These are the lab assignments performed during the course of cryptography
- 
WAP in python to implement client and server communication.
 - 
WAP in python to implement Euclidean algorithm to find the GCD.
 - 
WAP in python to implement extended Euclidean algorithm to find the GCD along with s and t values.
 - 
WAP in python to find out the additive and multiplicative inverse pairs of set Zn.
 - 
WAP in python to find out the additive and multiplicative inverse of an integer b using extended Euclidean algorithmof set Zn.
 
- 
WAP to find the solutions of equations:
a.14x=12mod 18b.3x+4=6 mod 132. - 
WAP to implement Additive cipher(key=20), Multiplicative cipher(key=15)and affine cipher(key=15,20). To encrypt the message “this is an exercise”.
 - 
WAP to perform brute force attack on the cipher text“dvvkzecfssprkkve”.
 - 
WAP to perform brute force attack on the cipher text “YMJHFJXFWHNUMJWNXTSJTKYMJJFWQNJXYPSTBSFSIXNRUQJXYHNUMJWX”
 - 
WAP to use brute force attack to decipher the message :Assume Affine cipher is used and “ab” is encrypted by “GL”.
 - 
WAP to perform statistical attack on the ciphertext:
 
ymnxhtzwxjfnrxytuwtanijdtzbnymijyfnqjipstbqjiljtknrutwyfsyyjhmstqtlnjxfsifuuqnhfyntsymfyfwjzxjinsymjnsyjwsjyizjytymjgwtfisfyzwjtkymnxknjqiymjhtzwxjhtajwxtsqdxjqjhyjiytunhxkthzxxnslknwxytsxtrjfiafshjiytunhxnsnsyjwsjyyjhmstqtlnjxjlbnwjqjxxqfsxrtgnqjnsyjwsjyrzqynhfxyfsiymjsfxjqjhyntstkhzwwjsyfsisjcyljsjwfyntsfuuqnhfyntsxfsixjwanhjxjluunuyaatnudtzbnqqqjfwsmtbymjnsyjwsjybtwpxfsimtbxjwanhjxfsifuuqnhfyntsxfwjuwtanijiytzxjwxtkymjnsyjwsjyymnxpstbqjiljbnqqmjqudtz
- WAP to perform statistical and pattern attack over the ciphertext:
 
ziolegxkltqodlzgofzkgrxetngxzgzithkofeohstlqfrzteifojxtlgyltexkofuegdhxztklqfregdhxztkftzvgkalvoziygexlgfofztkftzltexkoznzitegxkltoltyytezoctsnlhsozofzgzvghqkzlyoklzofzkgrxeofuzitzitgkngyeknhzgukqhinofesxrofuigvdqfnesqlloeqsqfrhghxsqkqsugkozidlvgkaturtlklqrouozqsloufqzxktlqfrltegfrhkgcorofurtzqoslgyktqsofztkftzltexkoznhkgzgegslqsugkozidlqfrziktqzltuohltecokxltlyoktvqsslitfetngxvossstqkfwgzizitgktzoeqsqlhtezlgyegdhxztkqfrftzvgkaltexkoznqlvtssqligvziqzzitgknolqhhsotrofzitofztkftzziolafgvstrutvossitshngxofrtloufofuqfrrtctsghofultexktqhhsoeqzogflqfrftzvgkahkgzgegslqlvtssqlwxosrofultexktftzvgkal
- 
Generate the cipher text of the plain text “we are discovered, save yourself” using playfair cipher.
 - 
Generate the cipher text of the plain text “PL AY FA IR ME SS AG E” using playfair cipher and the secret key is “COMMONLOUNGE”.
 - 
WAP to encrypt the message “She is listening” using the 6-character keyword “PASCAL” with Vigenere cipher.
 - 
WAP to perform cryptanalysis over ciphertext “fupcmtgzkyukbqfjhuktzkkixtta” using hill cipher.
 
- 
Alice needs to send the message “Enemy attacks tonight” to Bob.They agreed to use keyed transposition cipher with key value:31452. Implement double transpositioncipher over it and generate the ciphertext.
 - 
Create a key stream with linear feedback shift register with 4 cells in whichb4= b1 exor b0 Show the value of output for 20 transitions(if the seed is 0001).
 - 
Write a code to encrypt a message A Midsummer Night's Dream, which is a comedy written by Shakespeare.You have to use key: SWINDONand keyed transpositioncipher row-column.
 - 
Findthe result of multiplying P1=000100110and P2=10011110 with irreducible polynomial100011010(nine bits).
 
- 
Implement DES Algorithm by using the helping PDF.
 - 
Implement AES Algorithm by using the helping PDF.
 - 
Implement a client and a server on different computers. Perform the communication between these two entities by using RSA cryptosystem. (Client.ipynb and Server.ipynb)
 - 
Implement a client and a server on different computers. Perform the authentication of senderbetween these two entities by using RSA digital signature cryptosystem. (UDPClient.ipynb and UPDServer.ipynb)
 
- Write a program to implement Chinese Remainder Theorem.