ABC
1
Students group for NIS SLA
2
ActivityEnrollment NumberStudents Name
3
Implement communication system using steganography. Encrypt image and message using any cryptography technique.23410360001PATIL HIMANSHU SATTENDRA
4
23410360111KADU SUJAL PRAMOD
5
23410360121ZADE SHREYASH VIJAY
6
23410360123KHULE BHARGAV DASHRATH
7
User A wants to send message to user B securely on network.
i.Select any two techniques to encrypt message and Implement both the techniques.
ii.Evaluate result of implementation and Compare complexity of both techniques.
iii.Prepare report
23410360112SAPKAL ISHWARI CHHATRAPATI
8
23410360113NANNAVARE UNNATI GAJANAN
9
23410360116BHUMIKA POPAT
10
23410360117LANDGE DEVASHRI AKHIL
11
Performance evaluation of Transposition techniques (Simple columnar and Rail Fence technique)
Implement simple Columnar Transposition encryption technique to perform encryption of text using C
23410360118GANVIR SHRADDHA BABAN
12
23410360119AWARE ISHWARI SANDIPRAO
13
23410360120DANDGE VAISHNAVI VINOD
14
23410360122MEHARE JANHAVI RAJESH
15
Prepare admin level report of company who wants to implement allocate fixed system to each employee for authentic access to maintain security
i.Explain various single level authentication method available to access the system.
ii.Apply the weakness and security threats to this problem.
iii.Suggest multi factor authentication for given problem situation.
iv.Compare impact of single and multi-factor authentication on given situation.
23410360125MASKE PREM SURYAKANT
16
23410360127GEDAM UTKARSH ANIL
17
23410360135MANIYAR MEET NILESH
18
23410360137GAWANDE ATHARV DEEPAK
19
Explain the role of digital signatures in verifying authenticity and integrity in a communication system.23410360126KULKARNI VAISHALI SHRIKANT
20
23410360124MALTE TANVI KISHOR
21
23410360128KUCHE SHRAVANI SHYAM
22
23410360129DANDALE SANIKA GOPAL
23
Report on Cloud security: Essential characteristics, service model, deployment model, cloud specific security threats23410360131SAGAR SAYALI BHARAT
24
23410360132AGRAWAL NIDHI SANDEEP
25
23410360134GAWANDE SANCHITA HEMRAJ
26
23410360139IKHAR SUHANI SANTOSHRAO
27
Implement Client/Server communication using cryptography tools in laboratory23410360140GHAYAR ARPITA SANJAY
28
23410360141LOMATE VAISHNAVI PRAVIN
29
23410360142INGALE DIVYA GOPAL
30
23410360143DHONDE SHRAVANI RAVINDRA
31
Prepare a report on substitution cipher techniques23410360145DESHMUKH DNYANESHWARI A
32
24410360113RATHOD PRANALI SUHAS
33
23410360148DESHMUKH ANUSHKA VINOD
34
23410360149WANKHADE SHRUTIKA P
35
"Encrypt the message ""HELLO PDPOLY"" using a Caesar Cipher with a shift of 3.
Write a C program to implement caesar cipher technique to perform encryption and decryption of text"
24410360114CHAVHAN SURAJ OMPRAKASH
36
23410360147MOHAMMED FAIZAN SHAIKH FARID
37
23410360150NIMBHORKAR SHRAVAN DIPAKRAO
38
23410360155FUKTE SAKSHAM PRAVIN
39
Compare and contrast DAC, MAC, and RBAC in terms of security, flexibility, and ease of use.23410360152NAGAPURE GEETA DIPAKRAO
40
23410360153SAWANT KAJAL SHRINIVAS
41
23410360154JAWANJAL VEDIKA ASHOK
42
23410360156JAMATHE AACHAL KISHOR
43
Describe algorithms for symmetric and asymmetric cryptography.23410360157BOBADE MONAL ANIL
44
23410360160TARAS SAMPADA SUDAM
45
23410360162DATE VAIDEHI RAVIKIRAN
46
23410360165AJMIRE PRATIKSHA PRASHANT
47
Explain the difference between active and passive security attacks. Provide examples of each.23410360158WADATKAR SHUBHAM KISHOR
48
23410360159MANDALE ROSHAN ATUL
49
23410360161NANOTE BHAVESH DINESH
50
23410360163MUNDANE HIMANSHU SANJAY
51
23410360166BHORKHADE DARSHAN SANTOSH
52
Write a detailed report on Diffie-Hellman key exchange algorithm, Implementation, application in cryptography. Man-in- middle attack
Write a C program to implement Diffie-Hellman key exchange algorithm to perform encryption of text
23410360169THAKARE SWANANDI PRAMOD
53
23410360170KALE VAISHNAVI SHAM
54
23410360178MAMARDE RIYA PRASHANT
55
23410360174SOLAV ISHWARI RATNAKAR
56
Illustrate the use of cryptography in securing email communication.23410360167WAGHADE KRISHNAV DINESH
57
23410360172TEKADE HIMANSHU SHRIKANT
58
23410360174BHEDEKAR MANTHAN SHARAD
59
23410360176RAJURKAR AMAN DIVAKAR
60
23410360177ANASANE CHAITANYA SANTOSHRAO
61
Create Digital Certificate using any suitable application23411990116MASAND KRISH ANILKUMAR
62
24410360116TIKHILE OM PRASHANT
63
24410360117RAUL SIDDHESH SHAILESH
64
24410360118MOHURAT RISHIKESH
65
Implement communication system using steganography. Encrypt audio file and message using any cryptography technique.23410360180DANDGE BHUMIKA SANJAY
66
23410360269BAITULE ABOLI NIDHINATH
67
24410360115GANVIR KANGNA SUDHIR
68
2200240076CHEDE GUNJAN