Professional Documents
Culture Documents
CNS Lab Course File
CNS Lab Course File
Course File
for
Cryptography & Network Security Lab
(R2032056)
R20 / III Year – II Sem / CSE – C
Prepared by
Innovation and Professional Skills in Engineering & Technology, Management with Human
INSTITUTION MISSION
• To Provide Student-centric education and training on latest Technologies through
Interactive Learning, Hands on Experience and make the Students Globally Competitive,
• To Create an Environment to address the emerging needs through Quality Education with
PRINCIPAL
DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
Vision
To promote Innovation centric education in the field of Computer Science with Knowledge
on Cutting edge Technology with competence as professionals having human values and leadership
qualities.
Mission
To provide high quality learning ambience with well qualified and motivated faculty for the
students, and equip them with the state-of-the-art knowledge and skills in computer science
that they need to take up real-world challenges.
To provide exposure of cutting-edge tools and technologies in the area of Computer Science
and Engineering by entering in to collaboration with industry and academia.
PEO 1: To provide students with strong foundational concepts and also advanced techniques and tools
in order to enable them to build software solutions or systems of various complexity level.
PEO 2: Involve in lifelong learning to ensure the sustainable development in the emerging areas of
latest technology.
PEO 3: Possess the ability to collaborate as team members and team leaders to facilitate cutting-edge
technical solutions for computing systems and thereby providing improved functionality
PEO 4: Use their skills in ethical & professional manner to raise the satisfaction level of stake holders
with good communication skills and leadership qualities.
PEO 5: Utilize innovative and advanced technology that would enhance the research skills that would
best benefit the ever-changing industrial demands and societal needs.
HOD-CSE
DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
PROGRAM OUTCOMES (POs)
PO No PROGRAM OUTCOME
PO-1 Computational Knowledge: Apply knowledge of computing fundamentals, computing specialization,
mathematics, and domain knowledge appropriate for the computing specialization to the abstraction and
conceptualization of computing models from defined problems and requirements.
PO-2 Problem Analysis: Identify, formulate, research literature, and solve complex computing problems reaching
substantiated conclusions using fundamental principles of mathematics, computing sciences, and relevant domain
disciplines.
PO-3 Design /Development of Solutions: Design and evaluate solutions for complex computing problems, and design
and evaluate systems, components, or processes that meet specified needs with appropriate consideration for
public health and safety, cultural, societal, and environmental considerations.
PO-4 Conduct investigations of complex Computing problems: Use research-based knowledge and research
methods including design of experiments, analysis and interpretation of data, and synthesis of the information to
provide valid conclusions.
PO-5 Modern Tool Usage: Create, select, adapt and apply appropriate techniques, resources, and modern computing
tools to complex computing activities, with an understanding of the limitations.
PO-6 Professional Ethics: Understand and commit to professional ethics and cyber regulations, responsibilities, and
norms of professional computing practices.
PO-7 Life-long Learning: Recognize the need, and have the ability, to engage in independent learning for continual
development as a computing professional.
PO-8 Project management and finance: Demonstrate knowledge and understanding of the computing and
management principles and apply these to one’s own work, as a member and leader in a team, to manage projects
and in multidisciplinary environments.
PO-9 Communication Efficacy: Communicate effectively with the computing community, and with society at large,
about complex computing activities by being able to comprehend and write effective reports, design
documentation, make effective presentations, and give and understand clear instructions.
PO-10 Societal and Environmental Concern: Understand and assess societal, environmental, health, safety, legal, and
cultural issues within local and global contexts, and the consequential responsibilities relevant to professional
computing practices.
PO-11 Individual and Team Work: Function effectively as an individual and as a member or leader in diverse teams
and in multidisciplinary environments.
PO-12 Innovation and Entrepreneurship: Identify a timely opportunity and using innovation to pursue that
opportunity to create value and wealth for the betterment of the individual and society at large.
Ability to understand principles and working of computer by knowing key concepts of hardware and software.
PSO1 Analyze real time problems, design algorithms and develop methodologies & software applications for
problem solving.
Ability to understand the structure and development methodologies of software systems. Possess professional
PSO2 skills and knowledge of software design process. Familiarity and practical competence with a broad range of
programming language and open-source platforms.
Motivated to identify research gaps and provide solutions by inculcating innovative ideas & using modern
PSO3
tools. Passion for higher studies & lifelong learning.
HOD-CSE
DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
Lab Course : Cryptography and Network Security Lab Class : III/II CSE-C
COURSE OUTCOMES
Blooms Knowledge
CO No COURSE OUTCOME
Taxonomy Level Level
Understanding
Analyze and implement public key algorithms using
C3256.4 Applying K1, K3, K4
RSA and Diffie-Hellman Key Exchange mechanisms.
Analyzing
Understanding
Analyze and implement the message digest of a text
C3256.5 Applying K1, K3, K4
using the SHA-1 algorithm
Analyzing
FACULTY
DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
Lab Course : Cryptography and Network Security Lab Class : III/II CSE-C
List of Experiments
CO
S.No Name of the Experiment
Mapped
Write a C program that contains a string (char pointer) with a value \Hello
1. World’. The program should XOR each character in this string with 0 and C3256.1
displays the result.
Write a C program that contains a string (char pointer) with a value \Hello
2. World’. The program should AND or and XOR each character in this string C3256.1
with 127 and display the result
Write a Java program to perform encryption and decryption using the following
algorithms:
3. a) Ceaser Cipher C3256.2
b) Substitution Cipher
c) Hill Cipher
4. Write a Java program to implement the DES algorithm logic C3256.3
5. Write a C/JAVA program to implement the BlowFish algorithm logic C3256.3
ADDITIONAL EXPERIMENTS
CO
S.No Name of the Experiment
Mapped
Write a program to perform encryption and decryption using transposition
1. C3256.2
technique with column permutation given as key.
Implement RSA algorithm using client-server concept. The program should
support the following
2. a) Client generates {PU, PR} and distributes PU to Server.
b) Sever encrypts message M using client’s public key {PU}.
c) Client decrypts the message sent by server using its private key {PR}.
DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
A.Y. : 2023 – 2024 Class : III / II – C
Faculty : Kallam Gopala Reddy Lab Course : CNS Lab
COURSE OUTCOMES
Blooms Knowledge
CO No COURSE OUTCOME
Taxonomy Level Level
Apply fundamental operations required for cryptography Understanding
C3256.1 K1, K3
such as Exclusive-OR and bitwise AND on data. Applying
Apply the knowledge of symmetric cryptography to
Understanding
C3256.2 implement encryption and decryption using Caeser K1, K3
Applying
Cipher, Substitution Cipher, Hill Cipher.
Understanding
Demonstrate encryption and decryption using Block
C3256.3 Applying K1, K3
Ciphers like DES, BlowFish, and Rijndael Algorithms.
Understanding
Analyze and implement public key algorithms using
C3256.4 Applying K1, K3, K4
RSA and Diffie-Hellman Key Exchange mechanisms.
Analyzing
Understanding
Analyze and implement the message digest of a text
C3256.5 Applying K1, K3, K4
using the SHA-1 algorithm
Analyzing
FACULTY
DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
Target Level of CO
FACULTY
DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
SCHEDULE OF EXPERIMENTS
A.Y. : 2023 – 2024 Class : III / II – C
Faculty : Kallam Gopala Reddy Lab Course : CNS Lab
Expt. Scheduled Date of
Name of the Experiment
No Date Conduction
Write a C program that contains a string (char pointer) with a
1 11-01-2024 value \Hello World’. The program should XOR each character in
this string with 0 and displays the result.
Write a C program that contains a string (char pointer) with a
2 11-01-2024 value \Hello World’. The program should AND or and XOR each
character in this string with 127 and display the result
Write a Java program to perform encryption and decryption using
3 18-01-2024 the following algorithms:
a) Ceaser Cipher
Write a Java program to perform encryption and decryption using
the following algorithms:
3 25-01-2024 b) Substitution Cipher
c) Hill Cipher
4 01-02-2024 Write a Java program to implement the DES algorithm logic
Write a C/JAVA program to implement the BlowFish algorithm
5 08-02-2024 logic
Write a C/JAVA program to implement the Rijndael algorithm
6 15-02-2024 logic.
Using Java Cryptography, encrypt the text “Hello world” using
7 22-02-2024 BlowFish. Create your own key using Java key tool.
8 07-03-2024 Write a Java program to implement RSA Algorithm
Implement the Diffie-Hellman Key Exchange mechanism using
9 14-03-2024 HTML and JavaScript. Consider the end user as one of the parties
(Alice) and the JavaScript application as other party (bob).
Calculate the message digest of a text using the SHA-1 algorithm
10 21-03-2024 in JAVA.
Additional Experiments
Expt. Scheduled Date of
Name of the Experiment
No Date Conduction
Write a program to perform encryption and decryption using
28-03-2024 transposition technique with column permutation given as key.
Implement RSA algorithm using client-server concept. The
program should support the following
a) Client generates {PU, PR} and distributes PU to Server.
04-04-2024 b) Sever encrypts message M using client’s public key
{PU}.
c) Client decrypts the message sent by server using its
private key {PR}.
FACULTY
FACULTY HoD
DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
HOD’s REVIEW
Description
Date of Review Signature of HOD
Auditee Auditor
Date of Audit Report of Observations/ Remarks
Signature Signature