Вы находитесь на странице: 1из 35

LIST OF EXPERIMENTS

S.NO. EXPERIMENTS PAGE NO. SIGNATURE

Implement the following SUBSTITUTION & TRANSPOSITION TECHNIQUES


concepts

1. a.)Caesar Cipher
b.)Playfair Cipher
c.)Hill Cipher
d.)Vigenere Cipher
e.)Rail fence – Row & Column Transformation
Implement the following algorithms
a) DES
b) RSA Algorithm
2.
c) Diffiee-Hellman
d) MD5
e) SHA-1

Implement the SIGNATURE SCHEME - Digital


3.
Signature Standard

Demonstrate how to provide secure data storage,


4.
secure data transmission and for creating digital
signatures (GnuPG).

5. Setup a honey pot and monitor the Honeypot on


network (KF Sensor)

6. Installation of Rootkits and study about the variety of


options

7. Perform wireless audit on an access point or a router


and decrypt WEP and WPA.( Net Stumbler)
Demonstrate intrusion detection system (ids) using any
8. tool (snort or any other s/w)

RULES AND REGULATIONS OF THE COMPUTER LABORATORY

1 IT6712 SECURITY LAB


GENERAL RULES

 All students must observe the Dress Code while in the laboratory.
 Sandals or open-toed shoes are NOT allowed.

 Foods, drinks and smoking are NOT allowed.

 All bags must be left at the indicated place.

 The lab timetable must be strictly followed. Prior permission from the Lab Supervisor
must be obtained if any change is to be made.

 Be PUNCTUAL for your laboratory session.

 Lab Sessions must be completed within the given time.

 Respect the laboratory and its other users. Noise must be kept to a minimum.

 Workspace must be kept clean and tidy at all time.

 Handle all apparatus with care.

 All students are liable for any damage to equipment due to their own negligence.

 All equipment, apparatus and chairs must be RETURNED to their original place after
use.

 Students are strictly PROHIBITED from taking out any items from the laboratory
without permission from the Lab Supervisor.

 Students are NOT allowed to work alone in the laboratory.

 Please consult the Lab Supervisor if you are not sure how to operate the laboratory
equipment.

 Report immediately to the Lab Supervisor any damages to equipment, hazards, and
potential hazards.

 Please refer to the Lab Supervisor should there be any concerns regarding the
laboratory.

 Please check the laboratory notice board regularly for any updates and
announcements.

COMPUTER RULES

 Booting-up computers from CD/DVD is strictly PROHIBITED.


 Students should never interfere the original computer configuration or setup: BIOS
setup, Windows Operating System setup, Files and Directory created, etc.

 Students are NOT ALLOWED to install Software or Hardware inside computers in


the laboratory.

 Unauthorized copying of software or using illegally copied software is strictly


FORBIDDEN.

2 IT6712 SECURITY LAB


 Respect the privacy of others by refraining from accessing their files or electronic
mails.

 Students must promptly relinquish from their work for scheduled classes or upon
requested by Laboratory Supervisor.

 Computer games are strictly FORBIDDEN in the laboratory.

PLEASE KEEP THE COMPUTER LAB CLEAN AND TIDY

EX.NO:1 IMPLEMENT THE FOLLOWING SUBSTITUITION AND


TRANSPOSITION TECHNIQUES CONCEPTS.
DATE:
a.)Caesar Cipher
b.)Playfair Cipher
c.)Hill Cipher
d.)Vigenere Cipher
e.)Rail fence – Row & Column Transformation

AIM:

CODING:

3 IT6712 SECURITY LAB


4 IT6712 SECURITY LAB
5 IT6712 SECURITY LAB
6 IT6712 SECURITY LAB
7 IT6712 SECURITY LAB
8 IT6712 SECURITY LAB
9 IT6712 SECURITY LAB
RESULT:

EX.NO:2 IMPLEMENT THE FOLLOWING ALGORITHMS


DATE:

a) DES
b) RSA Algorithm
c) Diffiee-Hellman
d) MD5
e) SHA-1
AIM:

CODING:

10 IT6712 SECURITY LAB


11 IT6712 SECURITY LAB
12 IT6712 SECURITY LAB
13 IT6712 SECURITY LAB
14 IT6712 SECURITY LAB
15 IT6712 SECURITY LAB
16 IT6712 SECURITY LAB
RESULT:

EX.NO:3 IMPLEMENT THE SIGNATURE SCHEME – DIGITAL


SIGNATURE STANDARD
DATE:

AIM:

CODING:

17 IT6712 SECURITY LAB


18 IT6712 SECURITY LAB
19 IT6712 SECURITY LAB
RESULT:

EX.NO:4 DEMONSTARTE HOW TO PROVIDE SECURE DATA STORAGE,


DATE: SECURE DATA TRANSMISSION AND FOR CREATING DIGITAL
SIGNATURES (GnuPG).

AIM:

CODING:

20 IT6712 SECURITY LAB


21 IT6712 SECURITY LAB
22 IT6712 SECURITY LAB
RESULT:

EX.NO:5 SET UP A HONEY POT AND MONITOR THE


HONEYPOT ON NETWORK (KF Sensor)
DATE:

AIM:

CODING:

23 IT6712 SECURITY LAB


24 IT6712 SECURITY LAB
25 IT6712 SECURITY LAB
RESULT:

EX.NO:6 INSTALLATION OF ROOTKITS AND STUDY ABOUT


THE VARIETY OF OPTIONS
DATE:

AIM:

CODING:

26 IT6712 SECURITY LAB


27 IT6712 SECURITY LAB
28 IT6712 SECURITY LAB
RESULT:

EX.NO:7 PERFORM WIRELESS AUDIT ON AN ACCESS POINT


OR A ROUTER AND DECRYPT WEP AND WPA(Net
DATE:
STUMBLER)

AIM:

CODING:

29 IT6712 SECURITY LAB


30 IT6712 SECURITY LAB
31 IT6712 SECURITY LAB
RESULT:

EX.NO:8 DEMONSTRATE INTRUSION DETECTION SYSTEM


AIM: (ids) USING ANY TOOL (snort or any other s/w)
DATE:

AIM:

CODING:

32 IT6712 SECURITY LAB


33 IT6712 SECURITY LAB
34 IT6712 SECURITY LAB
RESULT:

35 IT6712 SECURITY LAB

Вам также может понравиться