Page 69 - B.Tech IT Curriculum and Syllabus R2017 - REC
P. 69

Department of IT, REC


               CS17511       CRYPTOGRAPHY AND NETWORK SECURITY LABORATORY
                                                                                               L T P C
                                                                                               0 0  4  2
               OBJECTIVES:
               The student should be made to:
                   ●  Exposed to the different Cipher techniques
                   ●  To construe symmetric and asymmetric algorithms
                   ●  To accomplish digital signature schemes and hash algorithms
                   ●  To acquire skills to demonstrate network security tools
                   ●  Perform wireless audit and decrypting of WPA
               LIST OF EXPERIMENTS
               1. Implement the following Substitution and Transposition Techniques:
                   a)  Caesar Cipher
                   b)  Playfair Cipher
                   c)  Hill Cipher
                   d)  Vigenere Cipher
                   e)  Rail fence – row & Column Transformation
                   f)  Affine Cipher
               2. Implement the following algorithms
                   a)  DES
                   b)  RSA Algorithm
                   c)  Diffie-Hellman
                   d)  MD5
                   e)  SHA-1
               3. Implement the Digital Signature Algorithm (DSA).
               4. Implement Linux Privilege Escalation Checker.
               5. Implement a Keylogger to record the keystrokes.
               6. Develop a simple Block chain with SHA 256
               7. Set up a honey pot and monitor the honeypot on network (Pentbox or Honeyd or any other
               equivalent s/w)
               8. Perform wireless audit on an access point or a router and decrypt WPA keys (aircrack-ng)
               9. Demonstrate Intrusion Detection System using any tool (snort or any other equivalent s/w)
               10. Demonstrate various exploits of Windows OS using Metasploit framework.
               11. Install and Configure Firewalls for variety of options (iptables or pfsense)
               12. Demonstrate simple MITM attack (ettercap)
                                                                                TOTAL: 60 PERIODS

               OUTCOMES:
               At the end of the course, the student should be able to:
                   1.  Implement the traditional cipher techniques
                   2.  Develop the various symmetric and asymmetric security algorithms
                   3.  Develop the various digital signature and hash algorithms
                   4.  Use different open source tools for network security and analysis
                   5.  Perform wireless audit and decrypt WPA keys





               Curriculum and Syllabus | B.Tech. Information Technology | R2017                Page 69
   64   65   66   67   68   69   70   71   72   73   74