The document outlines the curriculum for the Cryptography & System Security Lab for T.E. students in the Department of Computer Engineering for the academic year 2024-25. It includes lab objectives, outcomes, and a list of experiments covering various encryption techniques, security mechanisms, and network security tools. Students will gain practical experience in implementing cryptographic algorithms and exploring network vulnerabilities through hands-on experiments.
The document outlines the curriculum for the Cryptography & System Security Lab for T.E. students in the Department of Computer Engineering for the academic year 2024-25. It includes lab objectives, outcomes, and a list of experiments covering various encryption techniques, security mechanisms, and network security tools. Students will gain practical experience in implementing cryptographic algorithms and exploring network vulnerabilities through hands-on experiments.
2 To study and implement various security mechanism 3 To explore the network security concept and tools Lab Outcomes: At the end of the course, the students will be able to
1 Apply Understand concepts of classical encryption techniques and fundamental
knowledge on the concepts of modular arithmetic and number theory in cryptography.
2 Apply the knowledge of symmetric and asymmetric cryptography to
implement simple ciphers to solve problems related to confidentiality and authentication. 3 Apply different message digest and digital signature algorithms to verify integrity and achieve authentication and design secure applications
4 Explore the different network reconnaissance, sniffers, port scanners and other related tools to gather information and analyze packets in a Network.
5 Explore various attacks like buffer-overflow and web application attacks.
List of Experiments LO Covered
1 Design and Implementation of a product cipher using Substitution 1
and Transposition ciphers. 2 Implementation of Euler’s Totient Function. 1 3 Implement RSA as Digital Signature algorithm 2 • Take input as p,q • Find values of e and d • Input the message, M • Calculate the signature, S • Calculate the Verified message, M’ • Check M’≡ M (mod n) • Print whether the message is Accepted or Rejected 4 Implement Diffie Hellman Key agreement Algorithm 2 • Take input as p,q, x and y • Calculate values of R1 and R2 and Print them • Calculate values of K using R2, x and p • Calculate values of K using R1, y and p 5 Implementation of MD5 algorithm. 3 6 Study of packet sniffer tools : wireshark, : 4 1. Download and install wireshark and capture icmp, tcp, and http packets in promiscuous mode. 2. Explore how the packets can be traced based on different filters. 7 Simulate DOS attack using Hping, hping3. 4 8 Simulation of SQL Injection Attack 5 Create a database and run SQL queries to show the attack 9 Simulate buffer overflow attack using Ollydbg, Splint, Cpp check etc. 5 10 Case Study /Seminar: Topic beyond syllabus related to topics covered. All 11 Use of Virtual lab in CSS https://cse29-iiith.vlabs.ac.in/List%20of%20experiments.html