21CS1712 CRYPTOGRAPHY AND NETWORK SECURITY LABORATORY L T P C
0 0 4 2
OBJECTIVES
To learn different cipher techniques
To implement the algorithms DES, RSA,SHA-1
To understand the usage of security tools
LIST OF EXPERIMENTS
1.Perform encryption, decryption using the following substitution techniques
(i) Ceaser cipher, (ii) Playfair cipher iii) Hill cipher iv) Vigenere cipher
2. Perform encryption and decryption using following transposition techniques i) Rail Fence ii) Row & Column Transformation
3. Implementation DES algorithm
4. Implementation AES algorithm.
5. Implement RSA Algorithm using HTML and JavaScript
6. Implement the Diffie-Hellman Key Exchange algorithm for a given problem.
7. Calculate the message digest of a text using the SHA-1 algorithm.
8. Implement the SIGNATURE SCHEME - DSA.
9. Demonstrate intrusion detection system (IDS) using any tool eg. Snort
10. Automated Attack and Penetration Tools Exploring N-Stalker, a Vulnerability Assessment Tool
11. Implementation of XSS and SQL injection,
MINI PROJECTS : (But not limited to )
1. Keylogger projects.
2. Antivirus.
3. Analysis and Assessment of different Cyber-Attacks
4. Network Monitoring and Anomalies Discovery.
5. Bug Bounties.
OUTCOMES:
At the end of the course, the student will able to
1. Develop code for classical Encryption Techniques to solve the problems.
2. Build cryptosystems by applying symmetric key encryption algorithms
3. Develop public key encryption algorithms.
4. Construct code for authentication algorithms.
5. Develop a signature scheme using Digital signature standard.
6. Demonstrate the system security using open-source tools.
REFERENCES:
1. Build Your Own Security Lab, Michael Gregg, Wiley India
LIST OF EQUIPMENT FOR A BATCH OF 30 STUDENTS: SOFTWARE: C / C++ / Java or equivalent compiler GnuPG, Snort, N-Stalker or Equivalent HARDWARE: Standalone desktops - 30 Nos. (or) Server supporting 30 terminals or more.