ANAND INSTITUTE OF HIGHER TECHNOLOGY
KAZHIPATTUR – 603 103
Department of Computer Science and Engineering
Academic Year: 2019-20
Regulation -2013
Lecture Plan
Course Code & Title: CS6711 & Security Laboratory
Semester & Branch: IV Semester B.E. Computer Science and Engineering/A&B Section
Name of the Faculty member: K.Amsavalli
Designation & Department: Assistant Professor & CSE
Course Objectives:
The student should be made to:
Learn to implement the algorithms DES, RSA,MD5,SHA-
Learn to use network security tools like GnuPG, KF sensor, Net Strumbler.
• Develop a signature scheme using Digital signature standard.
Assessment Methods followed:
1. Internal Tests (Monthly Tests) are conducted to assess continuous learning.
2. Assignment are given to encourage students’ self-learning.
3. Mini Projects are given to improve the experiential learning.
4. End Semester Examination is conducted to assess overall learning by students.
Lectu Teaching aids
re No. Topic(s) to be
(Demo/
covered
LCD)
1 IMPLEMENT THE FOLLOWING SUBSTITUTION & TRANSPOSITION
TECHNIQUES CONCEPTS
1a Caesar Cipher Demo
1b Playfair Cipher Demo
1c Hill Cipher Demo
1d Vigenere Cipher Demo
1e Rail Fence – row & Column Transformation Demo
2 IMPLEMENT THE FOLLOWING ALGORITHMS
2a Data Encryption Standard Demo
2b RSA Algorithm Demo
2c Diffiee – Hellman LCD
2d Message Digest – 5 Demo
2e Secure Hashing Algorithm – 1 LCD
Implement the signature scheme
3 Demo
Digital signature standard
4 Demonstrate how to provide secure data storage, secure data Demo
transmission and for creating digital signatures (gnupg)
5 Setup a honey pot and monitor the honeypot on network (kf Demo
sensor)
6 Installation of rootkits and study about the variety of options Demo
Perform wireless audit on an access point or a router and
7 Demo
decrypt wep and wpa ( net stumbler)
Perform wireless audit on an access point or a router and
8 Demo
decrypt wep and wpa
( net stumbler)
Demonstrate intrusion detection system (ids) using any tool
9 Demo
(snort or any other s/w)
Model Lab
10
MINI PROJECT-
11 Demo
Secure Data Communication using Net stumbler -Experienti
al
Learning
Course Outcomes:
At the end of the course, the student should be able to:
Develop code for classical Encryption Techniques to solve the problems.
Build cryptosystems by applying symmetric and public key encryption
algorithms
Construct code for authentication algorithms.
Develop a signature scheme using Digital signature standard.
Demonstrate the network security system using open source tools
Prepared by: Approved by:
K.Amsavalli AP/CSE Dr.S.Roselin Mary
(Name & Signature of Faculty member) (Name & Signature of HOD)