina emai oat ac linea kenya ot reme copies temps ect = eee ae if We miseage ia” Omchawan” — and the numberof rails = 3 te a iia 4 — Pupartd _c ae 2 a = z bac. f ie 4 Se AXP FN, Thy ener AS be done anrase wise ict” Ome ths se include < 5, jot mein C) tdio.h> fel Wass Bey oO re Se DAD N47 <0) reste (een eee A. Gz ¢ iP Ciy Beer ie Omchowas Z 15 shen Cob}. pals Cope ake oy ption ae ce pitt) st, ( 43 nD Ste Cy . pricl fC Cipher Loa hr 0} 4 * Conclusion: SAL Hence, fanplom [ine fg -&24 ‘i Ie|4]o2 - ae Practicad No -0q4 2} Bim tele a | prmgram +o implement sing. le columnar! - Tans position techm'gue etneo ye ar Eponumner ee position Crp he fewes x Ebro nspos ify, ; ; : MEIC A Cai aioe) on_cipher just like pher. columnar “Trans positon involves_coriting the plasntext oud in rows aad +hen qwacli'ng “the ciphertext of in column, one by one th tandem oxder of sequence which _ a : — Like the! rail fence Yechinque the The buyer TRIM Ae dowmet IF jhe ‘public Key con't dec pt +e signature ama "Jones ov has been Changed Since it wos [Qigned The cigneture tc He considered as Linvolid. oe -— arsine i eg Bie caciss Digital Signature an 17 Open Cr yptoo| ‘and Select @D' tot eC patie: Pr option on Ge punubar __ ay Select Signatures —Demanstyet oo © PE ter coo Signotuve Generation window Will dicplay clicle on —|__ Select hosh Punchion’— Mops : > click on Gewrate alice 1a generate _pahme num’ Re 4 eed cue . ees AD Click on * provide Srosctificate Ente “Nome, fyst name idetifies PIN ‘Clic’ on create Ficate andPse > Click Corsputer nash vole = eocaypt . — Steve > Hon Fro _Mmasc age & digi tet Ne iti ce ee gs) til Dieser etoeatpsn wnat sone, ed wie ung te 8 eee eae 19 26 a)s|oo oe nla i Sibaana oe aes pea ee $ hy —to_entnde and derode oa ts te Sackgmaund — || sheomotical | sTEGAN coRap! Nee concn Ly Stegenpeant eee es Laden eee . ~C.— ngs ge that is 4m be ead coere. Oe eg Ram iin, eK ge People hide ai ecret f i ne mes sag ithin graphic ionag teeta peep os et than el had id genre message to send. ile can tat, Another image £41 cand 106 Can replace the Lass 4 ysre ae best bid of each byte of shot irnage Jith dw bits of our ecret message: the oresiltin tumage coould not Joolc 40 differens 3 yed carry a secret me ye: \al hen. steganography i employed alone te is security b ah ity wihich might gesuit tn Step to crease seganogzaphy message iat oa ee eer A 9-2 ro Jsloo a Practical Wo tz | Bien a3] os Fiversa on any bpesting 1 ae Ranta ure Firewall setting _¢ an Any orale a cyolem. Theory s- punta BS ath gs = Pivevoa lh: A A. Firewall is Wot nehooric ty” Dinca vk traffic based _on__Ovgartrzoction__ Pprevioudly ectablished Se curi> ined Tost ema amount oF voluoble_and confi oO data cavhcal info mocheon te_comp a ox Keaae danger frewadl ie beet ol EtOmeipen get Qtolen Gnd ‘to caeate a sofe eae a ae ars based 20n -ii t ane Tilted. fuk Ee Ki »Y 2B pplication Grate wary ¢ Po - 29 ; te Protesluce Followed. chick on update and po fe sindbux seuunty Fivetoaoll an rote ct a to“ Ddvorceat Settings ~ \n_ bound ___sparpce2s__O. fer ema else RGN Dreso, In bound Qute ___ a on tte Pro on tte ao SP lect seats LT | me ay cio xt and on the pao. tloem ee mgatre =f wo mute = |p the _ TYSEGA” wild sue wizord _Sebect é and ports TAL ELT | 1 kahed A | ey @® On Whe Name page of the uorard — | 19 name FR eerety ewowle nary and SHG ee Atte, tis 4 gd can Niew parpgran— | on ths jo Is)_In_ “tho “Tree 00 the f+ oF +ho — (7 eadwadovo Eryrewolt woth “advanced | j nel OW ect apo nd —— system is secure —— Se SR a HO Pree nero was HO ccc orpstic eters =5 1B Domain network Aco oman neve ui Hes Fen © teens Fscrsot eter Freel Ee etme © vet bes prcteton A aco pteion [1 ew & nema tecton © sop towne cont © oer prance heath ‘4 Famiyoptons 8 Private network Active private networks (Quick Heal Firewall @ No action needed Microsoft Defender Firewall ft Dende Frew not active becae youre ting othr prover, f9-@3) $$ _alsfao_ i Procicat Wo 13 Pires (Groner “ond an een Peremette digital pcos ing Tore: Epo = eorerepapenanes t Theory: Fill— click op Shows “key name. $vom te fic” Bl Sect +e = fe you oe poir_lick on ae LEST poe a| Ente. PIN Foy —- elect _jocation — even ue dovice Gnd Gaue it - Conclusion’ Hence 13e 4 thot we Raue Quecess! ify The Cigite J ces: Bare sig —Conffrtnal- = ae 14-1 PRAT EcaL [y ny soln fa Hhe agin : email aa Qnu too) Bockical Cacia cama Bi Maintain Securee) nelwork and describe 10 posmnation— Seat ee ae stheocy + —a_compute._used App- Bicalion: =e ar Mes cage peiween, x ft i acu a ae ae in“-ttane fine pare evil enw U | lows complex uses foo. An era a pekiwork to Send text , geoph Oda anj= Rite) images tn olfer “bens Via a nebioork 14-1 ¢ elie dialog bax, ax hoon in as wil] ye tor Kedar, och of wohich _} Jeloun + hav pee ere SE imal woh Te ooo aan hows th tocatnn email wo ae eo ° = ae } ec aumy nace Jeon Dns New Promotions! een ea erat, a sey nee te rao seeecncsaretn ne encarta ppg UCL elnaail me» 4 2d Uo s'h lo mle ie a Lew aeaeR ele ‘eMarTraskerPro by Visuaware 9 stata 00 vnc ten ot . = Te sent @ i omg aa @ 4 fetaeage caeaaett 4 =e! a ca taveas osc iniwne buoeratarcsc fe istwas Biaiuratsnessa'n —— fost — imateiee soma Gaiee AS wien aca Jn 10 cl mis mob ath de etd mpl capt ip nya.com [Arence Sct mse a cen Ane x (24 68 2 YDB ODE TYGAmer Lin. | v9 2a 22\s]22 Practital Ne. \5 | Ain <> Trace—the ath of website using tacent Utility Peo —Te_tm tent ceramand tt used_to__Shewr _sexverral —facket takes Sa command Prompt details about the Path from computer or device , Sending _tndenneh contro \ Message Protoco) CT Packeks to desdinacion , jIn these Packets TRACERT -use_Nanrying rp tfime- jto- Live Values Tt means ft dace the deghna- Itton of Sending Packets ox other message, 3-0 — ——— oes —a_command —paomp}_ nn the _tornmand faompl wwindous, 4yPe“Aracend lowed by the destination ,etthey on Tp addros _ s ; the Domain -NMome and _alSn presg 2 Endow _ button 26 Zz igh 4 The output fravinatig = ieee, = 19 the, hoy 05 bd aca one a aaa hop aa ee \ Si SEE ll Pi ute sont ieee ace ho pan ats £ website using the +aacert Bee ~ a eS a 1 50-150 0: IB boot common contig Bi cusemess ats orver Mame Be Bi tro 2 SRA eat ey Po 2% a ga\e|oo FRACT ICAL No 16 in - To wn plement Par Errol Uecusity. ir paix ) J Ener ypt a and Dyes , — Y orY yessa i. uss. Koay sais dee eg Practical — OU cetae : ae —Maininin Secused nehe soy t_ [ond desermbo \afory i mation secusites _ Companies — Standards ie 2 a Pretty Good Panag PGP \eeiclian. feel YyShenn Sed both Lea Be eMeole and enc Tp Sen sia Files Since te eps Bac ele 1199) SP CPs has She cae sua de Facto standayd of em i} a Seumty PGP uc6es both Symethic 4 plies GNd pubic _leoy encryption users Lo} a é ae Ane Btenut exchanging —Pprverte kee ea PGP wov ak Omer tapas Ta mS Kay = a Leck can aucsed andl As FOR ace, y Used once. tc eNeite Hey Seccion lea 1S ence stern This — done -Uding Ses renchec! ps Qf —_____ rots Ac Ere ecreptat! pe eee x iia ne. —The public Key ye” a : Sat Qe paorhartas pe Sone ji dot “ V [tan use it !4o enc Tee Nw s © _The Sendon ends Heir er ery en): Os PGP geecion Fort -to +e ip nee the _cive able =F, decay pt ale uLing J tery ee key Using “lis i ce ciepteuct ic dus aie to Yeh Ae actua) Massage Ahyee mane Ueeoe Oh Pep 7 and recieving enceypled emails B) Newity ily per Aor eae , who-has cent you Hie 3 ayptin. \ aa Ouuice ot Zin tte

You might also like