You are on page 1of 14

Department of

Computer Science & Engineering

Course File
for
Cryptography & Network Security Lab
(R2032056)
R20 / III Year – II Sem / CSE – C

Prepared by

Mr. Kallam Gopala Reddy


Associate Professor

Ramachandra College of Engineering, Eluru


(Approved by AICTE New Delhi; Affiliated to JNTUK- Kakinada,
Accredited by NBA & NAAC with A+ Grade)
DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
A.Y. : 2023 – 2024 Class : III / II – C
Faculty : Kallam Gopala Reddy Lab Course : CNS Lab
List of Enclosures
S. No. Description Enclosed/Not Enclosed

1. Institute Vision & Mission


2. Department Vision, Mission & PEOs
3. POs /PSOs
4. Academic Calendar
5. Time Table
6. Nominal Roll List
7. Lab Course Outcomes
8. List of Experiments
9. CO-PO/PSO Mapping
10. Target Level of COs
11. Schedule of Experiments
12. Day to Day Evaluation sheet
13. Internal Exam Question Paper
14. Scheme of Valuation
15. Internal Marks
16. COs Assessment & CO-PO Attainment
17. COs not attained & Actions suggested
18. Attendance Registers
19. Lab Manual
20. HoD’s review and Audit Report

Faculty HoD Dean Principal


INSTITUTION VISION
To Emerge as a distinguished “Centre of Excellence” through Academics, Research,

Innovation and Professional Skills in Engineering & Technology, Management with Human

Values and Leadership Qualities to serve the need of the Nation.

INSTITUTION MISSION
• To Provide Student-centric education and training on latest Technologies through

Interactive Learning, Hands on Experience and make the Students Globally Competitive,

socially responsible Citizens.

• To Create an Environment to address the emerging needs through Quality Education with

Professional Skills and Leadership Qualities to become Employable/Entrepreneurs.

• To conduct collaborative Programmes, Partnering with Institutions, Industries, and

Individuals of National and International repute.

PRINCIPAL
DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
Vision
To promote Innovation centric education in the field of Computer Science with Knowledge
on Cutting edge Technology with competence as professionals having human values and leadership
qualities.

Mission

 To provide high quality learning ambience with well qualified and motivated faculty for the
students, and equip them with the state-of-the-art knowledge and skills in computer science
that they need to take up real-world challenges.

 To Enhance innovativeness, multidisciplinary skills, leadership qualities, work ethics, soci-


etal responsibilities and industry readiness among students.

 To provide exposure of cutting-edge tools and technologies in the area of Computer Science
and Engineering by entering in to collaboration with industry and academia.

Program Educational Objectives (PEO’s)

PEO 1: To provide students with strong foundational concepts and also advanced techniques and tools
in order to enable them to build software solutions or systems of various complexity level.

PEO 2: Involve in lifelong learning to ensure the sustainable development in the emerging areas of
latest technology.

PEO 3: Possess the ability to collaborate as team members and team leaders to facilitate cutting-edge
technical solutions for computing systems and thereby providing improved functionality

PEO 4: Use their skills in ethical & professional manner to raise the satisfaction level of stake holders
with good communication skills and leadership qualities.

PEO 5: Utilize innovative and advanced technology that would enhance the research skills that would
best benefit the ever-changing industrial demands and societal needs.

HOD-CSE
DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
PROGRAM OUTCOMES (POs)

PO No PROGRAM OUTCOME
PO-1 Computational Knowledge: Apply knowledge of computing fundamentals, computing specialization,
mathematics, and domain knowledge appropriate for the computing specialization to the abstraction and
conceptualization of computing models from defined problems and requirements.
PO-2 Problem Analysis: Identify, formulate, research literature, and solve complex computing problems reaching
substantiated conclusions using fundamental principles of mathematics, computing sciences, and relevant domain
disciplines.
PO-3 Design /Development of Solutions: Design and evaluate solutions for complex computing problems, and design
and evaluate systems, components, or processes that meet specified needs with appropriate consideration for
public health and safety, cultural, societal, and environmental considerations.
PO-4 Conduct investigations of complex Computing problems: Use research-based knowledge and research
methods including design of experiments, analysis and interpretation of data, and synthesis of the information to
provide valid conclusions.
PO-5 Modern Tool Usage: Create, select, adapt and apply appropriate techniques, resources, and modern computing
tools to complex computing activities, with an understanding of the limitations.
PO-6 Professional Ethics: Understand and commit to professional ethics and cyber regulations, responsibilities, and
norms of professional computing practices.
PO-7 Life-long Learning: Recognize the need, and have the ability, to engage in independent learning for continual
development as a computing professional.
PO-8 Project management and finance: Demonstrate knowledge and understanding of the computing and
management principles and apply these to one’s own work, as a member and leader in a team, to manage projects
and in multidisciplinary environments.
PO-9 Communication Efficacy: Communicate effectively with the computing community, and with society at large,
about complex computing activities by being able to comprehend and write effective reports, design
documentation, make effective presentations, and give and understand clear instructions.
PO-10 Societal and Environmental Concern: Understand and assess societal, environmental, health, safety, legal, and
cultural issues within local and global contexts, and the consequential responsibilities relevant to professional
computing practices.
PO-11 Individual and Team Work: Function effectively as an individual and as a member or leader in diverse teams
and in multidisciplinary environments.
PO-12 Innovation and Entrepreneurship: Identify a timely opportunity and using innovation to pursue that
opportunity to create value and wealth for the betterment of the individual and society at large.

PROGRAM SPECIFIC OUTCOMES (PSOs)

Ability to understand principles and working of computer by knowing key concepts of hardware and software.
PSO1 Analyze real time problems, design algorithms and develop methodologies & software applications for
problem solving.
Ability to understand the structure and development methodologies of software systems. Possess professional
PSO2 skills and knowledge of software design process. Familiarity and practical competence with a broad range of
programming language and open-source platforms.
Motivated to identify research gaps and provide solutions by inculcating innovative ideas & using modern
PSO3
tools. Passion for higher studies & lifelong learning.

HOD-CSE
DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING

Lab Course : Cryptography and Network Security Lab Class : III/II CSE-C

COURSE OUTCOMES

Blooms Knowledge
CO No COURSE OUTCOME
Taxonomy Level Level

Apply fundamental operations required for cryptography Understanding


C3256.1 K1, K3
such as Exclusive-OR and bitwise AND on data. Applying

Apply the knowledge of symmetric cryptography to


Understanding
C3256.2 implement encryption and decryption using Caeser K1, K3
Applying
Cipher, Substitution Cipher, Hill Cipher.
Understanding
Demonstrate encryption and decryption using Block
C3256.3 Applying K1, K3
Ciphers like DES, BlowFish, and Rijndael Algorithms.

Understanding
Analyze and implement public key algorithms using
C3256.4 Applying K1, K3, K4
RSA and Diffie-Hellman Key Exchange mechanisms.
Analyzing
Understanding
Analyze and implement the message digest of a text
C3256.5 Applying K1, K3, K4
using the SHA-1 algorithm
Analyzing

FACULTY
DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING

Lab Course : Cryptography and Network Security Lab Class : III/II CSE-C

List of Experiments

CO
S.No Name of the Experiment
Mapped
Write a C program that contains a string (char pointer) with a value \Hello
1. World’. The program should XOR each character in this string with 0 and C3256.1
displays the result.
Write a C program that contains a string (char pointer) with a value \Hello
2. World’. The program should AND or and XOR each character in this string C3256.1
with 127 and display the result
Write a Java program to perform encryption and decryption using the following
algorithms:
3. a) Ceaser Cipher C3256.2
b) Substitution Cipher
c) Hill Cipher
4. Write a Java program to implement the DES algorithm logic C3256.3
5. Write a C/JAVA program to implement the BlowFish algorithm logic C3256.3

6. Write a C/JAVA program to implement the Rijndael algorithm logic. C3256.3


Using Java Cryptography, encrypt the text “Hello world” using BlowFish.
7. C3256.3
Create your own key using Java key tool.
8. Write a Java program to implement RSA Algorithm C3256.4
Implement the Diffie-Hellman Key Exchange mechanism using HTML and
9. JavaScript. Consider the end user as one of the parties (Alice) and the C3256.4
JavaScript application as other party (bob).
10. Calculate the message digest of a text using the SHA-1 algorithm in JAVA. C3256.5

ADDITIONAL EXPERIMENTS

CO
S.No Name of the Experiment
Mapped
Write a program to perform encryption and decryption using transposition
1. C3256.2
technique with column permutation given as key.
Implement RSA algorithm using client-server concept. The program should
support the following
2. a) Client generates {PU, PR} and distributes PU to Server.
b) Sever encrypts message M using client’s public key {PU}.
c) Client decrypts the message sent by server using its private key {PR}.
DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
A.Y. : 2023 – 2024 Class : III / II – C
Faculty : Kallam Gopala Reddy Lab Course : CNS Lab
COURSE OUTCOMES

Blooms Knowledge
CO No COURSE OUTCOME
Taxonomy Level Level
Apply fundamental operations required for cryptography Understanding
C3256.1 K1, K3
such as Exclusive-OR and bitwise AND on data. Applying
Apply the knowledge of symmetric cryptography to
Understanding
C3256.2 implement encryption and decryption using Caeser K1, K3
Applying
Cipher, Substitution Cipher, Hill Cipher.
Understanding
Demonstrate encryption and decryption using Block
C3256.3 Applying K1, K3
Ciphers like DES, BlowFish, and Rijndael Algorithms.
Understanding
Analyze and implement public key algorithms using
C3256.4 Applying K1, K3, K4
RSA and Diffie-Hellman Key Exchange mechanisms.
Analyzing
Understanding
Analyze and implement the message digest of a text
C3256.5 Applying K1, K3, K4
using the SHA-1 algorithm
Analyzing

COs – POs/PSOs Relationship Matrix


(Levels of Matrix: 3-High Level, 2-Moderate Level and 1-Low Level of attainments).
CO-PO/ PSO Matrix
PO No CSO No
CO Code
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
C3256.1 2 1 1 1 1 1 - - 1 - - 1 1 1 1
C3256.2 2 2 2 2 1 1 - - 1 - - 1 1 1 1
C3256.3 1 2 1 1 1 1 - - 1 - - 1 1 2 2
C3256.4 2 2 2 2 2 1 - - 2 - - 1 1 1 1
C3256.5 1 1 1 1 1 1 - - 1 - - 1 2 1 1
Average of
1.6 1.6 1.4 1.4 1.2 1 ** ** 1.2 ** ** 1 1.2 1.2 1.2
Attainments
Ex Ex Exp Ex
Mapped POs & PSOs: PO1, PO2, PO3, PO4, PO5, PO6, PO9, PO12, PSO1, PSO2, PSO3

FACULTY
DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
Target Level of CO

A.Y. : 2023 – 2024 Class : III / II – C


Faculty : Kallam Gopala Reddy Lab Course : CNS Lab

Lab Course Target attainment Details:


Expected Pass Percentage : 95%
Target level of COs Attainment :

COs CO-1 CO-2 CO-3 CO-4 CO-5


Target Level of
Attainment

FACULTY
DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
SCHEDULE OF EXPERIMENTS
A.Y. : 2023 – 2024 Class : III / II – C
Faculty : Kallam Gopala Reddy Lab Course : CNS Lab
Expt. Scheduled Date of
Name of the Experiment
No Date Conduction
Write a C program that contains a string (char pointer) with a
1 11-01-2024 value \Hello World’. The program should XOR each character in
this string with 0 and displays the result.
Write a C program that contains a string (char pointer) with a
2 11-01-2024 value \Hello World’. The program should AND or and XOR each
character in this string with 127 and display the result
Write a Java program to perform encryption and decryption using
3 18-01-2024 the following algorithms:
a) Ceaser Cipher
Write a Java program to perform encryption and decryption using
the following algorithms:
3 25-01-2024 b) Substitution Cipher
c) Hill Cipher
4 01-02-2024 Write a Java program to implement the DES algorithm logic
Write a C/JAVA program to implement the BlowFish algorithm
5 08-02-2024 logic
Write a C/JAVA program to implement the Rijndael algorithm
6 15-02-2024 logic.
Using Java Cryptography, encrypt the text “Hello world” using
7 22-02-2024 BlowFish. Create your own key using Java key tool.
8 07-03-2024 Write a Java program to implement RSA Algorithm
Implement the Diffie-Hellman Key Exchange mechanism using
9 14-03-2024 HTML and JavaScript. Consider the end user as one of the parties
(Alice) and the JavaScript application as other party (bob).
Calculate the message digest of a text using the SHA-1 algorithm
10 21-03-2024 in JAVA.

Additional Experiments
Expt. Scheduled Date of
Name of the Experiment
No Date Conduction
Write a program to perform encryption and decryption using
28-03-2024 transposition technique with column permutation given as key.
Implement RSA algorithm using client-server concept. The
program should support the following
a) Client generates {PU, PR} and distributes PU to Server.
04-04-2024 b) Sever encrypts message M using client’s public key
{PU}.
c) Client decrypts the message sent by server using its
private key {PR}.
FACULTY

DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING


A.Y. : 2023 – 2024 Class : III / II - C
Faculty : Kallam Gopala Reddy Lab Course : CNS Lab
Data-to-Day Evaluation Record Internal Exam Total Marks
S.No Roll No
Marks(5M) Marks(5) Marks(5) (15)
1. 21ME1A0503
2. 21ME1A0523
3. 21ME1A0550
4. 21ME1A0562
5. 21ME1A0566
6. 21ME1A0568
7. 21ME1A0572
8. 21ME1A0575
9. 21ME1A0580
10. 21ME1A0581
11. 21ME1A0586
12. 21ME1A0587
13. 21ME1A0589
14. 21ME1A0590
15. 21ME1A0591
16. 21ME1A0592
17. 21ME1A0594
18. 21ME1A0595
19. 21ME1A0597
20. 21ME1A0598
21. 21ME1A05A0
22. 21ME1A05A2
23. 21ME1A05A3
24. 21ME1A05A4
25. 21ME1A05A6
Data-to-Day Evaluation Record Internal Exam Total Marks
S.No Roll No
Marks(5M) Marks(5) Marks(5) (15)
26. 21ME1A05A8
27. 21ME1A05A9
28. 21ME1A05B0
29. 21ME1A05B2
30. 21ME1A05B7
31. 21ME1A05B9
32. 21ME1A05C4
33. 21ME1A05C5
34. 21ME1A05D0
35. 21ME1A05D3
36. 21ME1A05D4
37. 21ME1A05D5
38. 21ME1A05D6
39. 21ME1A05D7
40. 21ME1A05D8
41. 21ME1A05E1
42. 21ME1A05E2
43. 21ME1A05E3
44. 21ME1A05E4
45. 21ME1A05E5
46. 21ME1A05E7
47. 21ME1A05E9
48. 21ME1A05F0
49. 21ME1A05F1
50. 21ME1A05F2
51. 21ME1A05F4
52. 21ME1A05F5
53. 21ME1A05F7
54. 21ME1A05F8
55. 21ME1A05F9
56. 21ME1A05G0
57. 21ME1A05G2
58. 21ME1A05G3
59. 21ME1A05G4
60. 21ME1A05G5
Data-to-Day Evaluation Record Internal Exam Total Marks
S.No Roll No
Marks(5M) Marks(5) Marks(5) (15)
61. 21ME1A05G6
62. 21ME1A05G7
63. 21ME1A05G8
64. 21ME1A05H1
65. 21ME1A05H2
66. 21ME1A05H3
67. 21ME1A05H5
68. 21ME1A05H6
69. 21ME1A05H7
70. 21ME1A05H8
71. 21ME1A05H9
72. 21ME1A05I2
73. 21ME1A05I3
74. 21ME1A05I4
75. 21ME1A05I5
76. 21ME1A05I7
77. 21ME1A05I8
78. 21ME1A05J0
79. 21ME1A05J1
80. 21ME1A05J3
81. 21ME1A05J5
82. 21ME1A05J6
83. 21ME1A05J7
84. 22ME5A0503
85. 22ME5A0506
86. 22ME5A0507
87. 22ME5A0509
88. 22ME5A0510
89. 22ME5A0512

FACULTY HoD
DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
HOD’s REVIEW

Description
Date of Review Signature of HOD

Review of Cycle-1 Experiments

Review of Cycle-2 Experiments

Review of CO-PO attainments

Details of Internal Quality Academic Audit

Auditee Auditor
Date of Audit Report of Observations/ Remarks
Signature Signature

You might also like