DEPARTMENT OF COMPUTER ENGINEERING
Class/Sem/Year : T. E./ VI / 2024-25 (Even)
Div: (A & B)
Lab Code Lab Name Credit
CSL602 Cryptography & System Security Lab 1
Prerequisite: Computer Network
Lab Objectives:
1 To apply various encryption techniques
2 To study and implement various security mechanism
3 To explore the network security concept and tools
Lab Outcomes: At the end of the course, the students will be able to
1 Apply Understand concepts of classical encryption techniques and fundamental
knowledge on the concepts of modular arithmetic and number theory in
cryptography.
2 Apply the knowledge of symmetric and asymmetric cryptography to
implement simple ciphers to solve problems related to confidentiality
and authentication.
3 Apply different message digest and digital signature algorithms to verify
integrity and achieve authentication and design secure applications
4 Explore the different network reconnaissance, sniffers, port scanners and other
related tools to gather information and analyze packets in a Network.
5 Explore various attacks like buffer-overflow and web application attacks.
List of Experiments LO
Covered
1 Design and Implementation of a product cipher using Substitution 1
and Transposition ciphers.
2 Implementation of Euler’s Totient Function. 1
3 Implement RSA as Digital Signature algorithm 2
• Take input as p,q
• Find values of e and d
• Input the message, M
• Calculate the signature, S
• Calculate the Verified message, M’
• Check M’≡ M (mod n)
• Print whether the message is Accepted or Rejected
4 Implement Diffie Hellman Key agreement Algorithm 2
• Take input as p,q, x and y
• Calculate values of R1 and R2 and Print them
• Calculate values of K using R2, x and p
• Calculate values of K using R1, y and p
5 Implementation of MD5 algorithm. 3
6 Study of packet sniffer tools : wireshark, : 4
1. Download and install wireshark and capture icmp, tcp, and
http packets in promiscuous mode.
2. Explore how the packets can be traced based on different filters.
7 Simulate DOS attack using Hping, hping3. 4
8 Simulation of SQL Injection Attack 5
Create a database and run SQL queries to show the attack
9 Simulate buffer overflow attack using Ollydbg, Splint, Cpp check etc. 5
10 Case Study /Seminar: Topic beyond syllabus related to topics covered. All
11 Use of Virtual lab in CSS
https://cse29-iiith.vlabs.ac.in/List%20of%20experiments.html
Dr. Smita Ambarkar ( TE-A)
Prof. Sonal Bankar ( TE-B)
Subject Incharge