100% found this document useful (2 votes)
2K views2 pages

Cs6711 Security Laboratory

This document outlines the objectives, experiments, and equipment for a security laboratory course. The course aims to expose students to cipher techniques, cryptography algorithms like DES and RSA, and network security tools. The 10 listed experiments involve implementing classic cipher methods, popular algorithms, digital signatures, and using tools like GnuPG for secure storage and transmission, KF Sensor for honeypot monitoring, and Net Stumbler for wireless auditing. Upon completion, students should be able to implement ciphers and security algorithms, and utilize various open source network analysis tools. Equipment required includes software compilers and specified security programs, along with 30 desktop computers or a server supporting 30+ terminals.

Uploaded by

ramyajesi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
100% found this document useful (2 votes)
2K views2 pages

Cs6711 Security Laboratory

This document outlines the objectives, experiments, and equipment for a security laboratory course. The course aims to expose students to cipher techniques, cryptography algorithms like DES and RSA, and network security tools. The 10 listed experiments involve implementing classic cipher methods, popular algorithms, digital signatures, and using tools like GnuPG for secure storage and transmission, KF Sensor for honeypot monitoring, and Net Stumbler for wireless auditing. Upon completion, students should be able to implement ciphers and security algorithms, and utilize various open source network analysis tools. Equipment required includes software compilers and specified security programs, along with 30 desktop computers or a server supporting 30+ terminals.

Uploaded by

ramyajesi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

CS6711

SECURITY LABORATORY

LTPC
0032

OBJECTIVES:
The student should be made to:
Be exposed to the different cipher techniques
Learn to implement the algorithms DES, RSA,MD5,SHA-1
Learn to use network security tools like GnuPG, KF sensor, Net
Strumbler
LIST OF EXPERIMENTS:
1. Implement the following SUBSTITUTION & TRANSPOSITION
TECHNIQUES concepts:
a. Caesar Cipher
b. Playfair Cipher
c. Hill Cipher
d. Vigenere Cipher
e. Rail fence row & Column Transformation
2. Implement the following algorithms
a. DES
b. RSA Algorithm
c. Diffiee-Hellman
d. MD5
e. SHA-1
5 Implement the SIGNATURE SCHEME Digital Signature Standard
6. Demonstrate how to provide secure data storage, secure data transmission
and for creating digital signatures (GnuPG).
7. Setup a honey pot and monitor the honeypot on network (KF Sensor)
8. Installation of rootkits and study about the variety of options
9. Perform wireless audit on an access point or a router and decrypt WEP and
WPA.( Net Stumbler)
10. Demonstrate intrusion detection system (ids) using any tool (snort or any
other s/w)
T
OTAL: 45 PERIODS
OUTCOMES:
At the end of the course, the student should be able to:
Implement the cipher techniques
Develop the various security algorithms
Use different open source tools for network security and analysis
LIST OF EQUIPMENT FOR A BATCH OF 30 STUDENTS:
SOFTWARE:
C / C++ / Java or equivalent compiler GnuPG, KF Sensor or Equivalent, Snort,
Net Stumbler or Equivalent
HARDWARE:
Standalone desktops 30 Nos.
(or)
Server supporting 30 terminals or more.

You might also like