0% found this document useful (0 votes)
22 views1 page

Bcse 0071

Uploaded by

Suraj Mishra
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views1 page

Bcse 0071

Uploaded by

Suraj Mishra
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Course Curriculum (for Session 2019-20)

B.Tech. in Computer Science & Engineering

BCSE0071: CRYPTOGRAPHY & NETWORK SECURITY LAB

Credits: 01 L–T–P-J: 0–0–2-0


Module
Content Hours
No.
 Write a program in ‘C’ to implement Additive and VignereCipher.
 Write a program in ‘C’ to implement Autokey Cipher.
 Write a program in ‘C’ to find out the Multiplicative inverse of a given
number.
 Write a program in ‘C’ to implement RSA Cryptosystem.
 Write a program in ‘C’ to implement Elgamal Cryptosystem.
I  Write a program in ‘C’ to implement Rabin Miller Primality Test. 12*2=24
 Write a program in ‘C’ to find out the Primitive roots.
 Write a program in ‘C’ to implement Euclidean Algorithm.
 Write a program in ‘C’ to implement Extended Euclidean Algorithm.
 Write a program in ‘C’ to implement Diffie-Hellman key exchange
Algorithm.
 Write a program in ‘C’ to implement Random Number Generator.

Textbooks:
 W. Stallings (2010), "Cryptography and Network Security: Principles and Practices",5th Edition,
Pearson Education.
Reference Books:
 B. A. Forouzan (2003), "Cryptography & Network Security", 3rd Edition, Tata McGraw Hill.
 Douglas Stinson, "Cryptography Theory and Practice", 2nd Edition,Chapman& Hall/CRC.
 K. N. King, “C Programming A Modern Approach”, W. W. Norton, 2nd Edition, 2008.
 Kernighan and Ritche, “The C Programming Language”, PHI, 2nd Edition, 2011.
 P.DeyandM.Ghosh,“ProgramminginC”,OxfordUniversityPress1stEdition,2000.

Outcome: After completion of this course students will be able to:


 Know the methods of conventional encryption.
 Understand the concepts of public key encryption and number theory
 Understand various applications of cryptography and security issues practically.

BCSE0005: CYBER SECURITY AND DIGITAL FORENSICS


DEPARTMENT OF COMPUTER ENGINEERING & APPLICATIONS, Institute of Engineering & Technology

You might also like