IT8761-SECURITY LABORATORY Syllabus 2017 Regulation

0
119

IT8761-SECURITY LABORATORY Syllabus 2017 Regulation

SECURITY LABORATORY Syllabus 2017 Regulation,IT8761-SECURITY LABORATORY Syllabus 2017 Regulation

IT8761                                         SECURITY LABORATORY                              L T P C
                                                                                                                           0 0 4 2

OBJECTIVES:

  • To learn different cipher techniques
  • To implement the algorithms DES, RSA,MD5,SHA-1
  • To use network security tools and vulnerability assessment tools

LIST OF EXPERIMENTS

  1. Perform encryption, decryption using the following substitution techniques
    (i) Ceaser cipher, (ii) playfair cipher iii) Hill Cipher iv) Vigenere cipher
  2. Perform encryption and decryption using following transposition techniques
    i) Rail fence ii) row & Column Transformation
  3. Apply DES algorithm for practical applications.
  4. Apply AES algorithm for practical applications.
  5. Implement RSA Algorithm using HTML and JavaScript
  6. Implement the Diffie-Hellman Key Exchange algorithm for a given problem.
  7. Calculate the message digest of a text using the SHA-1 algorithm.
  8. Implement the SIGNATURE SCHEME – Digital Signature Standard.
  9. Demonstrate intrusion detection system (ids) using any tool eg. Snort or any other s/w.
  10. Automated Attack and Penetration Tools Exploring N-Stalker, a Vulnerability Assessment Tool
  11. Defeating Malware
    i) Building Trojans ii) Rootkit Hunter

                                                                                                      TOTAL: 60 PERIODS

OUTCOMES:

Upon Completion of the course, the students will be able to:

  • Develop code for classical Encryption Techniques to solve the problems.
  • Build cryptosystems by applying symmetric and public key encryption algorithms.
  • Construct code for authentication algorithms.
  • Develop a signature scheme using Digital signature standard.
  • Demonstrate the network security system using open source tools

REFERENCES:

1. Build Your Own Security Lab, Michael Gregg, Wiley India

LIST OF EQUIPMENT FOR A BATCH OF 30 STUDENTS:

SOFTWARE: C / C++ / Java or equivalent compiler GnuPG, Snort, N-Stalker or Equivalent HARDWARE: Standalone desktops – 30 Nos. (or) Server supporting 30 terminals or more.

LEAVE A REPLY

Please enter your comment!
Please enter your name here