Sei sulla pagina 1di 2

Prepared By: Monika Darji

Practical Questions for the exam on 18-12-2010:


You have to include all the Practical Questions and Code in your file as well. As your
assignment file, containing theory and practical questions will be evaluated on the same
day and internal marks will be given based on that.

1. Write a program that reads a text file, computes the MAC using HMACSHA1, and
transmits both the contents of the file and the MAC in plaintext to the receiver. The receiver
re-computes the MAC. If the transmitted and re-computed message digest turn to be same,
the receiver sends “Success” message to sender else sends “Failure” message to sender.
2. Write a program that reads a text file, computes the MAC using HMAC-MD5, and
transmits both the contents of the file and the MAC in plaintext to the receiver. The receiver
re-computes the MAC. If the transmitted and re-computed message digest turn to be same,
the receiver sends “Success” message to sender else sends “Failure” message to sender.
3. Write a program that reads a text file, computes the MAC using HMAC-SHA512,
and transmits both the contents of the file and the MAC in plaintext to the receiver. The
receiver re-computes the MAC. If the transmitted and re-computed message digest turn to be
same, the receiver sends “Success” message to sender else sends “Failure” message to
sender.
4. Write a Program that computes the SHA-1 message digest, and transmits both the
contents of the file and the message digest in plaintext to the receiver. The receiver re-
computes the message digest. If the transmitted and re-computed message digest turn to be
same, the receiver transmits “Success” message to sender else sends “Failure” message to
sender
5. Write a program where the sender reads a text file, computes the MD5 message
digest (MDC), and transmits both the contents of the file and the message digest to the
receiver. The receiver re-computes the message digest. If the transmitted and re-computed
message digest turn to be same, the receiver transmits “Success” message to sender else
sends “Failure” message to sender.
6. Demonstrate in practical how confidentiality can be achieved using RSA for a text
file.
7. Demonstrate in practical how authentication can be achieved using RSA for a text
file. (Hint: Use private key of sender to encrypt and public key of sender to decrypt)
8. Write a program to implement Diffie-Hellman Key Exchange.
9. Write a program in which a sender program encrypts a pre-defined text file using
DES algorithm in ECB mode and transmits the encrypted data to the receiver. The receiver
decrypts the data and stores the contents in a separate file. At the end of program execution,
the contents of the plaintext file at sender end and the decrypted file at receiver end should
match.
10. Write a program in which a sender program encrypts a pre-defined text file using
DES in CBC mode and transmits the encrypted data to the receiver. The receiver decrypts the
data and stores the contents in a separate file. At the end of program execution, the contents
of the plaintext file at sender end and the decrypted file at receiver end should match.
11. Write a program in which a sender program encrypts a pre-defined text file using
DES algorithm in CFM mode and transmits the encrypted data to the receiver. The receiver
decrypts the data and stores the contents in a separate file. At the end of program execution,

1
Prepared By: Monika Darji

the contents of the plaintext file at sender end and the decrypted file at receiver end should
match.
12. Write a program in which a sender program encrypts a pre-defined text file using
3DES algorithm in ECB mode and transmits the encrypted data to the receiver. The receiver
decrypts the data and stores the contents in a separate file. At the end of program execution,
the contents of the plaintext file at sender end and the decrypted file at receiver end should
match.
13. Write a program in which a sender program encrypts a pre-defined text file using
3DES algorithm in CBC mode and transmits the encrypted data to the receiver. The receiver
decrypts the data and stores the contents in a separate file. At the end of program execution,
the contents of the plaintext file at sender end and the decrypted file at receiver end should
match.
14. Write a program in which a sender program encrypts a pre-defined text file using
AES algorithm in CFM mode and transmits the encrypted data to the receiver. The receiver
decrypts the data and stores the contents in a separate file. At the end of program execution,
the contents of the plaintext file at sender end and the decrypted file at receiver end should
match.
15. Write a program in which a sender program encrypts a pre-defined text file using
AES algorithm in ECB mode and transmits the encrypted data to the receiver. The receiver
decrypts the data and stores the contents in a separate file. At the end of program execution,
the contents of the plaintext file at sender end and the decrypted file at receiver end should
match.
16. Write a program in which a sender program encrypts a pre-defined text file using
AES algorithm in CBC mode and transmits the encrypted data to the receiver. The receiver
decrypts the data and stores the contents in a separate file. At the end of program execution,
the contents of the plaintext file at sender end and the decrypted file at receiver end should
match.
17. Write a program in which a sender program encrypts a pre-defined text file using
AES algorithm in CFM mode and transmits the encrypted data to the receiver. The receiver
decrypts the data and stores the contents in a separate file. At the end of program execution,
the contents of the plaintext file at sender end and the decrypted file at receiver end should
match.
18. Write a program in which a sender program encrypts a pre-defined text file using
RC4 algorithm and transmits the encrypted data to the receiver. The receiver decrypts the
data and stores the contents in a separate file. At the end of program execution, the contents
of the plaintext file at sender end and the decrypted file at receiver end should match.
19. Implement a secure echo client server program where only confidentiality is required
using SSL.
20. Implement a secure daytime client server program where only confidentiality is
required using SSL.

Potrebbero piacerti anche