1._IS_DVExp[1]
1._IS_DVExp[1]
Information Security(3170720)
B.E. Semester 7
(Computer Engineering)
Certificate
This is to certify thatMr./Ms. ___________________________________
________ Enrollment No. _______________ of B.E. Semester
_____Computer Engineering of this Institute (GTU Code: _____ ) has
satisfactorily completed the Practical / Tutorial work for the subject
Information Security (3170720) for the academic year 2023-24.
Place: __________
Date: __________
Preface
Main motto of any laboratory/practical/field work is for enhancing required skills as well as
creating ability amongst students to solve real time problem by developing relevant
competencies in psychomotor domain. By keeping in view, GTU has designed competency
focused outcome-based curriculum for engineering degree programs where sufficient weightage
is given to practical work. It shows importance of enhancement of skills amongst the students
and it pays attention to utilize every second of time allotted for practical amongst students,
instructors and faculty members to achieve relevant outcomes by performing the experiments
rather than having merely study type experiments. It is must for effective implementation of
competency focused outcome-based curriculum that every practical is keenly designed to serve
as a tool to develop and enhance relevant competency required by the various industry among
every student. These psychomotor skills are very difficult to develop through traditional chalk
and board content delivery method in the classroom. Accordingly, this lab manual is designed to
focus on the industry defined relevant outcomes, rather than old practice of conducting practical
to prove concept and theory.
By using this lab manual students can go through the relevant theory and procedure in advance
before the actual performance which creates an interest and students can have basic idea prior to
performance. This in turn enhances pre-determined outcomes amongst students. Each
experiment in this manual begins with competency, industry relevant skills, course outcomes as
well as practical outcomes (objectives). The students will also achieve safety and necessary
precautions to be taken while performing practical.
This manual also provides guidelines to faculty members to facilitate student centric lab
activities through each experiment by arranging and managing necessary resources in order that
the students follow the procedures with required safety and necessary precautions to achieve the
outcomes. It also gives an idea that how students will be assessed by providing rubrics.
Information security is the subject that helps students to understand various aspects of data
security. It provides a way to know various kinds of breaches that happen with data and how to
eliminate them using various techniques. The student is also able to learn various methodologies
which used by current used by developers to achieve the security of information.
.
3170720 INFORMATION SECURITY
The following industry relevant competency are expected to be developed in the student by
undertaking the practical work of this laboratory.
1. Able to think about information security scenario and make solution
2. Able to develop and algorithms which helps to secure data
Index
(Progressive Assessment Sheet)
Sr. Objective(s) of Experiment Page Date of Date of Assessme Sign. of Remar
No. No. perform submiss nt Teacher ks
ance ion Marks with date
Implement Caesar cipher encryption-
1
decryption.
Implement Playfair cipher encryption-
2
decryption.
Implement Hill cipher encryption-
3
decryption
Implement Vigenere Cipher encryption-
4
decryption
Implement Rail Fence Transposition cipher
5
technique.
To implement Simple DES encryption-
6
decryption.
To implement Simple AES encryption-
7
decryption.
Implement RSA encryption-decryption
8
algorithm.
Implement Diffi-Hellman Key exchange
9
Method
Total
3170720 INFORMATION SECURITY
OBJECTIVES:
The student should be made to:
OUTCOMES:
At the end of the course, the student should be able to:
SOFTWARE REQUIREMENTS
HARDWARE REQUIREMENTS
➢ Standalone desktops
3170720 INFORMATION SECURITY 210210107017
Experiment No: 1
Implementation of caesar cipher
Date:
Relevant CO: Explore the basic principles of the symmetric cryptography and techniques with their
strengths and weaknesses from perspective of cryptanalysis
Example:
Algorithm:
Program:
# Example usage
key = os.urandom(32) # AES-256 key
plaintext = b'This is a secret message.'
ciphertext = encrypt_aes(key, plaintext)
print("Ciphertext:", ciphertext)
Output:
Ciphertext: b'\xa8\x94\x18\xf1\xe2\xc8N\xe54\xc4\x89\x8dD\x053\xbc\xe2\xfe8\x13\xfd\x13#\xf2\xf8\r\xf8nN\
xff\xd9\xcbo\x8c\xc3|\xb5\xc2\x85\xfe!'
Decrypted text: b'This is a secret message.'
Conclusion:
- Symmetric cryptography is vital for data security, employing a single shared key for both
encryption and decryption, which emphasizes the significance of key management and
processing efficiency. Its strengths include speed and resource efficiency, ease of
implementation, and strong security when using robust algorithms like AES. However, it
faces challenges such as the key distribution problem, making secure key sharing
difficult, and scalability issues that arise as the number of users increases, complicating
key management. Ultimately, the effectiveness of symmetric cryptography hinges on the
strength of the algorithms used and the security of key management practices.
3170720 INFORMATION SECURITY 210210107017
Quiz:
- The Caesar Cipher is a symmetric encryption algorithm because it uses the same key (shift
value) for both encryption and decryption.
- To encrypt the word "alphabet" using a Caesar cipher with a shift of 3, we shift each letter
three positions down the alphabet.
Encryption Steps:
Plaintext: alphabet
Shift: 3
Letter Transformations:
a→d
l→o
p→s
h→k
a→d
b→e
e→h
t→w
Result:
Ciphertext: doskdehw
- So, the encrypted word "alphabet" with a shift of 3 is doskdehw.
Suggested Reference:
1. https://www.geeksforgeeks.org/caesar-cipher-in-cryptography/
1. https://www.geeksforgeeks.org/caesar-cipher-in-cryptography/
Rubrics 1 2 3 4 5 Total
Marks