CsitLabs
  • CSIT Labs
  • 1st Semester
    • Digital Logics
      • Lab 1
      • Lab 2
      • Lab 3
      • Lab 4
      • Lab 5
      • Lab6
    • IIT
    • Physics Lab Report Formet
  • 2nd Semester
    • Algorithms used in Discrete Structure class
    • Microprocessor
      • 8085 Microprocessor
        • Arithmetic and Logical Instruction Set
        • Branching Instruction Set
        • Data Transfer and Instruction Set
        • Multiply, Divide and Memory Block Operations
        • Rotate Instruction Set
        • Subroutine, Stack and BCD Conversion](Subroutine_Stack_BCD_Conversion
      • 8086 Microprocessor
        • Basic Arithmetic
        • Practice Programs for 8086 Microprocessor
        • String Processing
    • Object Oriented Programming using C++
      • File Access Pointers
      • Standard Exceptions in C++
    • Statistics-I
  • 3rd Semester
    • Computer Architecture
      • Practical labs
    • Computer Graphics
      • Practial
      • Simulation of Two Dimensional Transformation
      • Scan Conversion Algorithm
    • Data Structures and Algorithms
      • Array methods (Introduction)
      • Stack
      • Queue
      • Recursion
      • Linked List
      • Sorting Algorithms
      • Searching and Hashing Algorithms
      • Trees and Graphs
      • Lab practice
    • Numerical Method Labs
      • Lab practice
    • Statistics-II Labs
      • Confidence interval of mean assuming normal distribution
      • One Sample T test
      • Two Sample T test
      • Regression Analysis
      • Two Sample T test
      • Design_of_Experiment
        • CRD (Completely Randomized Design)
        • RBD (Randomized Block Design)
        • RBD (Randomized Block Design)
      • Non-parametric_test
        • Binomial Test
        • Cochran Q test
        • Kolmogorov-Smirnov one sample test
        • Run test
        • Friedman-F_test
          • Friedman F test
          • Friedman F test
        • Kruskal-Wallis-H_test
          • Kruskal Wallis H test
          • Kruskal Wallis H test
        • Mann-Whitney-U_test
          • Mann Whitney U test
          • Mann Whitney U test
        • Median_test
          • Median Test
          • Median Test
        • Wilcoxon-Matched-pair_signed_rank_test
          • Wilcoxon Matched pair signed rank test
          • Wilcoxon Matched pair signed rank test
  • 4th Semester
    • Artificial Intelligence
    • Computer Networks
      • Networking commands in CMD
    • DBMS Lab
    • Operating System
      • Linux Commands
    • Theory of Computation
      • Lab 1 (DFA)
      • Lab 2 (NFA)
  • 5th Semester
    • Cryptography
    • Design and Analysis of algorithms
    • Multimedia
      • Animation Creation with Blender
      • FL Studio - Simple Effect Creation
      • Macromedia FreeHand - Logo Creation
      • Audio Mixing
      • Adobe Photoshop - ID Card Creation
      • Video Editing with Adobe Premiere Pro
    • Simulation & Modeling
      • Lab 1: Random Number Generation
    • System Analysis and Design
    • Web Technology
      • Lab Assignment – I (HTML)
      • Lab Assignment – II (CSS)
      • Lab Assignment – III (JavaScript and XML)
      • Lab Assignment – IV (PHP)
      • Web Technology
        • php
          • Database connection using PHP and MySQL
          • Login form
          • Login form
  • 6th Semester
    • Compiler Design and Construction
    • NET Centric Computing
      • Class Codes
        • Authentication and Authorization in ASP.NET
        • C# Basics
      • Lab Codes
        • Practical 1
        • Practical 2
          • Number Operations Web App
          • User Registration Form
          • User Registration Console App
        • Practical 3
          • Authentication and Authorization (Claims, Roles and Policies)
          • Client side state management in ASP.NET
          • Entity Framework Core
          • Form Validation
            • React form validation
          • HTML Tag Helpers
          • MVC demonstration
          • Razor Syntax
          • Server Side State Management in ASP.NET
      • Self Projects
        • Do while programs
        • Role playing game battle challenge
        • Project overview
        • Authentication
          • wwwroot
            • lib
              • jquery-validation
                • The MIT License (MIT)
  • 7th Semester
    • Advanced Java Programming
      • Class Codes
        • Unit1-6&8
          • javafx-sdk-21.0.1
            • legal
              • javafx.graphics
                • Independent JPEG Group (IJG) JPEG v9e
                • Mesa 3-D Graphics Library v21.0.3
              • javafx.media
                • Microsoft DirectShow Samples v156905
                • GNU Glib v2.72.0
                • GStreamer v1.20.1
                • LibFFI v3.4.4
              • javafx.web
                • IBM International Components for Unicode (ICU4C) v73.1
                • xmlsoft.org: libxml2 v2.10.4
                • xmlsoft.org: libxslt v1.1.35
                • WebKit Open Source Project: WebKit v616.1
          • src
            • main
              • java
                • Unit 1: Programming in Java
                  • 2. Concepts and Topics
                • Unit 2: User Interface Components with Swing
                • Unit 3: Event Handling
                • Unit 4: Database Connectivity
                • Unit 5: Network Programming
                • Unit 6: GUI with JavaFX
        • Unit7
          • src
            • main
              • webapp
                • index
      • Lab Codes
        • Lab
          • src
            • main
              • java
                • Practical 1
                • Practical 2
                • Practical 3
                • Practical 4
                • Practical5
    • Data warehouse and Data mining
  • docs
    • Contributor Covenant Code of Conduct
Powered by GitBook
On this page
  • Programs
  • Lab 1: Implement Shift Cipher
  • Lab 2: Implement Playfair Cipher (display the key matrix as well)
  • Lab 3: Implement Rail Fence Cipher
  • Lab 4: Implement Vigenere Cipher
  • Lab 5: Implement Euclidean Algorithm to find GCD of given numbers
  • Lab 6: Compute additive inverse in given modulo n
  • Lab 7: Take two numbers and display whether they are relatively prime or not
  • Lab 8: Implement Extended Euclidean Algorithm (Display the results of iterations in tabular format)
  • Lab 9: Compute multiplicative inverse in given modulo n using Extended Euclidean Algorithm
  • Lab 10: Implement Hill Cipher (Key matrix of size 2*2)
  • Lab 11: Demonstrate how output of S-Box (S1) is generated in DES
  • Lab 12: Implement Robin Miller algorithm for primality test
  • Lab 13: Take any positive number and display the result after computing Totient value
  • Lab 14: Compute primitive roots of given number
  • Lab 15: Compute discrete log of given number (provided the modulo and primitive root)
  • Lab 16: Implement Diffie-Helman Key Exchange Algorithm
  • Lab 17: Implement RSA Algorithm (Encryption/Decryption/ Input Should be taken from user)
  • Lab 18: Implement Elgamal Cryptographic System
  • Lab 19: Malicious logic code (Trojan Horse/Virus) program that performs some malicious works

Was this helpful?

  1. 5th Semester

Cryptography

Previous5th SemesterNextDesign and Analysis of algorithms

Last updated 8 months ago

Was this helpful?

Programs

Note:

  1. Almost all the programs have Encryption followed by Decryption.

  2. Key is taken from the user.

Lab 1:

Lab 2:

Lab 3:

Lab 4:

Lab 5:

Lab 6:

Lab 7:

Lab 8:

Lab 9:

Lab 10:

Lab 11:

Lab 12:

Lab 13:

Lab 14:

Lab 15:

Lab 16:

Lab 17:

Lab 18:

Lab 19:

Implement Shift Cipher
Implement Playfair Cipher (display the key matrix as well)
Implement Rail Fence Cipher
Implement Vigenere Cipher
Implement Euclidean Algorithm to find GCD of given numbers
Compute additive inverse in given modulo n
Take two numbers and display whether they are relatively prime or not
Implement Extended Euclidean Algorithm (Display the results of iterations in tabular format)
Compute multiplicative inverse in given modulo n using Extended Euclidean Algorithm
Implement Hill Cipher (Key matrix of size 2*2)
Demonstrate how output of S-Box (S1) is generated in DES
Implement Robin Miller algorithm for primality test
Take any positive number and display the result after computing Totient value
Compute primitive roots of given number
Compute discrete log of given number (provided the modulo and primitive root)
Implement Diffie-Helman Key Exchange Algorithm
Implement RSA Algorithm (Encryption/Decryption/ Input Should be taken from user)
Implement Elgamal Cryptographic System
Malicious logic code (Trojan Horse/Virus) program that performs some malicious works