CRYPTOGRAPHY VIRTUAL LAB

1. Caesar Cipher Encryption

Aim: To implement and demonstrate the process of encrypting plaintext messages using the Caesar Cipher technique, where each letter is shifted by a fixed number of positions in the alphabet.

2. Caesar Cipher Decryption

Aim: To implement and demonstrate the process of decrypting Caesar Cipher encrypted messages by applying the reverse shift operation to recover the original plaintext.

3. Vigenère Cipher Encryption

Aim: To implement and demonstrate the process of encrypting messages using the Vigenère Cipher, where each letter is encrypted using a different shift based on a repeating keyword.

4. Vigenère Cipher Decryption

Aim: To implement and demonstrate the process of decrypting Vigenère Cipher encrypted messages by applying the reverse shifts using the same keyword to recover the original text.

5. Playfair Cipher Grid Setup

Aim: To implement and demonstrate the creation of a 5x5 Playfair Cipher grid using a keyword, including handling of the alphabet, special characters, and grid generation rules.

6. Monoalphabetic Cipher

Aim: To implement and demonstrate a monoalphabetic substitution cipher where each letter in the plaintext is replaced with a unique letter from a scrambled alphabet to create the ciphertext.

7. XOR Cipher

Aim: To implement and demonstrate the XOR cipher encryption process, where each character of the plaintext is combined with a key using the XOR operation to produce the ciphertext.

8. Hash Function Simulator (SHA-256)

Aim: To implement and demonstrate the SHA-256 hashing algorithm, showing how it processes input data through multiple rounds of compression to generate a 256-bit hash value.

9. Diffie-Hellman Key Exchange (Visualization)

Aim: To create an interactive visualization of the Diffie-Hellman key exchange process, demonstrating how two parties can securely establish a shared secret key through public channel communication.

10. Frequency Analysis Attack

Aim: To implement and demonstrate frequency analysis techniques for breaking substitution ciphers by analyzing and comparing the frequency distribution of letters in encrypted text with standard English letter frequencies.





Back to Home