0% found this document useful (0 votes)
819 views5 pages

CCS354 NS Lab QP With Mark Allotment

ACSV
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
819 views5 pages

CCS354 NS Lab QP With Mark Allotment

ACSV
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 5

CCS354 – NETWORK SECURITY

1. Write a program to implement symmetric key algorithm using AES.

Aim/ Program/
Results Viva Record Total
Procedure Drawing
30 10 10 100
20 30

INTERNAL EXAMINER EXTERNAL EXAMINER

2. Write a program to implement asymmetric key algorithms.

Aim/ Program/
Results Viva Record Total
Procedure Drawing
30 10 10 100
20 30

INTERNAL EXAMINER EXTERNAL EXAMINER

3. Write a program to implement symmetric key algorithm using RC6.

Aim/ Program/
Results Viva Record Total
Procedure Drawing
30 10 10 100
20 30

INTERNAL EXAMINER EXTERNAL EXAMINER


Page 1 of 2
5. Write a program to implement asymmetric key exchange algorithms.

Aim/ Program/
Results Viva Record Total
Procedure Drawing
30 10 10 100
20 30

INTERNAL EXAMINER EXTERNAL EXAMINER

4. Write a program to implement Digital Signature Scheme.

Aim/ Program/
Results Viva Record Total
Procedure Drawing
30 10 10 100
20 30

INTERNAL EXAMINER EXTERNAL EXAMINER

5. Write a Installation of Wire shark, tcpdump and observe data transferred in client-server
communication using UDP/TCP and identify the UDP/TCP datagram.

Aim/ Program/
Results Viva Record Total
Procedure Drawing
30 10 10 100
20 30

INTERNAL EXAMINER EXTERNAL EXAMINER

Page 2 of 2
6. Write a program to check message integrity and confidentiality using SSL.

Aim/ Program/
Results Viva Record Total
Procedure Drawing
30 10 10 100
20 30

INTERNAL EXAMINER EXTERNAL EXAMINER

7. Experiment the Eavesdropping and Dictionary attacks.

Aim/ Program/
Results Viva Record Total
Procedure Drawing
30 10 10 100
20 30

INTERNAL EXAMINER EXTERNAL EXAMINER

11. Experiment with Sniff Traffic using ARP Poisoning.

Aim/ Program/
Results Viva Record Total
Procedure Drawing
30 10 10 100
20 30

INTERNAL EXAMINER EXTERNAL EXAMINER


Page 3 of 2
8. Demonstrate intrusion detection system using any tool.

Aim/ Program/
Results Viva Record Total
Procedure Drawing
30 10 10 100
20 30

INTERNAL EXAMINER EXTERNAL EXAMINER

14. Write and Perform encryption, decryption using the following substitution techniques
(i) Ceaser cipher, (ii) playfair cipher iii) Hill Cipher iv) Vigenere cipher

Aim/ Program/
Results Viva Record Total
Procedure Drawing
30 10 10 100
20 30

INTERNAL EXAMINER EXTERNAL EXAMINER

15. Write and Perform encryption and decryption using following transposition techniques i)
Rail fence ii) row & Column Transformation

Aim/ Program/
Results Viva Record Total
Procedure Drawing
30 10 10 100
20 30

INTERNAL EXAMINER EXTERNAL EXAMINER


Page 4 of 2
17. Write and Implement the Diffie-Hellman Key Exchange algorithm for a given problem.

Aim/ Program/
Results Viva Record Total
Procedure Drawing
30 10 10 100
20 30

INTERNAL EXAMINER EXTERNAL EXAMINER

18. Write and Implement the SIGNATURE SCHEME - Digital Signature Standard.

Aim/ Program/
Results Viva Record Total
Procedure Drawing
30 10 10 100
20 30

INTERNAL EXAMINER EXTERNAL EXAMINER

19. Demonstrate how to check message integrity and confidentiality using SSL/TLS.

Aim/ Program/
Results Viva Record Total
Procedure Drawing
30 10 10 100
20 30

INTERNAL EXAMINER EXTERNAL EXAMINER

Page 5 of 2

You might also like