1
NotesKhan



IT6712                                                  SECURITY LABORATORY                                         L T P C
0 0 3  2
OBJECTIVES:
The student should be made to:
  • Be exposed to the different cipher techniques
  • Learn to implement the algorithms DES, RSA,MD5,SHA-1
  • Learn to use tools like GnuPG, KF sensor, Net Strumbler

LIST OF EXPERIMENTS
  1. Implement the following SUBSTITUTION & TRANSPOSITION TECHNIQUES concepts:
  2. a) Caesar Cipher b) Playfair Cipher c)  Hill Cipher
  3. d) Vigenere Cipher
  4. e) Rail fence – row & Column Transformation

  1. Implement the following algorithms a) DES
  2. b) RSA Algorithm c) Diffiee-Hellman
  3. d) MD5
  4. e) SHA-1
3  Implement the SIGNATURE SCHEME - Digital Signature Standard
  1. Demonstrate how to provide secure data storage, secure data transmission and for creating digital signatures (GnuPG).
  2. Setup a honey pot and monitor the honeypot on network (KF Sensor)
  3. Installation of rootkits and study about the variety of options

  1. Perform wireless audit on an access point or a router and decrypt WEP and WPA.( Net Stumbler)
  2. Demonstrate intrusion detection system (ids) using any tool (snort or any other s/w)


OUTCOMES:
At the end of the course, the student should be able to
  • Implement the cipher techniques
  • Develop the various security algorithms
  • Use different open source tools for network security and analysis

LAB EQUIPMENTS FOR A BATCH OF 30 STUDENTS: SOFTWARE:
C / C++ / Java or equivalent compiler

GnuPG, KF Sensor or Equivalent, Snort, Net Stumbler or Equivalent

HARDWARE:
Standalone desktops                                     -30 Nos. (or)
Server supporting 30 terminals or more.

TOTAL: 45 PERIODS

Post a Comment Blogger

 
Top