IT8761 SECURITY LABORATORY - LAB MANUAL
SRM VALLIYAMMAI EDITION
IT8761-Security Lab.pdf (Size: 3.43 MB / Downloads: 2,620)
SYLLABUS
LIST OF EXPERIMENTS
- Perform encryption, decryption using the following substitution techniques
(i) Ceaser cipher, (ii) playfair cipher iii) Hill Cipher iv) Vigenere cipher - Perform encryption and decryption using following transposition techniques
i) Rail fence ii) row & Column Transformation - Apply DES algorithm for practical applications.
- Apply AES algorithm for practical applications.
- Implement RSA Algorithm using HTML and JavaScript
- Implement the Diffie-Hellman Key Exchange algorithm for a given problem.
- Calculate the message digest of a text using the SHA-1 algorithm.
- Implement the SIGNATURE SCHEME – Digital Signature Standard.
- Demonstrate intrusion detection system (ids) using any tool eg. Snort or any other s/w.
- Automated Attack and Penetration Tools Exploring N-Stalker, a Vulnerability Assessment Tool
- Defeating Malware
i) Building Trojans ii) Rootkit Hunter