0% found this document useful (0 votes)
12 views2 pages

LIST OF EXPT-CSS1 (Final)

The document outlines a list of experiments for the Cryptography and System Security Lab for the Computer Science and Engineering (Data Science) program for the academic year 2022-2023. It includes ten experiments focusing on various cryptographic techniques, network security tools, and protocols, along with their corresponding learning outcomes. The document is signed by the subject in charge and the head of the department.

Uploaded by

yogita.gawdeds
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views2 pages

LIST OF EXPT-CSS1 (Final)

The document outlines a list of experiments for the Cryptography and System Security Lab for the Computer Science and Engineering (Data Science) program for the academic year 2022-2023. It includes ten experiments focusing on various cryptographic techniques, network security tools, and protocols, along with their corresponding learning outcomes. The document is signed by the subject in charge and the head of the department.

Uploaded by

yogita.gawdeds
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING

(DATA SCIENCE)
Academic Year (2022-2023)

List of Experiments

Subject: Cryptography and System Security Lab Class :T.E Sem - VI

Mapping
Exp. with Lab
NO Experiment Name outcomes
1 Design and Implementation of a product cipher using Substitution LO1
and Transposition ciphers.
2 Implementation and analysis of RSA cryptosystem and Digital LO2
signature scheme using RSA/El Gamal.
3 Implementation of Diffie Hellman Key exchange algorithm LO2
4 For varying message sizes, test integrity of message using MD-5, LO3
SHA-1, and analyse the performance of the two protocols. Use
crypt APIs.
5 Use the NESSUS/ISO Kaali Linux tool to scan the network for LO4
vulnerabilities
6 Study the use of network reconnaissance tools like WHOIS, LO4
dig,traceroute, nslookup to gather information about networks and
domain registrars.
7 Study of packet sniffer tools wireshark, :- 1. Observer performance LO5
in promiscuous as well as non-promiscuous mode. 2. Show the
packets can be traced based on different filters.
8 Download and install nmap. Use it with different options to scan LO4
open ports, perform OS fingerprinting, do a ping scan, tcp port
scan, udp port scan, etc. .
9 Detect ARP spoofing using nmap and/or open source tool LO5
ARPWATCH and wireshark
10 Set up IPSEC under LINUX. b) Set up Snort and study the logs. c) LO6
Explore the GPG tool of linux to implement email security.

Ms.Vrushali Bendre Dr. Nandini Nag


Subject Incharge HOD (CSE-DS)

You might also like