Documente Academic
Documente Profesional
Documente Cultură
Course Code CSE413 Course Category Course Title NETWORK SECURITY AND CRYPTOGRAPHY LABORATORY NA Course Planner 13667::Neha Tewari Lectures 0.0 Tutorials Practicals Credits 0.0 2.0 1.0
TextBooks Sr No T-1 Title Principles of Cryptography Reference Books Sr No R-1 R-2 Other Reading Sr No OR-1 OR-2 OR-3 Journals articles as Compulsary reading (specific articles, complete reference) Jurisic, A. And Menezes, A. Elliptical curves & Cryptography, Dr. Dobbs Journals , , Bellovin. S. and Cheswick W. Network Firewalls, IEEE communication Magazine , Anderson, J. Computer security Threat monitoring and surveillance. Fort Washington, P.A.James P. Anderson , Title Cryptography and network security Cryptography & Network Security Author Behrouz A. Forouzan Atul Kahate Edition 2nd 8th Year 2012 2003 Publisher Name Tata McGraw Hill Tata McGraw Hill Author William Stallings Edition 5th Year 2011 Publisher Name Pearson
Relevant Websites Sr No RW-1 RW-2 RW-3 (Web address) (only if relevant to the course) http://people.csail.mit.edu/rivest/Rsapaper.pdf http://www.rsa.com/rsalabs/node.asp?id=2262 http://cse.iitkgp.ac.in/~debdeep/courses_iitkgp/Crypto/ Salient Features Digital signature and its purpose to use To understand about Key management and its uses Details of all cryptography techniques with examples
Audio Visual Aids Sr No AV-1 AV-2 (AV aids) (only if relevant to the course) http://orlingrabbe.com/des.htm http://www.codeproject.com/Articles/19538/Encrypt-Decrypt-String-using-DES-in-C Salient Features DES explanation Encryption using DES
Software/Equipments/Databases Sr No SW-1 (S/E/D) (only if relevant to the course) Turbo C/C++ Salient Features Software for Practical Implementation
Virtual Labs Sr No VL-1 (VL) (only if relevant to the course) http://deploy.virtual-labs.ac.in/labs/cse29/index.php Salient Features Practical implementation
*Each experiment of the lab will be evaluated using following relative scheme:
Component J/E % of Marks 100
Practical 2
Introduction to encryption and decryption by applying a Substitution Technique (No Practical Evaluation will be conducted in first lab)
To understand about different PC with C/C++ substitution ciphers to encrypt and decrypt data also understand about key space and its importance
Practical 3
Introduction to encryption and decryption by applying a Substitution Technique (No Practical Evaluation will be conducted in first lab)
To understand about different PC with C/C++ substitution ciphers to encrypt and decrypt data also understand about key space and its importance
Practical 4
Introduction to encryption and decryption by applying a Substitution Technique (No Practical Evaluation will be conducted in first lab)
To understand about different PC with C/C++ substitution ciphers to encrypt and decrypt data also understand about key space and its importance
Practical 5
Transposition cipher Method(Rail fence technique- encryption and decryption) Practical-7th is reserved for MTP
To make student aware of transposition PC with C/C++ ciphering technique rail fences
Practical 6
Transposition Techniques(Rail fence technique- encryption and decryption Column Transposition- encryption and decryption) Transposition Techniques(Rail fence technique- encryption and decryption Column Transposition- encryption and decryption)
Transposition cipher Method(Rail fence technique- encryption and decryption) Practical-7th is reserved for MTP Transposition cipher Method(Rail fence technique- encryption and decryption) Practical-7th is reserved for MTP
To make student aware of transposition PC with C/C++ ciphering technique rail fences
Practical 7
To make student aware of transposition PC with C/C++ ciphering technique rail fences
Practical 8
Symmetric ciphers: Simplified DES Encryption and decryption using Algorithm(Implement the encryption and Symmetric cipher decryption of 8-bit data using Simplified DES Algorithm) Symmetric ciphers: Simplified DES Encryption and decryption using Algorithm(Implement the encryption and Symmetric cipher decryption of 8-bit data using Simplified DES Algorithm) Public-Key Encryption(Rabin-Miller Primality Testing Algorithm, Euclid Algorithm to generate the GCD, RSA algorithm) Public-Key Encryption(Rabin-Miller Primality Testing Algorithm, Euclid Algorithm to generate the GCD, RSA algorithm) Public-Key Encryption(Rabin-Miller Primality Testing Algorithm, Euclid Algorithm to generate the GCD, RSA algorithm) Hashing and key management(Secure hash algorithm ,Diffie-Hellman Key Exchange Algorithm) Hashing and key management(Secure hash algorithm ,Diffie-Hellman Key Exchange Algorithm) Encryption and decryption using RSA algorithm
Understand about the implementation of Symmetric cipher DES Understand about the implementation of Symmetric cipher DES To get students familiar with how to provide security by applying the RSA algorithm To get students familiar with how to provide security by applying the RSA algorithm To get students familiar with how to provide security by applying the RSA algorithm
PC with C/C++
Practical 9
PC with C/C++
Practical 10
PC with C/C++
Practical 11
PC with C/C++
Practical 12
PC with C/C++
Practical 13
Key Management and 14th Practical Lab To understand how Key exchange PC with C/C++ is reserved for ETP algorithm Diffe Hellman is used and its importance Key Management and 14th Practical Lab To understand how Key exchange PC with C/C++ is reserved for ETP algorithm Diffe Hellman is used and its importance
Practical 14
SPILL OVER
Practical 15 Spill Over