You are on page 1of 3

Lovely Professional University, Punjab

Course Code

Course Title

Course Planner

CSE413

NETWORK SECURITY AND CRYPTOGRAPHY


LABORATORY
NA

13667::Neha Tewari

Course Category

Lectures

Tutorials Practicals Credits

0.0

0.0

TextBooks
Sr No

Title

Author

Edition

Year

Publisher Name

T-1

Principles of Cryptography

William Stallings

5th

2011

Pearson

Reference Books
Sr No

Title

Author

Edition

Year

Publisher Name

R-1

Cryptography and network security

Behrouz A. Forouzan

2nd

2012

Tata McGraw Hill

R-2

Cryptography & Network Security

Atul Kahate

8th

2003

Tata McGraw Hill

Other Reading
Sr No

Journals articles as Compulsary reading (specific articles, complete reference)

OR-1

Jurisic, A. And Menezes, A. Elliptical curves & Cryptography, Dr. Dobbs Journals , ,

OR-2

Bellovin. S. and Cheswick W. Network Firewalls, IEEE communication Magazine ,

OR-3

Anderson, J. Computer security Threat monitoring and surveillance. Fort Washington, P.A.James P. Anderson ,

Relevant Websites
Sr No

(Web address) (only if relevant to the course)

Salient Features

RW-1

http://people.csail.mit.edu/rivest/Rsapaper.pdf

Digital signature and its purpose to use

RW-2

http://www.rsa.com/rsalabs/node.asp?id=2262

To understand about Key management and its uses

RW-3

http://cse.iitkgp.ac.in/~debdeep/courses_iitkgp/Crypto/

Details of all cryptography techniques with examples

Audio Visual Aids


Sr No

(AV aids) (only if relevant to the course)

Salient Features

AV-1

http://orlingrabbe.com/des.htm

DES explanation

AV-2

http://www.codeproject.com/Articles/19538/Encrypt-Decrypt-String-using-DES-in-C

Encryption using DES

Software/Equipments/Databases
Sr No

(S/E/D) (only if relevant to the course)

Salient Features

SW-1

Turbo C/C++

Software for Practical Implementation

2.0

1.0

Virtual Labs
Sr No

(VL) (only if relevant to the course)

Salient Features

VL-1

http://deploy.virtual-labs.ac.in/labs/cse29/index.php

Practical implementation

*Each experiment of the lab will be evaluated using following relative scheme:
Component

% of Marks

J/E

100

Detailed Plan For Practicals


Practical No

Broad topic (Subtopic)

Practical Description

Learning Outcomes

Equipment Used

Practical 1

Substitution Technique(Caesar Cipher


Modified Caesar Cipher
Monoalphabetic Ciphers
Playfair Cipher
Hill Cipher
Polyalphabetic Ciphers
One-Time Pad)

Introduction to encryption and decryption


by applying a
Substitution Technique (No Practical
Evaluation will be conducted in first lab)

To understand about different


PC with C/C++
substitution ciphers to encrypt and
decrypt data also understand about key
space and its importance

Practical 2

Substitution Technique(Caesar Cipher


Modified Caesar Cipher
Monoalphabetic Ciphers
Playfair Cipher
Hill Cipher
Polyalphabetic Ciphers
One-Time Pad)

Introduction to encryption and decryption


by applying a
Substitution Technique (No Practical
Evaluation will be conducted in first lab)

To understand about different


PC with C/C++
substitution ciphers to encrypt and
decrypt data also understand about key
space and its importance

Practical 3

Substitution Technique(Caesar Cipher


Modified Caesar Cipher
Monoalphabetic Ciphers
Playfair Cipher
Hill Cipher
Polyalphabetic Ciphers
One-Time Pad)

Introduction to encryption and decryption


by applying a
Substitution Technique (No Practical
Evaluation will be conducted in first lab)

To understand about different


PC with C/C++
substitution ciphers to encrypt and
decrypt data also understand about key
space and its importance

Practical 4

Substitution Technique(Caesar Cipher


Modified Caesar Cipher
Monoalphabetic Ciphers
Playfair Cipher
Hill Cipher
Polyalphabetic Ciphers
One-Time Pad)

Introduction to encryption and decryption


by applying a
Substitution Technique (No Practical
Evaluation will be conducted in first lab)

To understand about different


PC with C/C++
substitution ciphers to encrypt and
decrypt data also understand about key
space and its importance

Practical 5

Transposition Techniques(Rail fence


technique- encryption and decryption
Column Transposition- encryption and
decryption)

Transposition cipher Method(Rail fence


technique- encryption and decryption)
Practical-7th is reserved for MTP

To make student aware of transposition PC with C/C++


ciphering technique rail fences

Practical 6

Transposition Techniques(Rail fence


technique- encryption and decryption
Column Transposition- encryption and
decryption)

Transposition cipher Method(Rail fence


technique- encryption and decryption)
Practical-7th is reserved for MTP

To make student aware of transposition PC with C/C++


ciphering technique rail fences

Practical 7

Transposition Techniques(Rail fence


technique- encryption and decryption
Column Transposition- encryption and
decryption)

Transposition cipher Method(Rail fence


technique- encryption and decryption)
Practical-7th is reserved for MTP

To make student aware of transposition PC with C/C++


ciphering technique rail fences

Practical 8

Symmetric ciphers: Simplified DES


Encryption and decryption using
Algorithm(Implement the encryption and Symmetric cipher
decryption of 8-bit data using Simplified
DES Algorithm)

Understand about the implementation


of
Symmetric cipher DES

PC with C/C++

Practical 9

Symmetric ciphers: Simplified DES


Encryption and decryption using
Algorithm(Implement the encryption and Symmetric cipher
decryption of 8-bit data using Simplified
DES Algorithm)

Understand about the implementation


of
Symmetric cipher DES

PC with C/C++

Practical 10

Public-Key Encryption(Rabin-Miller
Primality Testing Algorithm, Euclid
Algorithm to generate the GCD, RSA
algorithm)

Encryption and decryption using RSA


algorithm

To get students familiar with how to


provide security by applying the RSA
algorithm

PC with C/C++

Practical 11

Public-Key Encryption(Rabin-Miller
Primality Testing Algorithm, Euclid
Algorithm to generate the GCD, RSA
algorithm)

Encryption and decryption using RSA


algorithm

To get students familiar with how to


provide security by applying the RSA
algorithm

PC with C/C++

Practical 12

Public-Key Encryption(Rabin-Miller
Primality Testing Algorithm, Euclid
Algorithm to generate the GCD, RSA
algorithm)

Encryption and decryption using RSA


algorithm

To get students familiar with how to


provide security by applying the RSA
algorithm

PC with C/C++

Practical 13

Hashing and key management(Secure


hash algorithm ,Diffie-Hellman Key
Exchange Algorithm)

Key Management and 14th Practical Lab To understand how Key exchange
PC with C/C++
is reserved for ETP
algorithm Diffe Hellman is used and its
importance

Practical 14

Hashing and key management(Secure


hash algorithm ,Diffie-Hellman Key
Exchange Algorithm)

Key Management and 14th Practical Lab To understand how Key exchange
PC with C/C++
is reserved for ETP
algorithm Diffe Hellman is used and its
importance

SPILL OVER
Practical 15

Spill Over

You might also like