The document outlines the requirements for Lab Assessment IV in the Applied Cryptography and Network Security course. It includes four lab tasks focused on using Snort IDS, illustrating wireless attacks, implementing PGP protocol, and sending encrypted emails using S/MIME. Each task specifies the necessary actions and outputs, including screenshots for verification.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
7 views10 pages
Crypto Lab-4
The document outlines the requirements for Lab Assessment IV in the Applied Cryptography and Network Security course. It includes four lab tasks focused on using Snort IDS, illustrating wireless attacks, implementing PGP protocol, and sending encrypted emails using S/MIME. Each task specifies the necessary actions and outputs, including screenshots for verification.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10
LAB ASSESSMENT IV (Graded)
LAB SLOT: L7+L8
CLASS ID: VL2024250102423 Class Group: General (Semester)
COURSE TITLE: Applied Cryptography and
Network Security COURSE CODE: CSI3002 COURSE MODE: Lab Based Component
Student Roll Number:22MID0091
Student Name: K. Venkateswara Rao Implement the following lab tasks as a part of lab assessment 4. (02 Marks) Lab Task-1: (2 Marks) Use Snort Intrusion Detection System (IDS) to perform the following tasks. 1. Detect any security attack 2. packet logging activity Output screenshots: Detection of Network:
Packet logging activity:
Lab Task-2: (2 Marks) Illustrate any one wireless attacks. For example: inspecting and modifying wireless card parameters, changing the wireless transmission channel, flooding attacks and cracking keys of WPA2 protocol networks etc. Output screenshots: Lab Task 3: (4 Marks) Implement PGP protocol. Perform the following operations. 1. Create public/private key pair in PGP. 2. Create a revocation key. 3. Exchange PGP keys with other students. 4. Signing the new key. 5. Encrypting a file using your partner's public key. 6. Decrypting the file using your private key. 7. Encrypting and signing a file. 8. Verifying the signature. 9. Sending secure Email with PGP. 10.Adding a public key and sending secure email. Output screenshots: Lab Task 4: (2 Marks) Send and receive an encrypted email message using S/MIME Output screenshots: