ALGORITHMS
ALGORITHMS
Aim:
The aim of symmetric key algorithms is to encrypt and decrypt data using a shared secret
key, ensuring that only authorized parties can access the original information.
Algorithm:
Step1: Key Expansion: Generate a set of round keys from the original secret key using key
expansion.
Step2: Initial Round: Add the initial round key to the plaintext data.
Step4:Final Round: Apply a final round of operations without the mixcolumns step.
RESULT:
EXP2:
Aim:
Algorithm:
Step 1: Generate a random private key. This is done by generating a random integer
between 1 and p - 1, where p is a prime number.
Step 2: Calculate the public key. This is done by raising the generator g to the power of the
private key and taking the remainder modulo p.
Step4: Calculate the shared secret key. This is done by raising the other party's public key to
the power of the private key and taking the remainder modulo p.
Step 1: Generate a random RSA key pair. This is done by generating two large prime
numbers, p and q, and calculating the public key (n, e) and private key (n, d) using the
following formulas:
N=p*q
E = (p - 1)(q - 1) / d
Step 2: Encrypt the message. To encrypt the message, raise it to the power of the public key
e and take the remainder modulo n.
Step 3: Decrypt the message. To decrypt the message, raise it to the power of the private
key d and take the remainder modulo n
RESULT:
EXP3:
Aim:
The aim of the provided code for implementing a digital signature scheme is to demonstrate
the basic steps involved in creating and verifying digital signatures.
Algorithm:
RESULT:
EXP 4:
Aim:
Algorithm:
RESULT:
EXP 5:
Aim:
Algorithm:
Step 1: Establish an SSL connection between the client and the server.
Step 2: Generate a message digest of the message to be sent.
Step3:Encrypt the message and the message digest using the SSL session key.
Step4:Send the encrypted message and message digest to the server.
Step5:The server decrypts the message and message digest using the SSL session key.
Step6:The server generates a message digest of the decrypted message.
Step7:The server compares the generated message digest to the received message digest.
Step8:If the message digests match, the server knows that the message has not been
tampered with and that it is from the correct sender.
RESULT:
EXP 6:
6 i):
Scenario:
In this case study, we will examine an instance of eavesdropping in a corporate setting. The
names of the individuals and company have been changed for privacy and security reasons.
Background:
XYZ Corporation, a multinational technology company, was in the midst of a highly
competitive merger and acquisition deal with a rival firm, AlphaTech Inc. The deal, worth
billions of dollars, had the potential to reshape the tech industry. Corporate espionage was
suspected, as both companies were keen on gaining any strategic advantage.
Incident:
During a critical board meeting at XYZ Corporation's headquarters, the company's Chief
Financial Officer (CFO), Jane Anderson, noticed some unusual interference on her phone
line. She became suspicious when confidential merger discussions were leaked to the media
within hours after the meeting. Concerned about a potential breach of security, XYZ
Corporation decided to investigate the matter discreetly.
EXP 6:
6 ii):
Scenario:
In this case study, we will examine a real-world instance of a dictionary attack on a banking
website. This case study is for illustrative purposes and does not represent any specific
incident.
Background:
ABC Bank, a prominent financial institution, maintained a secure online banking portal for its
customers. To access their accounts, customers needed to enter a username and a
password. The bank had implemented various security measures, including password
complexity requirements and account lockout mechanisms.
Over a span of several weeks, ABC Bank's cybersecurity team noticed an unusual spike in
login attempts on their online banking platform. The login attempts appeared to be
concentrated on a few customer accounts, and the IP addresses used in the attacks were
distributed across multiple locations.
EXP 6
6iii)
Scenario:
In this case study, we will examine a real-world incident of a Man-in-the-Middle (MITM)
attack on a public Wi-Fi network. This case is for illustrative purposes and does not
represent any specific event.
Background:
A bustling coffee shop, "Café Connect," offered free Wi-Fi to its customers. Many patrons
used this open network to browse the internet, check emails, and conduct online banking.
The café's Wi-Fi was convenient, but its lack of security made it an attractive target for
cybercriminals.
Incident:
Unbeknownst to Café Connect's management, a cybercriminal named Alex set up a rogue
Wi-Fi hotspot in the vicinity. This rogue hotspot had a name similar to the café's official
network, making it appear as if it was a legitimate access point. Alex initiated a MITM attack
to intercept and manipulate the internet traffic of unsuspecting café customers.
CONCLUSION:
EXP 7:
Aim:
To sniff traffic using ARP poisoning.
Algorithm:
Step 1: Send gratuitous ARP replies to all IP addresses on the network, claiming to be the
MAC address of the default gateway.
Step 2: Itwill cause all hosts on the network to update their ARP tables, so that they now
believe that the attacker's machine is the default gateway.
Step 3: Any traffic that is destined for the default gateway will now be sent to the attacker's
machine.
Step 4: The attacker can then sniff this traffic using a packet sniffer.
RESULT:
EXP 8:
background:
Company xyz is a mid-sized e-commerce business that processes a significant amount of
customer data and financial transactions. To protect their systems and data, they decide to
implement an intrusion detection system (ids) using snort.
objectives:
- detect and alert on potential intrusions or malicious activities within the network.
- monitor network traffic in real-time to identify security threats.
- provide an immediate response to mitigate detected threats.
solution:
Company xyz deploys snort, a widely-used open-source ids/ips tool, to monitor network
traffic. They set up snort on a dedicated server within their network.
conclusion:
By implementing snort for intrusion detection, company xyz enhanced its network security
and reduced the risk of security breaches. The customized rules and real-time monitoring
capabilities provided the company with a powerful tool to protect their sensitive data and
maintain the trust of their customers.
EXP 9:
To explore network monitoring models using network security.
Algorithm:
Step 1: Identify the network security protocols that you need to monitor.
Step 2: Get a list of network monitoring tools.
Step 3:For each network monitoring tool in the list:
Step 4:Get a list of the network security protocols that the tool supports.
Step 5: If the tool supports all of the network security protocols that you need to monitor,
add it to a filtered list.
Step 6:Return the filtered list of network monitoring tools.
Scenario:
A company has a remote office with a few employees who need to be able to access the
company's internal network securely. The company wants to configure a firewall and vpn to
protect its network from unauthorized access and to allow its remote employees to connect
securely.
Solution:
The company decides to use a next-generation firewall (ngfw) to protect its network. Ngfws
offer a variety of security features, including intrusion prevention, content filtering, and
application control. The company also decides to use a site-to-site vpn to connect the
remote office to the main office. Site-to-site vpns create a secure tunnel between two
networks, allowing traffic to flow securely between them.
Conclusion:
Configuring a firewall and vpn is an important step in protecting a company's network from
unauthorized access. By following the steps outlined in this case study, companies can
configure a firewall and vpn to protect their networks and allow their remote employees to
connect securely.