Security Lab
Security Lab
0042
COURSE OBJECTIVE
To learn different cipher techniques
To implement the algorithms DES, RSA, MD5, SHA-1
To use network security tools and vulnerability assessment tools
LIST OF EXERCISES
1. Perform encryption, decryption using the following substitution techniques
(i) Ceaser cipher, (ii) Playfair cipher iii) Hill Cipher iv) Vigenere cipher
2. Perform encryption and decryption using following transposition techniques
i) Rail fence ii) row & Column Transformation
3 .Apply DES algorithm for practical applications.
4. Apply AES algorithm for practical applications.
5. Implement RSA Algorithm using HTML and JavaScript
6 .Implement the Diffie-Hellman Key Exchange algorithm for a given problem.
7 .Calculate the message digest of a text using the SHA-1 algorithm.
8. Implement the SIGNATURE SCHEME – Digital Signature Standard.
9. Demonstrate intrusion detection system (ids) using any tool eg. Snort or any other s/w.
10.Automated Attack and Penetration Tools Exploring N-Stalker, a Vulnerability
Assessment Tool
11.Defeating Malware
i) Building Trojans ii) Rootkit Hunter
Total Periods: 60
COURSE OUTCOMES:
At the end of the course, Students will be able to
CO1 Develop code for classical Encryption Techniques to solve the problems Understand
Build cryptosystems by applying symmetric and public key encryption
CO2 algorithms. Apply
CO – PO Mapping:
CO’ PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO2
s 1
CO1
3 - 3 - - - - - - - - - - 2
CO2
- 3 - - - - - - - - - - - 2