Sunteți pe pagina 1din 3

Lovely Professional University, Punjab

Course Code CSE413 Course Category Course Title NETWORK SECURITY AND CRYPTOGRAPHY LABORATORY NA Course Planner 13667::Neha Tewari Lectures 0.0 Tutorials Practicals Credits 0.0 2.0 1.0

TextBooks Sr No T-1 Title Principles of Cryptography Reference Books Sr No R-1 R-2 Other Reading Sr No OR-1 OR-2 OR-3 Journals articles as Compulsary reading (specific articles, complete reference) Jurisic, A. And Menezes, A. Elliptical curves & Cryptography, Dr. Dobbs Journals , , Bellovin. S. and Cheswick W. Network Firewalls, IEEE communication Magazine , Anderson, J. Computer security Threat monitoring and surveillance. Fort Washington, P.A.James P. Anderson , Title Cryptography and network security Cryptography & Network Security Author Behrouz A. Forouzan Atul Kahate Edition 2nd 8th Year 2012 2003 Publisher Name Tata McGraw Hill Tata McGraw Hill Author William Stallings Edition 5th Year 2011 Publisher Name Pearson

Relevant Websites Sr No RW-1 RW-2 RW-3 (Web address) (only if relevant to the course) http://people.csail.mit.edu/rivest/Rsapaper.pdf http://www.rsa.com/rsalabs/node.asp?id=2262 http://cse.iitkgp.ac.in/~debdeep/courses_iitkgp/Crypto/ Salient Features Digital signature and its purpose to use To understand about Key management and its uses Details of all cryptography techniques with examples

Audio Visual Aids Sr No AV-1 AV-2 (AV aids) (only if relevant to the course) http://orlingrabbe.com/des.htm http://www.codeproject.com/Articles/19538/Encrypt-Decrypt-String-using-DES-in-C Salient Features DES explanation Encryption using DES

Software/Equipments/Databases Sr No SW-1 (S/E/D) (only if relevant to the course) Turbo C/C++ Salient Features Software for Practical Implementation

Virtual Labs Sr No VL-1 (VL) (only if relevant to the course) http://deploy.virtual-labs.ac.in/labs/cse29/index.php Salient Features Practical implementation

*Each experiment of the lab will be evaluated using following relative scheme:
Component J/E % of Marks 100

Detailed Plan For Practicals


Practical No Practical 1 Broad topic (Subtopic) Substitution Technique(Caesar Cipher Modified Caesar Cipher Monoalphabetic Ciphers Playfair Cipher Hill Cipher Polyalphabetic Ciphers One-Time Pad) Substitution Technique(Caesar Cipher Modified Caesar Cipher Monoalphabetic Ciphers Playfair Cipher Hill Cipher Polyalphabetic Ciphers One-Time Pad) Substitution Technique(Caesar Cipher Modified Caesar Cipher Monoalphabetic Ciphers Playfair Cipher Hill Cipher Polyalphabetic Ciphers One-Time Pad) Substitution Technique(Caesar Cipher Modified Caesar Cipher Monoalphabetic Ciphers Playfair Cipher Hill Cipher Polyalphabetic Ciphers One-Time Pad) Transposition Techniques(Rail fence technique- encryption and decryption Column Transposition- encryption and decryption) Practical Description Introduction to encryption and decryption by applying a Substitution Technique (No Practical Evaluation will be conducted in first lab) Learning Outcomes Equipment Used To understand about different PC with C/C++ substitution ciphers to encrypt and decrypt data also understand about key space and its importance

Practical 2

Introduction to encryption and decryption by applying a Substitution Technique (No Practical Evaluation will be conducted in first lab)

To understand about different PC with C/C++ substitution ciphers to encrypt and decrypt data also understand about key space and its importance

Practical 3

Introduction to encryption and decryption by applying a Substitution Technique (No Practical Evaluation will be conducted in first lab)

To understand about different PC with C/C++ substitution ciphers to encrypt and decrypt data also understand about key space and its importance

Practical 4

Introduction to encryption and decryption by applying a Substitution Technique (No Practical Evaluation will be conducted in first lab)

To understand about different PC with C/C++ substitution ciphers to encrypt and decrypt data also understand about key space and its importance

Practical 5

Transposition cipher Method(Rail fence technique- encryption and decryption) Practical-7th is reserved for MTP

To make student aware of transposition PC with C/C++ ciphering technique rail fences

Practical 6

Transposition Techniques(Rail fence technique- encryption and decryption Column Transposition- encryption and decryption) Transposition Techniques(Rail fence technique- encryption and decryption Column Transposition- encryption and decryption)

Transposition cipher Method(Rail fence technique- encryption and decryption) Practical-7th is reserved for MTP Transposition cipher Method(Rail fence technique- encryption and decryption) Practical-7th is reserved for MTP

To make student aware of transposition PC with C/C++ ciphering technique rail fences

Practical 7

To make student aware of transposition PC with C/C++ ciphering technique rail fences

Practical 8

Symmetric ciphers: Simplified DES Encryption and decryption using Algorithm(Implement the encryption and Symmetric cipher decryption of 8-bit data using Simplified DES Algorithm) Symmetric ciphers: Simplified DES Encryption and decryption using Algorithm(Implement the encryption and Symmetric cipher decryption of 8-bit data using Simplified DES Algorithm) Public-Key Encryption(Rabin-Miller Primality Testing Algorithm, Euclid Algorithm to generate the GCD, RSA algorithm) Public-Key Encryption(Rabin-Miller Primality Testing Algorithm, Euclid Algorithm to generate the GCD, RSA algorithm) Public-Key Encryption(Rabin-Miller Primality Testing Algorithm, Euclid Algorithm to generate the GCD, RSA algorithm) Hashing and key management(Secure hash algorithm ,Diffie-Hellman Key Exchange Algorithm) Hashing and key management(Secure hash algorithm ,Diffie-Hellman Key Exchange Algorithm) Encryption and decryption using RSA algorithm

Understand about the implementation of Symmetric cipher DES Understand about the implementation of Symmetric cipher DES To get students familiar with how to provide security by applying the RSA algorithm To get students familiar with how to provide security by applying the RSA algorithm To get students familiar with how to provide security by applying the RSA algorithm

PC with C/C++

Practical 9

PC with C/C++

Practical 10

PC with C/C++

Practical 11

Encryption and decryption using RSA algorithm

PC with C/C++

Practical 12

Encryption and decryption using RSA algorithm

PC with C/C++

Practical 13

Key Management and 14th Practical Lab To understand how Key exchange PC with C/C++ is reserved for ETP algorithm Diffe Hellman is used and its importance Key Management and 14th Practical Lab To understand how Key exchange PC with C/C++ is reserved for ETP algorithm Diffe Hellman is used and its importance

Practical 14

SPILL OVER
Practical 15 Spill Over

S-ar putea să vă placă și