Академический Документы
Профессиональный Документы
Культура Документы
1. a.)Caesar Cipher
b.)Playfair Cipher
c.)Hill Cipher
d.)Vigenere Cipher
e.)Rail fence – Row & Column Transformation
Implement the following algorithms
a) DES
b) RSA Algorithm
2.
c) Diffiee-Hellman
d) MD5
e) SHA-1
All students must observe the Dress Code while in the laboratory.
Sandals or open-toed shoes are NOT allowed.
The lab timetable must be strictly followed. Prior permission from the Lab Supervisor
must be obtained if any change is to be made.
Respect the laboratory and its other users. Noise must be kept to a minimum.
All students are liable for any damage to equipment due to their own negligence.
All equipment, apparatus and chairs must be RETURNED to their original place after
use.
Students are strictly PROHIBITED from taking out any items from the laboratory
without permission from the Lab Supervisor.
Please consult the Lab Supervisor if you are not sure how to operate the laboratory
equipment.
Report immediately to the Lab Supervisor any damages to equipment, hazards, and
potential hazards.
Please refer to the Lab Supervisor should there be any concerns regarding the
laboratory.
Please check the laboratory notice board regularly for any updates and
announcements.
COMPUTER RULES
Students must promptly relinquish from their work for scheduled classes or upon
requested by Laboratory Supervisor.
AIM:
CODING:
a) DES
b) RSA Algorithm
c) Diffiee-Hellman
d) MD5
e) SHA-1
AIM:
CODING:
AIM:
CODING:
AIM:
CODING:
AIM:
CODING:
AIM:
CODING:
AIM:
CODING:
AIM:
CODING: