Professional Documents
Culture Documents
L- Lectures; T- Tutorial/Teacher Guided Student Activity; P- Practical; Cr- Credit; *C.E – Continuous Evaluation
(Presentation, Assignment, Progressive assessment etc.)
Course Outcome:
After learning the course the students should be able to:
1. Define the concepts of Information security and their use
2. Describe the principles of symmetric and asymmetric cryptography.
3. Apply the concepts of hashing algorithms
4. Understand and use the various key management and remote authentication mechanisms
List of Practical:
1. Write a program to Implement Caesar cipher encryption-decryption.
2. Write a program to calculate Implement Monoalphabetic cipher encryption-decryption.
3. Write a program to Implement Playfair cipher encryption-decryption..
4. Write a program to Implement Polyalphabetic cipher encryption-decryption.
5. Write a program to Implement Hill cipher encryption-decryption.
6. Write a program to Implement Simple Transposition encryption-decryption
7. Write a program to Implement One time pad encryption-decryption.
8. Demonstrate working of DES using Cryptool.
9. Implement Diffi-Hellmen Key exchange Method.
10. Implement RSA encryption-decryption algorithm.