Page 69 - B.Tech IT Curriculum and Syllabus R2017 - REC
P. 69
Department of IT, REC
CS17511 CRYPTOGRAPHY AND NETWORK SECURITY LABORATORY
L T P C
0 0 4 2
OBJECTIVES:
The student should be made to:
● Exposed to the different Cipher techniques
● To construe symmetric and asymmetric algorithms
● To accomplish digital signature schemes and hash algorithms
● To acquire skills to demonstrate network security tools
● Perform wireless audit and decrypting of WPA
LIST OF EXPERIMENTS
1. Implement the following Substitution and Transposition Techniques:
a) Caesar Cipher
b) Playfair Cipher
c) Hill Cipher
d) Vigenere Cipher
e) Rail fence – row & Column Transformation
f) Affine Cipher
2. Implement the following algorithms
a) DES
b) RSA Algorithm
c) Diffie-Hellman
d) MD5
e) SHA-1
3. Implement the Digital Signature Algorithm (DSA).
4. Implement Linux Privilege Escalation Checker.
5. Implement a Keylogger to record the keystrokes.
6. Develop a simple Block chain with SHA 256
7. Set up a honey pot and monitor the honeypot on network (Pentbox or Honeyd or any other
equivalent s/w)
8. Perform wireless audit on an access point or a router and decrypt WPA keys (aircrack-ng)
9. Demonstrate Intrusion Detection System using any tool (snort or any other equivalent s/w)
10. Demonstrate various exploits of Windows OS using Metasploit framework.
11. Install and Configure Firewalls for variety of options (iptables or pfsense)
12. Demonstrate simple MITM attack (ettercap)
TOTAL: 60 PERIODS
OUTCOMES:
At the end of the course, the student should be able to:
1. Implement the traditional cipher techniques
2. Develop the various symmetric and asymmetric security algorithms
3. Develop the various digital signature and hash algorithms
4. Use different open source tools for network security and analysis
5. Perform wireless audit and decrypt WPA keys
Curriculum and Syllabus | B.Tech. Information Technology | R2017 Page 69

