0% found this document useful (0 votes)
4 views1 page

Security Lab

The document outlines the objectives and exercises for a security laboratory course focused on various cipher techniques and network security tools. Students will learn to implement algorithms such as DES, RSA, MD5, and SHA-1, and engage in practical exercises including encryption methods and vulnerability assessments. Course outcomes include developing cryptosystems, authentication algorithms, and demonstrating network security systems using open-source tools.

Uploaded by

egneswari1112
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views1 page

Security Lab

The document outlines the objectives and exercises for a security laboratory course focused on various cipher techniques and network security tools. Students will learn to implement algorithms such as DES, RSA, MD5, and SHA-1, and engage in practical exercises including encryption methods and vulnerability assessments. Course outcomes include developing cryptosystems, authentication algorithms, and demonstrating network security systems using open-source tools.

Uploaded by

egneswari1112
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

PUCS7PL07 SECURITY LABORATORY LTPC

0042
COURSE OBJECTIVE
 To learn different cipher techniques
 To implement the algorithms DES, RSA, MD5, SHA-1
 To use network security tools and vulnerability assessment tools

LIST OF EXERCISES
1. Perform encryption, decryption using the following substitution techniques
(i) Ceaser cipher, (ii) Playfair cipher iii) Hill Cipher iv) Vigenere cipher
2. Perform encryption and decryption using following transposition techniques
i) Rail fence ii) row & Column Transformation
3 .Apply DES algorithm for practical applications.
4. Apply AES algorithm for practical applications.
5. Implement RSA Algorithm using HTML and JavaScript
6 .Implement the Diffie-Hellman Key Exchange algorithm for a given problem.
7 .Calculate the message digest of a text using the SHA-1 algorithm.
8. Implement the SIGNATURE SCHEME – Digital Signature Standard.
9. Demonstrate intrusion detection system (ids) using any tool eg. Snort or any other s/w.
10.Automated Attack and Penetration Tools Exploring N-Stalker, a Vulnerability
Assessment Tool
11.Defeating Malware
i) Building Trojans ii) Rootkit Hunter
Total Periods: 60
COURSE OUTCOMES:
At the end of the course, Students will be able to

CO’S COURSE OUTCOMES COGNITIVE


LEVEL

CO1 Develop code for classical Encryption Techniques to solve the problems Understand
Build cryptosystems by applying symmetric and public key encryption
CO2 algorithms. Apply

CO3 Construct code for authentication algorithms Apply

CO4 Develop a signature scheme using Digital signature standard. Apply


Demonstrate the network security system using open source tools
CO5 Apply

CO – PO Mapping:

CO’ PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO2
s 1
CO1
3 - 3 - - - - - - - - - - 2
CO2
- 3 - - - - - - - - - - - 2

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy