0% found this document useful (0 votes)
10 views25 pages

Cryptography Vanshdeep Lab File 2025

cry

Uploaded by

agcomputers1990
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views25 pages

Cryptography Vanshdeep Lab File 2025

cry

Uploaded by

agcomputers1990
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 25

DEPARTMENT OF COMPUTER ENGINEERING & APPLICATIONS

Institute of Engineering & Technology


Cryptography & Network Security Lab (BCSE-0071)

Name: Vanshdeep Mishra


Section: M (56)
University roll no.:2115001091
Course: B. Tech CS

Submitted to: Ms. Nirankita Debnath

1
INDEX
Serial No. Title

1. Write a program to implement Additive Cipher (Z26) with the following


conditions: Plaintext should be in lowercase, Ciphertext should be uppercase,
Brute force attack.

2. Write a program to implement Multiplicative Cipher: Plaintext should be in


lowercase, Ciphertext should be uppercase, Brute force attack.

3. Write a program to implement Affine Cipher: Plaintext should be in lowercase,


Ciphertext should be uppercase, Brute force attack.

4. Write a program in to implement Autokey Cipher: Plaintext should be in


lowercase, Ciphertext should be uppercase, Brute force attack.

5. Write a program to implement Playfair Cipher to encrypt & decrypt the given
message where the key matrix can be formed by using a given keyword.

6. Write a program to implement Hill Cipher to encrypt & decrypt the given message
by using a given key matrix. Show the values for key and its
corresponding key inverse values.

7. Write a program to implement Elgamal Cryptosystem to generate the pair of keys


and then show the encryption & decryption of a given message.

8. Write a program to implement Rabin Miller Primality Test to check whether given
number is prime or composite.

9. Write a program to implement Diffie-Hellman key exchange Algorithm to


exchange the symmetric key and show the encryption & decryption.

10. Write a program to implement RSA Algorithm to generate a pair of keys and show
the encryption and decryption by using a given key pair.

11. Write a program to implement Elgamal algorithm for implementing digital


signature.
12. Vigenere Cipher Encryption, Decryption, and Simplified Brute Force Analysis.

2
Experiment 1

Write a program to implement Additive Cipher (Z26) with the following conditions:

• Plaintext should be in lowercase.


• Ciphertext should be uppercase.
• Brute force attack.

Source Code:

Input & Output:

3
Experiment 2

Write a program to implement Multiplicative Cipher.

• Plaintext should be in lowercase.


• Ciphertext should be uppercase.
• Brute force attack.

Source Code:

4
Input & Output:

5
Experiment 3

Write a program to implement Affine Cipher.

• Plaintext should be in lowercase.


• Ciphertext should be uppercase.
• Brute force attack.

Source Code:

6
Input & Output:

7
Experiment 4

Write a program in to implement Autokey Cipher.

• Plaintext should be in lowercase.


• Ciphertext should be uppercase.
• Brute force attack.

Source Code:

Input & Output:

8
Experiment 5

Write a program to implement Playfair Cipher to encrypt & decrypt the given message where
the key matrix can be formed by using a given keyword.

Source Code:

9
10
Input & Output:

11
Experiment 6

Write a program to implement Hill Cipher to encrypt & decrypt the given message by using a
given key matrix. Show the values for key and its corresponding key inverse values.
Source Code:

12
13
Input & Output:

14
Experiment 7

Write a program to implement Elgamal Cryptosystem to generate the pair of keys and then
show the encryption & decryption of a given message.

Source Code:

15
Input & Output:

16
Experiment 8

Write a program to implement Rabin Miller Primality Test to check whether given number is
prime or composite.
Source Code:

17
Input & Output:

18
Experiment 9

Write a program to implement Diffie-Hellman key exchange Algorithm to exchange the


symmetric key and show the encryption & decryption.

Source Code:

Input & Output:

19
Experiment 10

Write a program to implement RSA Algorithm to generate a pair of keys and show the
encryption and decryption by using a given key pair.

Source Code:

20
Input & Output:

21
Experiment 11

Write a program to implement Elgamal algorithm for implementing digital signature.


Source Code:

Input & Output:

22
Experiment 12
Vigenere Cipher Encryption, Decryption, and Simplified Brute Force Analysis.
Source Code:

23
Input & Output:

24
25

You might also like