0% found this document useful (0 votes)
12 views2 pages

Cryptography Lab

The syllabus outlines a BTech lab course focused on cryptographic algorithms, emphasizing hands-on experience with encryption, key exchange, and secure communication. Students will learn to implement various cryptographic techniques and analyze their vulnerabilities through practical exercises. The course includes a mix of internal assessments and a final examination, with a total of 50 marks.

Uploaded by

ficajo8878
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views2 pages

Cryptography Lab

The syllabus outlines a BTech lab course focused on cryptographic algorithms, emphasizing hands-on experience with encryption, key exchange, and secure communication. Students will learn to implement various cryptographic techniques and analyze their vulnerabilities through practical exercises. The course includes a mix of internal assessments and a final examination, with a total of 50 marks.

Uploaded by

ficajo8878
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Subject

Syllabus
C h

Semester: 4
Course: BTech
Prerequisite: Basic knowledge of Fundamentals of Networking,Computer
Programming.

Rationale: The objective of this lab offers hands-on experience with key cryptographic algorithms, focusing on encryption, key exchange,
message integrity, and secure communication. It equips students with the skills to apply cryptography in real-world cybersecurity
scenarios.

Teaching and Examination Scheme


Teaching Scheme Examination Scheme

Lecture Tutorial Lab Internal Marks External Marks Total


Credit
Hrs/We Hrs/Week Hrs/W Hrs/Week T CE P T P
ek eek
0 0 2 0 1 - - 30 - 20 50
SEE - Semester End Examination, CIA - Continuous Internal Assessment (It consists of Assignments/Seminars/Presentations/MCQ
Tests, etc.)

Course Outcome
After Learning the Course, the students shall be able to:
 Understand and implement classical cryptographic techniques and analyze their vulnerabilities.
 Apply modern cryptographic algorithms for secure key exchange and encryption.
 Implement public-key cryptosystems and understand their real-world applications.
 Understand and implement cryptographic hashing and ensure message integrity.
 Apply cryptographic techniques to ensure secure communication, key management, and signatures.

Page 1 of
2
Subject
Syllabus
C h

List of Practical
1. Practical-1
Implement ceaser cipher and apply brute force attack to get original key.
2. Practical-2
Apply attacks for cryptanalysis to decrypt the original message from a given cipher text using Play fair cipher.
Key = Parul
3. Practical-3
Implement Deffi Hellmn key exchange algorithm. Generate share secret without Sharing the secret code.
4. Practical-4
Implement and Analyze DES algorithm.
5. Practical-5
Implement RSA cryptosystem.
6. Practical-6
Implement Message Integrity using SHA-256 hashing function which creates chain of three blocks. Each block contains index,
timestamp, data, previous hash value and current block of hash value. Test message integrity of program by modifying one of
the hash value of block.
7. Practical-7
Implement Elgamal Cryptosystem.
8. Practical-8
Implement Digital Signature.
9. Practical-9
Study and Configure SSH to authenticate machines, generate session key and transfer files using symmetric key and
asymmetric key cryptography.
10. Practical-10
Prepare report on any advanced cryptographic system.

Page 1 of
2

You might also like