IT8761 Security Laboratory Manual - Regulations 2017

  • 30May
  • 2020
  • 0
    58.4k
    IT8761 Security Laboratory Manual


    Anna University - Regulations 2017

    Department of Computer Science and Engineering

    Department of Information Technology

    PDF - 
    .pdf   IT8761 Security Laboratory Manual.pdf (Size: 802.66 KB / Downloads: 50,327)


    DOCX - 
    .docx   IT8761 Security Laboratory Manual.docx (Size: 1.44 MB / Downloads: 6,974)



    List of Experiments


    1. Perform encryption, decryption using the following substitution techniques
              i.  Ceaser cipher
              ii. Playfair cipher
              iii. Hill Cipher
              iv. Vigenere cipher

    2. Perform encryption and decryption using following transposition techniques
              i. Rail fence
              ii. Row & Column Transformation

    3. Apply DES algorithm for practical applications.

    4. Apply AES algorithm for practical applications.

    5. Implement RSA Algorithm using HTML and JavaScript

    6. Implement the Diffie-Hellman Key Exchange algorithm for a given problem.

    7. Calculate the message digest of a text using the SHA-1 algorithm.

    8. Implement the SIGNATURE SCHEME - Digital Signature Standard.

    9. Demonstrate intrusion detection system (ids) using any tool eg. Snort or any other s/w.

    10. Automated Attack and Penetration Tools Exploring N-Stalker, a Vulnerability Assessment Tool

    11. Defeating Malware
              i. Building Trojans
              ii. Rootkit Hunter


    PDF - 
    .pdf   IT8761 Security Laboratory Manual.pdf (Size: 802.66 KB / Downloads: 50,327)


    DOCX - 
    .docx   IT8761 Security Laboratory Manual.docx (Size: 1.44 MB / Downloads: 6,974)