Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Information Security Lab Experiments, Study notes of Information Security and Markup Languages

A series of information security lab experiments conducted by students in the department of information technology at mahakal institute of technology, ujjain. The experiments cover fundamental principles of information security, implementation of various cryptographic algorithms such as des, aes, rsa, and diffie-hellman, as well as case studies on kerberos authentication and intrusion detection systems. Detailed objectives, theory, and expected viva questions for each experiment, allowing students to gain practical experience and understanding of information security concepts. This comprehensive lab manual serves as a valuable resource for students pursuing courses in information technology, computer science, or cybersecurity.

Typology: Study notes

2023/2024

Uploaded on 05/03/2024

chandni-sikarwar
chandni-sikarwar 🇮🇳

3 documents

1 / 12

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
DEPARTMENT OF
INFORMATION TECHNOLOGY
Name of Student:
…………………..
Name of Lab :
Information Security
Subject Code :
IT-801
Branch :
Information Technology
Year/Sem :
IV/VIII
Affiliated to Rajiv Gandhi Prodyogiki Vishwavidyalaya, Bhopal (MP)
MAHAKAL INSTITUTE OF TECHNOLOGY,
UJJAIN
Approved By: All India Council of Technical Education
(New Delhi)
pf3
pf4
pf5
pf8
pf9
pfa

Partial preview of the text

Download Information Security Lab Experiments and more Study notes Information Security and Markup Languages in PDF only on Docsity!

DEPARTMENT OF

INFORMATION TECHNOLOGY

Name of Student: …………………..

Name of Lab : Information Security

Subject Code : IT-

Branch : Information Technology

Year/Sem : IV/VIII

Affiliated to Rajiv Gandhi Prodyogiki Vishwavidyalaya, Bhopal (MP)

MAHAKAL INSTITUTE OF TECHNOLOGY,

UJJAIN

Approved By: All India Council of Technical Education
(New Delhi)

INDEX

S. No. Name of Experiment Date Sign Remark

  1. (^) Study the fundamental principles of information security.
  2. (^) Apply DES algorithm for practical applications.
  3. (^) Apply AES algorithm for practical applications.
  4. (^) Implement RSA Algorithm using HTML and JavaScript.

(^5) Implement the Diffie-Hellman Key Exchange algorithm for a given problem. (^6) Calculate the message digest of a text using the SHA-1 algorithm.

(^7) Implement the SIGNATURE SCHEME - Digital Signature Standard.

(^8) Case study on Kerberos.

(^9) Demonstrate intrusion detection system (ids).

10 Case study on Firewall system and its principles.

Unit/Topic: 2/DES

PROBLEM DEFINITION:

Apply DES algorithm for practical applications.

OBJECTIVE:

To develop a program to implement Data Encryption Standard for encryption and decryption

THEORY INVOLVED:

Theory attached here with.

EXPECTED VIVA QUESTIONS:

Q.1 The DES Algorithm Cipher System consists of how many rounds (iterations) each with a round key? Q.2 what is the key length of the DES algorithm? Q.3 In the DES algorithm, although the key size is 64 bits only 48bits are used for the encryption procedure, the rest are parity bits. Is it true or false? Q.4 In the DES algorithm how the Round Input is expanded to 48? Q.5 In the DES algorithm the 64 bit key input is shortened to 56 bits by ignoring every 4th bit. Is it true or false?

SIGNATURE:
NAME OF FACULTY: Prof. Chandni Sikarwar

Unit/Topic: 2/AES

PROBLEM DEFINITION:

Apply AES algorithm for practical applications.

OBJECTIVE:

To develop a program to implement Advanced Encryption Standard for encryption and decryption

THEORY INVOLVED:

Theory attached here with

EXPECTED VIVA QUESTIONS:

Q.1 what is AES? Q.2 how many different AES algorithm are used? Q.3 how to define key length of different AES?

SIGNATURE:
NAME OF FACULTY: Prof. Chandni Sikarwar

Unit/Topic: 3/Diffie-Hellman

PROBLEM DEFINITION:

Implement the Diffie-Hellman Key Exchange algorithm for a given problem.

OBJECTIVE:

Develop a program to implement Diffie Hellman Key Exchange Algorithm for encryption and Decryption.

THEORY INVOLVED:

Theory attached here with

EXPECTED VIVA QUESTIONS:

Q.1 what’s the difference between Diffie-Hellman and RSA? Q.2 why is Diffie-Hellman required when RSA is already used for key exchange in TLS? Q.3 what is Authenticated Diffie-Hellman Key Agreement? Q.4 why is RSA preferred over Diffie-Hellman if they are both used to establish shared key? Q.5 Is Diffie-Hellman key exchange based on one-way function or trapdoor function?

SIGNATURE:
NAME OF FACULTY: Prof. Chandni Sikarwar

Unit/Topic: 3/SHA-

PROBLEM DEFINITION:

Calculate the message digest of a text using the SHA-1 algorithm.

OBJECTIVE:

Develop a program to implement Secure Hash Algorithm (SHA-1).

THEORY INVOLVED:

Theory attached here with

EXPECTED VIVA QUESTIONS:

Q.1 SHA-1 produces a hash value of how many bits? Q.2 In SHA-512, the message is divided into blocks size of how many bits for the hash computation? Q.3 what is the size of W (in bits) in the SHA-512 processing of a single 1024- bit block? Q.4 what is the maximum length of the message (in bits) that can be taken by SHA-512?

SIGNATURE:
NAME OF FACULTY: Prof. Chandni Sikarwar

Unit/Topic: 4/Authentication

PROBLEM DEFINITION:

Case study on Kerberos

OBJECTIVE:

To understand the concept of Kerberos

THEORY INVOLVED:

Theory attached here with

EXPECTED VIVA QUESTIONS:

Q.1 How Kerberos works? Q.2 Explain KDC in detail?

SIGNATURE:
NAME OF FACULTY: Prof. Chandni Sikarwar

Unit/Topic: 5/IDS

PROBLEM DEFINITION:

Demonstrate intrusion detection system (ids).

OBJECTIVE:

To demonstrate intrusion detection system (ids) using the tool snort

THEORY INVOLVED:

Theory attached here with

EXPECTED VIVA QUESTIONS:

Q.1 when discussing IDS/IPS, what is a signature? Q.2 What Is Ips and Ids? Q.3 what are the functions of Intrusion Detection? Q.4 what is an Intrusion Detection System?

SIGNATURE:
NAME OF FACULTY: Prof. Chandni Sikarwar