0% found this document useful (0 votes)
4 views

CSS Experiment List

The document outlines the curriculum for the Cryptography & System Security Lab for T.E. students in the Department of Computer Engineering for the academic year 2024-25. It includes lab objectives, outcomes, and a list of experiments covering various encryption techniques, security mechanisms, and network security tools. Students will gain practical experience in implementing cryptographic algorithms and exploring network vulnerabilities through hands-on experiments.

Uploaded by

krishna
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views

CSS Experiment List

The document outlines the curriculum for the Cryptography & System Security Lab for T.E. students in the Department of Computer Engineering for the academic year 2024-25. It includes lab objectives, outcomes, and a list of experiments covering various encryption techniques, security mechanisms, and network security tools. Students will gain practical experience in implementing cryptographic algorithms and exploring network vulnerabilities through hands-on experiments.

Uploaded by

krishna
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

DEPARTMENT OF COMPUTER ENGINEERING

Class/Sem/Year : T. E./ VI / 2024-25 (Even)


Div: (A & B)

Lab Code Lab Name Credit


CSL602 Cryptography & System Security Lab 1

Prerequisite: Computer Network


Lab Objectives:

1 To apply various encryption techniques


2 To study and implement various security mechanism
3 To explore the network security concept and tools
Lab Outcomes: At the end of the course, the students will be able to

1 Apply Understand concepts of classical encryption techniques and fundamental


knowledge on the concepts of modular arithmetic and number theory in
cryptography.

2 Apply the knowledge of symmetric and asymmetric cryptography to


implement simple ciphers to solve problems related to confidentiality
and authentication.
3 Apply different message digest and digital signature algorithms to verify
integrity and achieve authentication and design secure applications

4 Explore the different network reconnaissance, sniffers, port scanners and other
related tools to gather information and analyze packets in a Network.

5 Explore various attacks like buffer-overflow and web application attacks.


List of Experiments LO
Covered

1 Design and Implementation of a product cipher using Substitution 1


and Transposition ciphers.
2 Implementation of Euler’s Totient Function. 1
3 Implement RSA as Digital Signature algorithm 2
• Take input as p,q
• Find values of e and d
• Input the message, M
• Calculate the signature, S
• Calculate the Verified message, M’
• Check M’≡ M (mod n)
• Print whether the message is Accepted or Rejected
4 Implement Diffie Hellman Key agreement Algorithm 2
• Take input as p,q, x and y
• Calculate values of R1 and R2 and Print them
• Calculate values of K using R2, x and p
• Calculate values of K using R1, y and p
5 Implementation of MD5 algorithm. 3
6 Study of packet sniffer tools : wireshark, : 4
1. Download and install wireshark and capture icmp, tcp, and
http packets in promiscuous mode.
2. Explore how the packets can be traced based on different filters.
7 Simulate DOS attack using Hping, hping3. 4
8 Simulation of SQL Injection Attack 5
Create a database and run SQL queries to show the attack
9 Simulate buffer overflow attack using Ollydbg, Splint, Cpp check etc. 5
10 Case Study /Seminar: Topic beyond syllabus related to topics covered. All
11 Use of Virtual lab in CSS
https://cse29-iiith.vlabs.ac.in/List%20of%20experiments.html

Dr. Smita Ambarkar ( TE-A)


Prof. Sonal Bankar ( TE-B)
Subject Incharge

You might also like