Cryptography Programs Note: Almost all the programs have Encryption followed by Decryption. Key is taken from the user. Lab 1: Implement Shift Cipher Lab 2: Implement Playfair Cipher (display the key matrix as well) Lab 3: Implement Rail Fence Cipher Lab 4: Implement Vigenere Cipher Lab 5: Implement Euclidean Algorithm to find GCD of given numbers Lab 6: Compute additive inverse in given modulo n Lab 7: Take two numbers and display whether they are relatively prime or not Lab 8: Implement Extended Euclidean Algorithm (Display the results of iterations in tabular format) Lab 9: Compute multiplicative inverse in given modulo n using Extended Euclidean Algorithm Lab 10: Implement Hill Cipher (Key matrix of size 2*2) Lab 11: Demonstrate how output of S-Box (S1) is generated in DES Lab 12: Implement Robin Miller algorithm for primality test Lab 13: Take any positive number and display the result after computing Totient value Lab 14: Compute primitive roots of given number Lab 15: Compute discrete log of given number (provided the modulo and primitive root) Lab 16: Implement Diffie-Helman Key Exchange Algorithm Lab 17: Implement RSA Algorithm (Encryption/Decryption/ Input Should be taken from user) Lab 18: Implement Elgamal Cryptographic System Lab 19: Malicious logic code (Trojan Horse/Virus) program that performs some malicious works