0% found this document useful (0 votes)
102 views

CS6711-Security Lab-Regulation-2013

This document provides the lecture plan for the course "CS6711 Security Laboratory" for 4th semester computer science engineering students. Over 10 lectures, students will learn how to implement classical encryption techniques like the Caesar cipher, Playfair cipher, and Hill cipher. They will also learn symmetric encryption algorithms like DES and RSA, as well as hashing algorithms like MD5 and SHA-1. Students will develop a digital signature scheme and use network security tools like GnuPG. Assessment methods include internal tests, assignments, mini projects, and an end semester examination.

Uploaded by

addssdfa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
102 views

CS6711-Security Lab-Regulation-2013

This document provides the lecture plan for the course "CS6711 Security Laboratory" for 4th semester computer science engineering students. Over 10 lectures, students will learn how to implement classical encryption techniques like the Caesar cipher, Playfair cipher, and Hill cipher. They will also learn symmetric encryption algorithms like DES and RSA, as well as hashing algorithms like MD5 and SHA-1. Students will develop a digital signature scheme and use network security tools like GnuPG. Assessment methods include internal tests, assignments, mini projects, and an end semester examination.

Uploaded by

addssdfa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 4

ANAND INSTITUTE OF HIGHER TECHNOLOGY

KAZHIPATTUR – 603 103

Department of Computer Science and Engineering

Academic Year: 2019-20

Regulation -2013

Lecture Plan

Course Code & Title: CS6711 & Security Laboratory

Semester & Branch: IV Semester B.E. Computer Science and Engineering/A&B Section

Name of the Faculty member: K.Amsavalli

Designation & Department: Assistant Professor & CSE

Course Objectives:

The student should be made to:

 Learn to implement the algorithms DES, RSA,MD5,SHA-

 Learn to use network security tools like GnuPG, KF sensor, Net Strumbler.

• Develop a signature scheme using Digital signature standard.

Assessment Methods followed:

1. Internal Tests (Monthly Tests) are conducted to assess continuous learning.

2. Assignment are given to encourage students’ self-learning.

3. Mini Projects are given to improve the experiential learning.

4. End Semester Examination is conducted to assess overall learning by students.


Lectu Teaching aids
re No. Topic(s) to be
(Demo/
covered
LCD)
1 IMPLEMENT THE FOLLOWING SUBSTITUTION & TRANSPOSITION
TECHNIQUES CONCEPTS
1a Caesar Cipher Demo

1b Playfair Cipher Demo

1c Hill Cipher Demo

1d Vigenere Cipher Demo

1e Rail Fence – row & Column Transformation Demo

2 IMPLEMENT THE FOLLOWING ALGORITHMS

2a Data Encryption Standard Demo

2b RSA Algorithm Demo

2c Diffiee – Hellman LCD

2d Message Digest – 5 Demo

2e Secure Hashing Algorithm – 1 LCD

Implement the signature scheme


3 Demo
Digital signature standard
4 Demonstrate how to provide secure data storage, secure data Demo
transmission and for creating digital signatures (gnupg)
5 Setup a honey pot and monitor the honeypot on network (kf Demo
sensor)
6 Installation of rootkits and study about the variety of options Demo

Perform wireless audit on an access point or a router and


7 Demo
decrypt wep and wpa ( net stumbler)
Perform wireless audit on an access point or a router and
8 Demo
decrypt wep and wpa
( net stumbler)
Demonstrate intrusion detection system (ids) using any tool
9 Demo
(snort or any other s/w)
Model Lab
10

MINI PROJECT-
11 Demo
Secure Data Communication using Net stumbler -Experienti
al
Learning

Course Outcomes:

At the end of the course, the student should be able to:

 Develop code for classical Encryption Techniques to solve the problems.

 Build cryptosystems by applying symmetric and public key encryption


algorithms

 Construct code for authentication algorithms.

 Develop a signature scheme using Digital signature standard.

 Demonstrate the network security system using open source tools

Prepared by: Approved by:

K.Amsavalli AP/CSE Dr.S.Roselin Mary

(Name & Signature of Faculty member) (Name & Signature of HOD)

You might also like