| A | B | C | |
|---|---|---|---|
1 | Students group for NIS SLA | ||
2 | Activity | Enrollment Number | Students Name |
3 | Implement communication system using steganography. Encrypt image and message using any cryptography technique. | 23410360001 | PATIL HIMANSHU SATTENDRA |
4 | 23410360111 | KADU SUJAL PRAMOD | |
5 | 23410360121 | ZADE SHREYASH VIJAY | |
6 | 23410360123 | KHULE BHARGAV DASHRATH | |
7 | User A wants to send message to user B securely on network. i.Select any two techniques to encrypt message and Implement both the techniques. ii.Evaluate result of implementation and Compare complexity of both techniques. iii.Prepare report | 23410360112 | SAPKAL ISHWARI CHHATRAPATI |
8 | 23410360113 | NANNAVARE UNNATI GAJANAN | |
9 | 23410360116 | BHUMIKA POPAT | |
10 | 23410360117 | LANDGE DEVASHRI AKHIL | |
11 | Performance evaluation of Transposition techniques (Simple columnar and Rail Fence technique) Implement simple Columnar Transposition encryption technique to perform encryption of text using C | 23410360118 | GANVIR SHRADDHA BABAN |
12 | 23410360119 | AWARE ISHWARI SANDIPRAO | |
13 | 23410360120 | DANDGE VAISHNAVI VINOD | |
14 | 23410360122 | MEHARE JANHAVI RAJESH | |
15 | Prepare admin level report of company who wants to implement allocate fixed system to each employee for authentic access to maintain security i.Explain various single level authentication method available to access the system. ii.Apply the weakness and security threats to this problem. iii.Suggest multi factor authentication for given problem situation. iv.Compare impact of single and multi-factor authentication on given situation. | 23410360125 | MASKE PREM SURYAKANT |
16 | 23410360127 | GEDAM UTKARSH ANIL | |
17 | 23410360135 | MANIYAR MEET NILESH | |
18 | 23410360137 | GAWANDE ATHARV DEEPAK | |
19 | Explain the role of digital signatures in verifying authenticity and integrity in a communication system. | 23410360126 | KULKARNI VAISHALI SHRIKANT |
20 | 23410360124 | MALTE TANVI KISHOR | |
21 | 23410360128 | KUCHE SHRAVANI SHYAM | |
22 | 23410360129 | DANDALE SANIKA GOPAL | |
23 | Report on Cloud security: Essential characteristics, service model, deployment model, cloud specific security threats | 23410360131 | SAGAR SAYALI BHARAT |
24 | 23410360132 | AGRAWAL NIDHI SANDEEP | |
25 | 23410360134 | GAWANDE SANCHITA HEMRAJ | |
26 | 23410360139 | IKHAR SUHANI SANTOSHRAO | |
27 | Implement Client/Server communication using cryptography tools in laboratory | 23410360140 | GHAYAR ARPITA SANJAY |
28 | 23410360141 | LOMATE VAISHNAVI PRAVIN | |
29 | 23410360142 | INGALE DIVYA GOPAL | |
30 | 23410360143 | DHONDE SHRAVANI RAVINDRA | |
31 | Prepare a report on substitution cipher techniques | 23410360145 | DESHMUKH DNYANESHWARI A |
32 | 24410360113 | RATHOD PRANALI SUHAS | |
33 | 23410360148 | DESHMUKH ANUSHKA VINOD | |
34 | 23410360149 | WANKHADE SHRUTIKA P | |
35 | "Encrypt the message ""HELLO PDPOLY"" using a Caesar Cipher with a shift of 3. Write a C program to implement caesar cipher technique to perform encryption and decryption of text" | 24410360114 | CHAVHAN SURAJ OMPRAKASH |
36 | 23410360147 | MOHAMMED FAIZAN SHAIKH FARID | |
37 | 23410360150 | NIMBHORKAR SHRAVAN DIPAKRAO | |
38 | 23410360155 | FUKTE SAKSHAM PRAVIN | |
39 | Compare and contrast DAC, MAC, and RBAC in terms of security, flexibility, and ease of use. | 23410360152 | NAGAPURE GEETA DIPAKRAO |
40 | 23410360153 | SAWANT KAJAL SHRINIVAS | |
41 | 23410360154 | JAWANJAL VEDIKA ASHOK | |
42 | 23410360156 | JAMATHE AACHAL KISHOR | |
43 | Describe algorithms for symmetric and asymmetric cryptography. | 23410360157 | BOBADE MONAL ANIL |
44 | 23410360160 | TARAS SAMPADA SUDAM | |
45 | 23410360162 | DATE VAIDEHI RAVIKIRAN | |
46 | 23410360165 | AJMIRE PRATIKSHA PRASHANT | |
47 | Explain the difference between active and passive security attacks. Provide examples of each. | 23410360158 | WADATKAR SHUBHAM KISHOR |
48 | 23410360159 | MANDALE ROSHAN ATUL | |
49 | 23410360161 | NANOTE BHAVESH DINESH | |
50 | 23410360163 | MUNDANE HIMANSHU SANJAY | |
51 | 23410360166 | BHORKHADE DARSHAN SANTOSH | |
52 | Write a detailed report on Diffie-Hellman key exchange algorithm, Implementation, application in cryptography. Man-in- middle attack Write a C program to implement Diffie-Hellman key exchange algorithm to perform encryption of text | 23410360169 | THAKARE SWANANDI PRAMOD |
53 | 23410360170 | KALE VAISHNAVI SHAM | |
54 | 23410360178 | MAMARDE RIYA PRASHANT | |
55 | 23410360174 | SOLAV ISHWARI RATNAKAR | |
56 | Illustrate the use of cryptography in securing email communication. | 23410360167 | WAGHADE KRISHNAV DINESH |
57 | 23410360172 | TEKADE HIMANSHU SHRIKANT | |
58 | 23410360174 | BHEDEKAR MANTHAN SHARAD | |
59 | 23410360176 | RAJURKAR AMAN DIVAKAR | |
60 | 23410360177 | ANASANE CHAITANYA SANTOSHRAO | |
61 | Create Digital Certificate using any suitable application | 23411990116 | MASAND KRISH ANILKUMAR |
62 | 24410360116 | TIKHILE OM PRASHANT | |
63 | 24410360117 | RAUL SIDDHESH SHAILESH | |
64 | 24410360118 | MOHURAT RISHIKESH | |
65 | Implement communication system using steganography. Encrypt audio file and message using any cryptography technique. | 23410360180 | DANDGE BHUMIKA SANJAY |
66 | 23410360269 | BAITULE ABOLI NIDHINATH | |
67 | 24410360115 | GANVIR KANGNA SUDHIR | |
68 | 2200240076 | CHEDE GUNJAN | |