0% found this document useful (0 votes)
77 views1 page

b.com Vi Sem Cyber Security Lab Questions

Uploaded by

sridhar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
77 views1 page

b.com Vi Sem Cyber Security Lab Questions

Uploaded by

sridhar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

B.

COM VI SEM CYBER SECURITY EXTERNAL LAB


PROGRAMS

1.To implement the simple substitution technique named


Caesar cipher using C language.

2.To write a C program to implement the hill cipher


substitution techniques.

3. To implement the Vigenere C

4. To implement the Diffie-Hellman Key Exchange


algorithm using C language.

5.To implement the SHA-I hashing technique using C


program.

6.To write a C program to implement the signature


scheme named digital signature standard (Euclidean
Algorithm).

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy