The following example implements Diffie Helman Exchange Algorithm. Click here to download the PDF File
The Following example explains Implement Advance Encryption Standard.
The Following example explains about DES(Data Encryption Standard)Algorithm and how to implement it. Click here to download the PDF
Mono-Alphabetic cipher also known relies on a fixed replacement structure. In this technique each alphabet in the plain text...
The Poly-Alphabetic cipher is also an example of substitution cipher which uses multiple one-character keys. In the program we...
Click Here to download the PDF
In transposition cipher the alphabets of the plain text are rearranged in a different & usually quite complex...
Simple columnar transposition technique is an example of transposition technique. Steps for Simple columnar transposition technique are as follow....
Multiple columnar transposition technique (i.e simple columnar with multiple rounds) To improve basic Simple columnar transposition technique, we can...
Rail fence cipher The rail-fence technique is an example of transposition technique. It uses a simple algorithm. Steps...
Green Computing Book
C++ Interview Questions
- Advance Java (15)
- Advance Sql (8)
- ASP.NET with C# (16)
- Computer Graphics (3)
- Cyber Law (22)
- Digital Electronics 16-17 (2)
- Fybscit Semester 1 (1)
- FYBSCIT Semester 1 Question Bank (2)
- Fybscit Semester 2 (1)
- Imperative Programming (6)
- Linux Administration (3)
- Unit 1 (3)
- Network Security (33)
- News (40)
- Posts (1)
- Professional Communication Skills (2)
- Project (1)
- Project Management (1)
- Software Testing (1)
- Tybscit Question Papers (11)
- TYBSCIT Semester 5 Question Paper and Solution November 2017 (C75:25)
- TYBSCIT Semester 5 Exam Dates of October 2017 CBSGS 75:25 Postponed
- Tybscit Semester 5 Question Paper & Solutions November 2016 (75:25)
- FYBSCIT Semester 1 Question Paper & Solutions – October 2016 (75:25)
- FYBSCIT Semester 2 Question Paper & Solutions – March 2017