1 Ins
1 Ins
Sno title pg
1 Implementing substitution and transposition ciphers:
Design and implement algorithms to encrypt and decrypt messages using
classical substitutions and transposition techniques.
2 RSA Encryption and Decryption:
Implement the RSA algorithm for public key encryption and decryption and
explore its properties and security considerations.
3 Message Authenticate Codes:
Implement the algorithm to generate and verify message authentication
codes (MAC) for ensuring data integrity and authenticity.
4 Digital Signatures:
Implement the Digital signature algorithm such RSA based signatures and
verify the integrity and authenticity of digitally signed messages.
5 Key Exchange using Diffie-Hellman:
Implement the Diffie-Hellman key exchange algorithm to securely exchange
keys between two entities over an insecure network.
6 IP security (IPsec) configuration:
Configure IPsec on network devices to provide secure communication and
protect against unauthorized access and attacks.
7 Web security with SSL/TLS:
Configure and implement secure web communication using SSL/TLS
protocols, including certificate management and secure session
establishment.
8 Malware Analysis and Detection:
Analyze and identify malware sample using antivirus tool, analyze their
behavior, and develop counter measures to mitigate their impact.
9 Firewall Configuration and Rule-Based Filtering:
Configure and test firewall rules to control network traffic, filter packets
based on specified criteria, protect network resources from unauthorized
access.
Practical 1
Aim: Implementing substitution and transposition ciphers:
Design and implement algorithm to encrypt and decrypt messages using
Classical substitution and transposition techniques.
1.Caeser Cipher
Output:
plain text is : Hello Tycs Class
Shift pattern is : 1 cipher text is
: IfmmpoUzdtoDbt
2.Monoalphabetic cipher -Additive cipher
Output:
Enter plain text :Hello Tycs
Enter The key :5
Cipher text : MjqqtYdhx
3. Vernam Cipher
Output:
Cipher text is : TSYPMUYPC
4.Playfair Cipher
Output:
Key text: HelloTYCS
Plain Text: instruments
CipherText: fqblmznhrebw
5. Rail Fence Cipher
Output:
HloTcel ys
Noeiewrscrttkuy Hello
Tycs
Networksecurity
6.Simple columnar techniques
Output:
Encrypted Message: tkuywSr_Noeiercts
Practical 2
Aim: RSA Encryption and Decryption:
Implement the RSA algorithm for public-key encryption and decryption
and explore its properties and security considerations.
Output:
n = 21
e=5
d = 5.0
Public key : 5 21
Private key : 5.0 21
Original message : 11
Encrypted message : 2.0
Decrypted message : 11.0
Practical 3
Aim: Message Authentication Codes:
Implement the algorithm to generate and verify message authentication
codes (MAC) for ensuring data integrity and authenticity.
Output:
Message digest 1 hmac-sha1 b'\x93\x92\x03A|A\x04,Jta\xe87T\x0e\xeaB~\xcb\xb6'
Message digest 2 hmac-sha1 b'\x93\x92\x03A|A\x04,Jta\xe87T\x0e\xeaB~\xcb\xb6'
Message digest 3 hmac-sha1 b'\xb6\x8d!\xfb\x18I5q\xa7\x1cjV%?!R\xc2:\x89\x18'
Message Digest size : 1 : 20 , 2 : 20 , 3 : 20
Message Block size : 1 : 64 , 2 : 64 , 3 : 64
Practical 4 Aim:
Digital Signatures:
Implement the Digital signature algorithm such RSA based signatures and
verify the integrity and authenticity of digitally signed messages .
Output:
Enter prime number(17,19,23):17
Enter another prime number(17,19,23):19
Generating your public/private keypair now
Your public key: (245, 323)
Your private key: (221, 323)
Enter message to encrypt with your private key:N
Encrypting message with private key (221, 323)
[37, 226, 271, 37, 80, 184, 80, 184, 271, 80, 287, 104, 204, 80, 95, 84, 271, 310,
204, 22, 287, 271, 84, 226, 287, 37, 184, 226, 80, 84, 271, 271, 319, 104, 95,
310, 104, 204, 104, 95, 86, 204, 271, 22, 95, 204, 68, 287, 310, 310, 104, 184, 84,
287, 226, 204, 80, 95, 37, 37, 84, 86, 80, 319]
Decrypting message with public key (245, 323)
8ce86a6ae65d3692e7305e2c58ac62eebd97d3d943e093f577da25c36988246b
verification process.....
Verification successful:
8ce86a6ae65d3692e7305e2c58ac62eebd97d3d943e093f577da25c36988246b
=
8ce86a6ae65d3692e7305e2c58ac62eebd97d3d943e093f577da25c36988246b
Practical 5
Aim: Key Exchange using Diffie-Hellman:
Implement the Diffie-Hellman key exchange algorithm to securely
exchange keys between two entities over an insecure network.
Output:
Enter Prime number: 23
Enter The Primitive root of 23: 7
Enter the private key for user 1: 5 Enter
the private key for user 2: 3
Configure and implement secure web communication using SSL/TLS protocols, including
certificate management and secure session establishment.
ROOTKIT HUNTER
A Unix-based tool that scans for rootkits, backdoors, and
possible local exploits
Double-click the icon for the program. Click the scan button in
the lower-right corner of the dialog box. Allow
24
Practical 9
Left hand side of the windows show list of rules . From the list,
select Inbound Rules
26
Select ‘Port’ as the new Rule Type and click Next. Click
Next to continue
27
Select the option ‘TCP’ and in the field ‘Specified local ports’
enter ‘80’
Next, select ‘Block the Connection’ as the Action and click Next
28
Enter the name of your choice to the new rule ‘block suspicious
ports’. Adding description for the same rule is optional