This document contains a list of 11 experiments related to encryption, decryption, and cryptography algorithms for students to complete. It includes experiments to implement Caesar cipher, substitution cipher, hill cipher, DES, triple DES using Java cryptography packages, Blowfish, RSA, SHA-1, MD5, digital certificates, and creating a digital certificate using the Java key tool. For each experiment, students must record their attendance, observation and experiment conduction, and keeping records to earn a total of 10 marks. Faculty and department heads will sign off after completion of each experiment.
This document contains a list of 11 experiments related to encryption, decryption, and cryptography algorithms for students to complete. It includes experiments to implement Caesar cipher, substitution cipher, hill cipher, DES, triple DES using Java cryptography packages, Blowfish, RSA, SHA-1, MD5, digital certificates, and creating a digital certificate using the Java key tool. For each experiment, students must record their attendance, observation and experiment conduction, and keeping records to earn a total of 10 marks. Faculty and department heads will sign off after completion of each experiment.
This document contains a list of 11 experiments related to encryption, decryption, and cryptography algorithms for students to complete. It includes experiments to implement Caesar cipher, substitution cipher, hill cipher, DES, triple DES using Java cryptography packages, Blowfish, RSA, SHA-1, MD5, digital certificates, and creating a digital certificate using the Java key tool. For each experiment, students must record their attendance, observation and experiment conduction, and keeping records to earn a total of 10 marks. Faculty and department heads will sign off after completion of each experiment.
This document contains a list of 11 experiments related to encryption, decryption, and cryptography algorithms for students to complete. It includes experiments to implement Caesar cipher, substitution cipher, hill cipher, DES, triple DES using Java cryptography packages, Blowfish, RSA, SHA-1, MD5, digital certificates, and creating a digital certificate using the Java key tool. For each experiment, students must record their attendance, observation and experiment conduction, and keeping records to earn a total of 10 marks. Faculty and department heads will sign off after completion of each experiment.
A: Attendance OE: Observation & Experiment Conduction R: Record T: Total marks
S.no. Name of the experiment Page Marks Remarks Date Sign. no. A (2) OE R T (10) of exp. with (5) (3) date 1 Write a C/JAVA program to perform encryption and decryption using Ceaser cipher.
2 Write a C/JAVA program to
perform encryption and decryption using Substitution cipher algorithm. 3 Write a C/JAVA program to perform encryption and decryption using hill cipher. 4 Write C /JAVA program to implement the DES algorithm. 5 Write C/JAVA program that contains functions, which accept a key and input text to be encrypted/decrypted. This program should use the key to encrypt/decrypt the input by using the triple DES algorithm. Make use of Java Cryptography package. 6 Write C/JAVA program to implement the Blowfish algorithm 7 Write C/JAVA program to implement RSA algorithm. 8 Write C/JAVA to Calculate the message digest of a text using the SHA-1 algorithm . 9 write a JAVA program to Calculate the message digest of a text using the MD5 algorithm. 10 Write a JAVA program to implement digital certificates 11 Write a java program Create a digital certificate of your own by using the Java key tool
Name and Signature of the Faculty member PAC Member HOD