0% found this document useful (0 votes)
15 views3 pages

It8761 Set 3

Question Set

Uploaded by

Priya Mani
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views3 pages

It8761 Set 3

Question Set

Uploaded by

Priya Mani
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

B.E / B.Tech.

PRACTICAL END SEMESTER EXAMINATIONS


Seventh Semester

IT8761 SECURITY LABORATORY

(Regulations 2017)

Time : 3 Hours Answer any one Question Max. Marks 100

Aim/Principle/Apparatus Tabulation/Circuit/ Calculation Viva-Voce Record Total


required/Procedure Program/Drawing & Results
30 40 10 10 10 100

1. Perform encryption and decryption of the following transposition techniques-

a. Rail-fence technique

b. Row and Column transformation

2. Perform encryption and decryption of the following substitution cipher-

a. Vigenere Cipher

b. Hill Cipher

3. a. Create a program to encrypt plaintext using Caesar Cipher

b. Create a program to display contents of Playfair matrix and encrypt the given plaintext.

4. Implement an application that will be using DES algorithm for encryption/decryption.

5. Implement an application that will be using AES algorithm with key size 128 bits.

6. Implement an application that will be using HTML as front end and Javascript to do RSA
encryption/decryption.

7. a. Create a program that can do key exchange between two parties and generate secret key. You can
make use of Diffie-Hellman Key Exchange algorithm.

b. Make a vulnerability assessment scan of your college web application using N-Stalker.
8. a. Implement Rail-fence technique to do encryption of plaintext

b. Implement SHA-1 hashing algorithm to generate message digest from given text.

9. Implement digital signature scheme using DSS.

10. a. Perform encryption/decryption of Vigenere Cipher.

b. Create a Trojan or download SubSeven like Trojan and demonstrate it in a virtual machine.

11. a. Implement encryption/decryption of Vigenere Cipher technique.

b. Do penetration testing using N-Stalker web security scanner in your college security lab server. Use
manual setup (spider only) option.

12. a. Implement decryption using Hill Cipher technique with given plaintext and K-1

b. Perform intrusion detection using snort or equivalent tools.

13. a. Create a program to implement Playfair cipher to do encryption of the given cleartext.

b. Demonstrate rootkit hunter tool to detect various types of rootkits.

14. a. Implement rail-fence cipher technique with depth given as a command line argument

b. Perform web application vulnerability assessment using N-Stalker.

15. a. Implement row column transformation cipher.

b. Demonstrate SubSeven Trojan or equivalent Trojan execution in a safe environment.

16. a. Implement rail-fence cipher technique.

b. Use rkhunter or its equivalent to unearth all rootkits and backdoors.

17. a. Implement encryption/decryption using Caesar cipher.

b. Configure snort intrusion detection tool and set rules for various options.

18. Implement an application that will be using AES algorithm with key size 192 bits.

19. a. Create a transposition cipher program that will perform row and column transformation.

b. Perform web infrastructure analysis using N-Stalker vulnerability assessment tool.


20. a. Create a program to implement encryption/decryption using Caesar cipher.

b. Build a Trojan like SubSeven or equivalent in a virtual machine environment and observe how
client takes over the host system.

You might also like