0% found this document useful (0 votes)
7 views10 pages

Crypto Lab-4

The document outlines the requirements for Lab Assessment IV in the Applied Cryptography and Network Security course. It includes four lab tasks focused on using Snort IDS, illustrating wireless attacks, implementing PGP protocol, and sending encrypted emails using S/MIME. Each task specifies the necessary actions and outputs, including screenshots for verification.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views10 pages

Crypto Lab-4

The document outlines the requirements for Lab Assessment IV in the Applied Cryptography and Network Security course. It includes four lab tasks focused on using Snort IDS, illustrating wireless attacks, implementing PGP protocol, and sending encrypted emails using S/MIME. Each task specifies the necessary actions and outputs, including screenshots for verification.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

LAB ASSESSMENT IV (Graded)

LAB SLOT: L7+L8


CLASS ID: VL2024250102423
Class Group: General (Semester)

COURSE TITLE: Applied Cryptography and


Network Security
COURSE CODE: CSI3002
COURSE MODE: Lab Based Component

Student Roll Number:22MID0091


Student Name: K. Venkateswara Rao
Implement the following lab tasks as a part of lab assessment 4.
(02 Marks)
Lab Task-1: (2 Marks)
Use Snort Intrusion Detection System (IDS) to perform the following tasks.
1. Detect any security attack
2. packet logging activity
Output screenshots:
Detection of Network:

Packet logging activity:


Lab Task-2: (2 Marks)
Illustrate any one wireless attacks. For example: inspecting and modifying
wireless card parameters, changing the wireless transmission channel, flooding
attacks and cracking keys of WPA2 protocol networks etc.
Output screenshots:
Lab Task 3: (4 Marks)
Implement PGP protocol. Perform the following operations.
1. Create public/private key pair in PGP.
2. Create a revocation key.
3. Exchange PGP keys with other students.
4. Signing the new key.
5. Encrypting a file using your partner's public key.
6. Decrypting the file using your private key.
7. Encrypting and signing a file.
8. Verifying the signature.
9. Sending secure Email with PGP.
10.Adding a public key and sending secure email.
Output screenshots:
Lab Task 4: (2 Marks)
Send and receive an encrypted email message using S/MIME
Output screenshots:

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy