0% found this document useful (0 votes)
58 views4 pages

Da Ii

The document contains a list of 60 register numbers and their corresponding cyber security implementation or penetration testing topics. The topics include various cryptographic algorithms, encryption modes, hashing functions, cyber attacks, and network security tools.

Uploaded by

Eshwar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
58 views4 pages

Da Ii

The document contains a list of 60 register numbers and their corresponding cyber security implementation or penetration testing topics. The topics include various cryptographic algorithms, encryption modes, hashing functions, cyber attacks, and network security tools.

Uploaded by

Eshwar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
You are on page 1/ 4

S.

No REGISTER NO
1 20BCE1004
2 20BCE1144
3 20BCE1172
4 20BCE1187
5 20BCE1241
6 20BCE1242
7 20BCE1257
8 20BCE1273
9 20BCE1309
10 20BCE1310
11 20BCE1369
12 20BCE1374
13 20BCE1395
14 20BCE1422
15 20BCE1440
16 20BCE1462
17 20BCE1464
18 20BCE1465
19 20BCE1472
20 20BCE1490
21 20BCE1511
22 20BCE1515
23 20BCE1516
24 20BCE1523
25 20BCE1533
26 20BCE1537
27 20BCE1566
28 20BCE1580
29 20BCE1581
30 20BCE1590
31 20BCE1591
32 20BCE1594
33 20BCE1604
34 20BCE1605
35 20BCE1606
36 20BCE1629
37 20BCE1634
38 20BCE1643
39 20BCE1645
40 20BCE1685
41 20BCE1686
42 20BCE1694
43 20BCE1701
44 20BCE1714
45 20BCE1719
46 20BCE1722
47 20BCE1759
48 20BCE1780
49 20BCE1791
50 20BCE1795
51 20BCE1806
52 20BCE1814
53 20BCE1835
54 20BCE1846
55 20BCE1874
56 20BCE1881
57 20BCE1930
58 20BCE1963
59 20BCE1980
60 20BCE1988
Demonstration and report submission
Implementation of CBC mode
SQL injection
Implementation of OFB mode
XSS attack
Packet analysis using wireshark
Implementation of CFB mode
Phishing attack
DNS attack
Implementation of Counter mode
IP spoofing
Any one PEN test tool
MAC generation using secret vale
Implementation of ECB mode
NS2/NS3 - packet transmission
MAC generation and authentication
CISCO packet tracer - building secure Smart home
Implementation of 64-bit DES
Burp suite
Implementation of MD-5
Nmap
Implementation of Playfair followed by Hill cipher
NIKTO
Implementation of AES
Implementation of Hill cipher
Implementation od Digital signature standard algorithm
Implementation of RSA
Acunetix
Implementation of HMAC
Keyloggers
Implementation of IDEA
Implemenation of Rail fence followed by Playfair ciphre
Implemenation of Rotor machine
Implementation of SHA-512
Steganography with water marking
Implementation of Transposition cipher followed by Rail fence
Implemenatation of S-DES followed by Ceasar cipher
Implementation of Diffie-Hellman Key exchange
Session hijacking
Implemnetation of Vernam cipher followed by ceasar cipher
Implementation of RC-4
Implementation of Publickey cryptosystem with Authentication and secrecy
Implementation of MITM attack
Implementaion of Hash function for message authentication
Implementation of Elgamal Cryptosystem
Digital Signatures
Implementation of SHA-3
Implementation of Blowfish
Implementation of public key encryption - Confidentiality, authentication and signatures
Implementation of Message authentication - Authentication tied to ciphertext
Implementation of Brute force attack
Implementation of Elliptic curve cryptosystem
IMplementation of Passphrased symmetric key
Implementation of DAA
Implementation of CMAC
Implementation of Public key distribution using symmetric keys
Implementation of triple DES
Implementation of Public key authority method
Implementation of Public key certificate method
Implementation of KDC
Implementtaion of Triple DES

You might also like