Professional Documents
Culture Documents
It8761 Set 1
It8761 Set 1
1. Implement the RSA Algorithm using HTML and JavaScript. Consider the end user as one of the
parties (Alice) and the JavaScript application as other party (Bob).
b) Implement and show how to protect your system from Malware using Rootkit Hunter.
5. Write a Java/C/C++ program to implement Playfair cipher algorithm with the keyword “Hello
World”.
6. a) Write a program to implement hill cipher algorithm to perform encryption using 3*3 key
matrix.
b) Implement a Vulnerability Assessment tool, N-stalker and show how it protects your system.
7. a) Write a program to implement hill cipher algorithm to perform decryption using 3*3 inverse
key matrix.
b) Implement and show how to protect your system from Malware using Building Trojans.
Page 1 of 3
8. a) Write a Java/C/C++ program to implement Vigénere cipher which encrypts the plaintext
“ATTACK AT DAWN” using the keyword “LEMON”.
b) Demonstrate the Installation of Rootkit Hunter and explore its various options.
11. a) Implement the Diffie-Hellman Key Exchange mechanism to share secret key between two end
users (Alice & Bob).
b) Implement Rootkit Hunter and show how to protect your system from Malware.
12. a) Implement DSA algorithm, to generate the digital signature at the sender’s end and to verify
the same signature at the recipient’s end.
13. a) What does “CRYPTOGRAHY” become with a shift of F? Write a program to implement this
cipher technique.
b) Implement and show how to protect your system from Malware using Building Trojans.
15. a) Implement the Diffie-Hellman Key Exchange mechanism to share secret key between two end
users (Alice & Bob).
b) Demonstrate intrusion detection system using the tool like snort or any software.
16. a) Implement the key “CODE” to encrypt the sentence “TO BE OR NOT TO BE”. Also write
the algorithm to implement.
Page 2 of 3
17. What does “CAESAR” become with a shift of F? Write a program to implement this cipher
technique.
19. Write a program to implement Hill cipher technique which executes both encryption and
decryption using a 2*2 key matrix.
b) Demonstrate the Installation of Rootkit Hunter and explore its various options.
Page 3 of 3