Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
10 views3 pages

CNS Lab Syllabus

Uploaded by

gvs.vishnuv
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views3 pages

CNS Lab Syllabus

Uploaded by

gvs.vishnuv
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Course Title Cryptography and Network Security Lab Course Type HC

Course Code B22EI0504 Credits 1 Class V Semester

Credits Contact Work Total Number of


LTP
Hours Load Classes Assessment in
Lecture - - -
- - - Weightage
Tutorial
Theory Practical CIE SEE
1 2 2
Practical
Course 1 2 2 - 28 25% 25%
Total

COURSE DESCRIPTION:

This laboratory course supplements the material taught in the theory course Cryptography and Network Security.
The objective of this lab is to get hands-on experience in Computer Networks, Cryptography and Network Security
concepts using simulation tools Viz.Wireshark, Nmap, SNIFF, SNORT, JCRYPT, etc.. Laboratory exercises will
normally be conducted on UNIX Operating system. The students will be exposed to simulating and analyzing
concepts.

COURSE OBJECTIVE (S):

1. To understand basics of Cryptography and Network Security.


2. To be able to secure a message over insecure channel by various means.
3. To learn about how to maintain the Confidentiality, Integrity and Availability of data.
4. To understand various protocols for network security to protect against the threats in the networks.
COURSE OUTCOMES (COs):

After the completion of the course, the student will be able to:

CO# Course Outcomes POs PSOs

CO1 Apply the cryptographic algorithms for data communication. 1- 4 ,9- 1,2,3
12
CO2 Compare the performance of various security algorithms. 1-4,6,9- 1,2
12
CO3 Apply the Digital signature for secure data transmission. 1-6, 1,2,3

CO4 Calculate the message digest of a text using the SHA-1algorithm. 1-6 1,2,3

CO5 Utilize the different open source tools for network security and 1-6, 1,2,3
analysis.
5.
CO6 Demonstrate intrusion detection system using network security tool. 1-6 1,2,3
6.

288
BLOOM’S LEVEL OF THE COURSE OUTCOMES

Bloom’s Level
Remember Understand Apply Analyze Evaluate Create

CO# (L1) (L2) (L3) (L4) (L5) (L6)

CO1 
CO2 
CO3 

CO4 
CO5

CO6 

COURSE ARTICULATION MATRIX

PO10

PO11

PO12

PSO1

PSO2

PSO3
PO1

PO2

PO3

PO4

PO5

PO6

PO7

PO8

PO9
CO#/
POs

CO1 3 3 3 2 2 2 2 2 2 3 3

CO2 3 3 3 3 2 3 2 2 2 3 3
CO3 3 3 3 3 2 3 3 2 2 3 3 3

CO4 3 3 2 3 3 3 3 3 2 3 3 3

CO5 3 3 2 1 3 3 2 2 1 3 3 3

CO6 3 3 3 3 2 3 2 2 2 3 3 3

Note: 1-Low, 2-Medium, 3-High

PRACTICE:

Part A

Sl No Topic
1 Write a Java program to perform encryption and decryption using the following algorithms
a) Ceaser Cipher
b) Substitution Cipher
c) Hill Cipher
2 Write a program to implement the DES algorithm logic
3 Write a program to implement RSA Algorithm
4 Implement the Diffie-Hellman Key Exchange mechanism using HTML and JavaScript. Consider
the end user as one of the parties (Alice) and the JavaScript application as other
party (bob).

289
5 Calculate the message digest of a text using the SHA-1
algorithm.
Part B
1 Performa an experiment to demonstrate how to Sniff for Router traffic by using the tool
Wireshark.
2 Perform a Wireless Audit of an Access Point / Router and Decrypt Wep and Wpa.
3 Perform an axperiment to Sniff Traffic using Arp Poisoning.
4 Install Jcrypt Tool (Or Any Other Equivalent) and demonstrate Asymmetric, Symmetric Crypto
Algorithm, Hash and Digital/Pki Signatures.
5 Demonstrate Intrusion Detection System (Ids) using any tool. Eg. Snort or any other S/W.

NOTE: A STUDENT MUST EXECUTE ONE EXPERIMENT FROM EACH PART IN THE EXAM.

VI. ADDITIONAL EXPERIMENTS:

1. Write a program to implement the BlowFish algorithm logic


2. Write a program to implement the Rijndael algorithm logic.
3. Calculate the message digest of a text using the MD5 algorithm.
4. Perform an experiment to grab a banner with Telnet and perform the task using Netcat Utility.
5. Perform an experiment for Port Scanning with Nmap, Superscan or any other Software.
6. Using Nmap 1) Find Open Ports on a System 2) Find the machines which are Active 3) Find The version of Remote
OS on other Systems 4) Find the version of S/W installed on other System.
7. Perform an experiment on Active and Passive Fingerprinting using Xprobe2 and Nmap.

290

You might also like