0% found this document useful (0 votes)
11 views1 page

cCb3411 - Lab QP

The document outlines the practical examination for the Cryptography and Cyber Security Laboratory at SSM Institute of Engineering and Technology for April 2025. It includes a list of programming tasks related to various encryption and decryption techniques, such as Caesar Cipher, AES, and RSA, along with a marking scheme. The examination is structured to assess students' understanding of cryptographic algorithms and their implementation skills.

Uploaded by

ssmcsesudhakar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views1 page

cCb3411 - Lab QP

The document outlines the practical examination for the Cryptography and Cyber Security Laboratory at SSM Institute of Engineering and Technology for April 2025. It includes a list of programming tasks related to various encryption and decryption techniques, such as Caesar Cipher, AES, and RSA, along with a marking scheme. The examination is structured to assess students' understanding of cryptographic algorithms and their implementation skills.

Uploaded by

ssmcsesudhakar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

SSM INSTITUTE OF ENGINEERING AND TECHNOLOGY

(An Autonomous Institution)


Approved by AICTE, New Delhi / Affiliated to Anna University, Chennai / Accredited by NAAC)
Dindigul – Palani Highway, Dindigul – 624 002
Department of Computer Science and Engineering (Cybersecurity)
CB3411 CRYPTOGRAPHY AND CYBER SECURITY LABORATORY

ANNA UNIVERSITY MODEL PRACTICAL EXAMINATION – APRIL 2025

Date:

1. Write a program to implement the Caesar Cipher encryption and decryption


techniques.
2. Write a program to implement the Playfair Cipher encryption and decryption
techniques.
3. Write a program to implement the Hill Cipher encryption and decryption techniques.
4. Write a program to implement the Rail Fence Cipher encryption and decryption
techniques.
5. Write a program to implement the Row & Column Transformation Cipher encryption
and decryption techniques.
6. Write a program to implement the Data Encryption Standard (DES) algorithm.
7. Develop a program to implement the AES encryption and decryption.
8. Implement the RSA algorithm. Generate public and private keys, and perform
encryption and decryption for a given message.
9. Write a program to simulate the Diffie-Hellman key exchange between alice and bob.
Show how a shared secret key is derived.
10. Write a program to calculate the message digest of a text using SHA-1
Algorithm.
11. Write a program to calculate the message digest of a text using MD5
Algorithm.
12. Implement the Digital Signature Standard (DSS). Accept a message, generate
a signature, and verify it.

MARK SPLITUP

Aim & Program


Output (20) Result (10) Viva (10) Total (100)
Algorithm(20) code(40)

Faculty In-Charge HoD/CSE (Cybersecurity)

You might also like