You are on page 1of 3

Government Polytechnic For Girls, Surat

Department of Information Technology

Subject: Web & Network Security Term Duration: 10/12/2020 To 01/05/2021


Name of Faculty: Batch:
Name of Student: Enrollment No.:

INDEX

Sr. Practical Name CO Level Date (U) (P) (I) Total Sign
No
1 Write a program to implement 1 U
RSA algorithm.
(A.) GCD & Inverse Module (B.)
Key Generation (C.) Encryption &
Decryption
2 Insatll and study Message Digest 2 AP
(MD5) calculator. Take 5 different
application executables and check
their MD5.
3 Insatll and study hash calculator. 2 AP
Take 5 different application
executables and generate is
Secure Hash Algorithm (SHA-256,
SHA-512) sum.
4 Compare and contrast various 2 AP
Hash algorithms.
5 Write a paper review on Digital 2 AP
Signature.
6 Install Wireshark tool for packet 3 AN
capture.
7 Inspect IP packets and identify 3 AN
source and destination IP using
the wireshark tool
8 Prepare a presentation on real life 3 AN
application of SSL Protocol Stack.
9 Identify you operating system. 3 AN
Update the OS and identify
updates.
10 Prepare a presentation on 3D 3 AN
authentication for monetary
transactions (SET) with real life
example.
11 Install and configure an Antivirus 3 AN
for Network security
12 Install and configure few features 3 AN
of Firewall for Network security
U=Understanding of Topic, P=Presentation/Documentation, I=Involvement in Practical
Rubrics for practical evaluation

Criteria Marks Excellent (100%) Adequate (70%) Poor (40%)

UNDERSTANDING OF 4 Able to define & Able to define concept Not able to define
CONCEPT (U) explain concept but not able to explain and explain
properly and able to it properly. concept.
identify application of
concept.
PRESENTATION/ 3 No error/bugs, well At some places, Not well
DOCUMENTATION (P) commented, comments are missing, commented,
formatting is done as formatting is not well Formatting is not
per given format as per given format done.

INVOLVEMENT IN 3 Done personally Done personally with Done personally


PRACTICAL (I) without help of other help of other with help of book
and internet
Additional Practical List

1. Write a C program to implement MD5.


2. Write a C program to implement SHA-1.
3. Write a C program to implement digital signature.

You might also like