{"id":5232,"date":"2018-01-20T08:57:05","date_gmt":"2018-01-20T08:57:05","guid":{"rendered":"http:\/\/www.inspirenignite.com\/jntuh\/?p=5232"},"modified":"2019-07-15T08:59:56","modified_gmt":"2019-07-15T08:59:56","slug":"jntuh-b-tech-2016-2017-r16-detailed-syllabus-cryptography-network-security-lab","status":"publish","type":"post","link":"https:\/\/www.inspirenignite.com\/jntuh\/jntuh-b-tech-2016-2017-r16-detailed-syllabus-cryptography-network-security-lab\/","title":{"rendered":"JNTUH B.Tech 2016-2017 (R16) Detailed Syllabus Cryptography and Network Security Lab"},"content":{"rendered":"<p>Cryptography and Network Security Lab Detailed Syllabus for B.Tech third year second sem is covered here. This gives the details about credits, number of hours and other details along with reference books for the course.<\/p>\n<p>The detailed syllabus for Cryptography and Network Security Lab B.Tech 2016-2017 (R16) third year second sem is as follows.<\/p>\n<p>B.Tech. III Year II Sem. \u00a0 \u00a0 \u00a0L\/T\/P\/C<br \/>\nCourse Code:CS604PC \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 0\/0\/3\/2<\/p>\n<ol>\n<li>Write a C program that contains a string (char pointer) with a value \u2018Hello world\u2019.\u00a0The program should XOR each character in this string with 0 and displays the result.<\/li>\n<li>Write a C program that contains a string (char pointer) with a value \u2018Hello world\u2019.\u00a0The program should AND or and XOR each character in this string with 127 and\u00a0display the result.<\/li>\n<li>Write a Java program to perform encryption and decryption using the following\u00a0algorithms<br \/>\na. Ceaser cipher b. Substitution cipher c. Hill Cipher<\/li>\n<li>Write a C\/JAVA program to implement the DES algorithm logic.<\/li>\n<li>Write a C\/JAVA program to implement the Blowfish algorithm logic.<\/li>\n<li>Write a C\/JAVA program to implement the Rijndael algorithm logic.<\/li>\n<li>Write the RC4 logic in Java Using Java cryptography; encrypt the text \u201cHello world\u201d\u00a0using Blowfish. Create your own key using Java key tool.<\/li>\n<li>Write a Java program to implement RSA algorithm.<\/li>\n<\/ol>\n<p style=\"text-align: center\"><a href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" target=\"_blank\" rel=\"noopener\"><strong><span style=\"color: #ff0000\">Download iStudy Android App for complete JNTUH syllabus, results, timetables and all other updates. There are no ads and no pdfs and will make your life way easier<\/span>.<\/strong><\/a><\/p>\n<p>For all other B.Tech 3rd Year 2nd Sem syllabus go to <a href=\"https:\/\/www.inspirenignite.com\/jntuh\/jntuh-third-year-second-sem-information-technology-course-structure-2016-2017-r16-batch\/\">JNTUH B.Tech Information Technology 3rd\u00a0Year 2nd Sem Course Structure for (R16) Batch.<\/a><\/p>\n<p>All details and yearly new syllabus will be updated here time to time. Subscribe, like us on facebook and follow us on google plus for all updates.<\/p>\n<p>Do share with friends and in case of questions please feel free drop a comment.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cryptography and Network Security Lab Detailed Syllabus for B.Tech third year second sem is covered here. This gives the details about credits, number of hours and other details along with [&hellip;]<\/p>\n","protected":false},"author":2259,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"categories":[62],"tags":[],"class_list":["post-5232","post","type-post","status-publish","format-standard","hentry","category-syllabus"],"_links":{"self":[{"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/posts\/5232","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/users\/2259"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/comments?post=5232"}],"version-history":[{"count":2,"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/posts\/5232\/revisions"}],"predecessor-version":[{"id":18472,"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/posts\/5232\/revisions\/18472"}],"wp:attachment":[{"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/media?parent=5232"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/categories?post=5232"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/tags?post=5232"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}