These are the question which enhance the topic of cryptography....!
- Perform encryption, decryption using the following substitution techniques (i) Ceaser cipher, (ii) Playfair cipher iii) Hill Cipher iv) Vigenere cipher
- Perform encryption and decryption using following transposition techniques i) Rail fence ii) row & Column Transformation
- Apply DES algorithm for practical applications.
- Apply AES algorithm for practical applications.
- Implement RSA Algorithm using HTML and JavaScript
- Implement the Diffie-Hellman Key Exchange algorithm for a given problem.
- Calculate the message digest of a text using the SHA-1 algorithm.
- Implement the SIGNATURE SCHEME – Digital Signature Standard.
- Demonstrate intrusion detection system (ids) using any tool eg. Snort or any other s/w.
- Automated Attack and Penetration Tools Exploring N-Stalker, a Vulnerability Assessment Tool
- Defeating Malware i) Building Trojans ii) Rootkit Hunter