0% found this document useful (0 votes)
63 views1 page

Insindex

This document provides an index of topics related to information and network security that students will implement and analyze. The index lists 12 topics, including implementing and analyzing Caesar and monoalphabetic ciphers, Playfair cipher, polyalphabetic cipher, Hill cipher, DES and AES algorithms, Diffie-Hellman key exchange, RSA encryption/decryption, SHA-1 hashing, digital signatures, using Cryptool for various encryption techniques, and using Wireshark to analyze network protocols.

Uploaded by

Jayshree Mevada
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
63 views1 page

Insindex

This document provides an index of topics related to information and network security that students will implement and analyze. The index lists 12 topics, including implementing and analyzing Caesar and monoalphabetic ciphers, Playfair cipher, polyalphabetic cipher, Hill cipher, DES and AES algorithms, Diffie-Hellman key exchange, RSA encryption/decryption, SHA-1 hashing, digital signatures, using Cryptool for various encryption techniques, and using Wireshark to analyze network protocols.

Uploaded by

Jayshree Mevada
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

L.D.

COLLEGE OF ENGINEERING
SUB: INFORMATION AND NETWORK SECURITY

INDEX
SR TOPIC PAGE START END SIGNATURE
NO. NO. DATE DATE
1 Implement Caesar cipher
encryption-decryption and
perform cryptanalysis.
2 Implement monoalphabetic
cipher encryption-decryption
and perform cryptanalysis.
3 Implement playfair cipher
encryption-decryption and
perform cryptanalysis.
4 Implement polyalphabetic cipher
encryption-decryption and
perform cryptanalysis.
5 Implement hill cipher
encryption-decryption and
perform cryptanalysis.
6 Implement Simple DES and
AES.
7 Implement Diffie-Hellmen Key
exchange Method and perform
cryptanalysis
8 Implement RSA encryption-
decryption algorithm and
perform cryptanalysis.
9 Write a program to generate
SHA-1 hash and perform
cryptanalysis.
10 Implement algorithm to
implement digital signature and
perform cryptanalysis.
11 Perform various encryption-
decryption techniques with
cryptool.
12 Study and use the Wireshark for
the various network protocols.

You might also like