0% found this document useful (0 votes)
10 views

CSS Experiment List

The document outlines the curriculum for the Cryptography & System Security Lab for T.E. students in the Department of Computer Engineering for the academic year 2024-25. It includes lab objectives, outcomes, and a list of experiments covering various encryption techniques, security mechanisms, and network security tools. Students will gain practical experience in implementing cryptographic algorithms and exploring network vulnerabilities through hands-on experiments.

Uploaded by

krishna
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views

CSS Experiment List

The document outlines the curriculum for the Cryptography & System Security Lab for T.E. students in the Department of Computer Engineering for the academic year 2024-25. It includes lab objectives, outcomes, and a list of experiments covering various encryption techniques, security mechanisms, and network security tools. Students will gain practical experience in implementing cryptographic algorithms and exploring network vulnerabilities through hands-on experiments.

Uploaded by

krishna
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

DEPARTMENT OF COMPUTER ENGINEERING

Class/Sem/Year : T. E./ VI / 2024-25 (Even)


Div: (A & B)

Lab Code Lab Name Credit


CSL602 Cryptography & System Security Lab 1

Prerequisite: Computer Network


Lab Objectives:

1 To apply various encryption techniques


2 To study and implement various security mechanism
3 To explore the network security concept and tools
Lab Outcomes: At the end of the course, the students will be able to

1 Apply Understand concepts of classical encryption techniques and fundamental


knowledge on the concepts of modular arithmetic and number theory in
cryptography.

2 Apply the knowledge of symmetric and asymmetric cryptography to


implement simple ciphers to solve problems related to confidentiality
and authentication.
3 Apply different message digest and digital signature algorithms to verify
integrity and achieve authentication and design secure applications

4 Explore the different network reconnaissance, sniffers, port scanners and other
related tools to gather information and analyze packets in a Network.

5 Explore various attacks like buffer-overflow and web application attacks.


List of Experiments LO
Covered

1 Design and Implementation of a product cipher using Substitution 1


and Transposition ciphers.
2 Implementation of Euler’s Totient Function. 1
3 Implement RSA as Digital Signature algorithm 2
• Take input as p,q
• Find values of e and d
• Input the message, M
• Calculate the signature, S
• Calculate the Verified message, M’
• Check M’≡ M (mod n)
• Print whether the message is Accepted or Rejected
4 Implement Diffie Hellman Key agreement Algorithm 2
• Take input as p,q, x and y
• Calculate values of R1 and R2 and Print them
• Calculate values of K using R2, x and p
• Calculate values of K using R1, y and p
5 Implementation of MD5 algorithm. 3
6 Study of packet sniffer tools : wireshark, : 4
1. Download and install wireshark and capture icmp, tcp, and
http packets in promiscuous mode.
2. Explore how the packets can be traced based on different filters.
7 Simulate DOS attack using Hping, hping3. 4
8 Simulation of SQL Injection Attack 5
Create a database and run SQL queries to show the attack
9 Simulate buffer overflow attack using Ollydbg, Splint, Cpp check etc. 5
10 Case Study /Seminar: Topic beyond syllabus related to topics covered. All
11 Use of Virtual lab in CSS
https://cse29-iiith.vlabs.ac.in/List%20of%20experiments.html

Dr. Smita Ambarkar ( TE-A)


Prof. Sonal Bankar ( TE-B)
Subject Incharge

You might also like