Course Title Cryptography and Network Security Lab Course Type HC
Course Code B22EI0504 Credits 1 Class V Semester
Credits Contact Work Total Number of
LTP
Hours Load Classes Assessment in
Lecture - - -
- - - Weightage
Tutorial
Theory Practical CIE SEE
1 2 2
Practical
Course 1 2 2 - 28 25% 25%
Total
COURSE DESCRIPTION:
This laboratory course supplements the material taught in the theory course Cryptography and Network Security.
The objective of this lab is to get hands-on experience in Computer Networks, Cryptography and Network Security
concepts using simulation tools Viz.Wireshark, Nmap, SNIFF, SNORT, JCRYPT, etc.. Laboratory exercises will
normally be conducted on UNIX Operating system. The students will be exposed to simulating and analyzing
concepts.
COURSE OBJECTIVE (S):
1. To understand basics of Cryptography and Network Security.
2. To be able to secure a message over insecure channel by various means.
3. To learn about how to maintain the Confidentiality, Integrity and Availability of data.
4. To understand various protocols for network security to protect against the threats in the networks.
COURSE OUTCOMES (COs):
After the completion of the course, the student will be able to:
CO# Course Outcomes POs PSOs
CO1 Apply the cryptographic algorithms for data communication. 1- 4 ,9- 1,2,3
12
CO2 Compare the performance of various security algorithms. 1-4,6,9- 1,2
12
CO3 Apply the Digital signature for secure data transmission. 1-6, 1,2,3
CO4 Calculate the message digest of a text using the SHA-1algorithm. 1-6 1,2,3
CO5 Utilize the different open source tools for network security and 1-6, 1,2,3
analysis.
5.
CO6 Demonstrate intrusion detection system using network security tool. 1-6 1,2,3
6.
288
BLOOM’S LEVEL OF THE COURSE OUTCOMES
Bloom’s Level
Remember Understand Apply Analyze Evaluate Create
CO# (L1) (L2) (L3) (L4) (L5) (L6)
CO1
CO2
CO3
CO4
CO5
CO6
COURSE ARTICULATION MATRIX
PO10
PO11
PO12
PSO1
PSO2
PSO3
PO1
PO2
PO3
PO4
PO5
PO6
PO7
PO8
PO9
CO#/
POs
CO1 3 3 3 2 2 2 2 2 2 3 3
CO2 3 3 3 3 2 3 2 2 2 3 3
CO3 3 3 3 3 2 3 3 2 2 3 3 3
CO4 3 3 2 3 3 3 3 3 2 3 3 3
CO5 3 3 2 1 3 3 2 2 1 3 3 3
CO6 3 3 3 3 2 3 2 2 2 3 3 3
Note: 1-Low, 2-Medium, 3-High
PRACTICE:
Part A
Sl No Topic
1 Write a Java program to perform encryption and decryption using the following algorithms
a) Ceaser Cipher
b) Substitution Cipher
c) Hill Cipher
2 Write a program to implement the DES algorithm logic
3 Write a program to implement RSA Algorithm
4 Implement the Diffie-Hellman Key Exchange mechanism using HTML and JavaScript. Consider
the end user as one of the parties (Alice) and the JavaScript application as other
party (bob).
289
5 Calculate the message digest of a text using the SHA-1
algorithm.
Part B
1 Performa an experiment to demonstrate how to Sniff for Router traffic by using the tool
Wireshark.
2 Perform a Wireless Audit of an Access Point / Router and Decrypt Wep and Wpa.
3 Perform an axperiment to Sniff Traffic using Arp Poisoning.
4 Install Jcrypt Tool (Or Any Other Equivalent) and demonstrate Asymmetric, Symmetric Crypto
Algorithm, Hash and Digital/Pki Signatures.
5 Demonstrate Intrusion Detection System (Ids) using any tool. Eg. Snort or any other S/W.
NOTE: A STUDENT MUST EXECUTE ONE EXPERIMENT FROM EACH PART IN THE EXAM.
VI. ADDITIONAL EXPERIMENTS:
1. Write a program to implement the BlowFish algorithm logic
2. Write a program to implement the Rijndael algorithm logic.
3. Calculate the message digest of a text using the MD5 algorithm.
4. Perform an experiment to grab a banner with Telnet and perform the task using Netcat Utility.
5. Perform an experiment for Port Scanning with Nmap, Superscan or any other Software.
6. Using Nmap 1) Find Open Ports on a System 2) Find the machines which are Active 3) Find The version of Remote
OS on other Systems 4) Find the version of S/W installed on other System.
7. Perform an experiment on Active and Passive Fingerprinting using Xprobe2 and Nmap.
290