






Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
A series of information security lab experiments conducted by students in the department of information technology at mahakal institute of technology, ujjain. The experiments cover fundamental principles of information security, implementation of various cryptographic algorithms such as des, aes, rsa, and diffie-hellman, as well as case studies on kerberos authentication and intrusion detection systems. Detailed objectives, theory, and expected viva questions for each experiment, allowing students to gain practical experience and understanding of information security concepts. This comprehensive lab manual serves as a valuable resource for students pursuing courses in information technology, computer science, or cybersecurity.
Typology: Study notes
1 / 12
This page cannot be seen from the preview
Don't miss anything!
S. No. Name of Experiment Date Sign Remark
(^5) Implement the Diffie-Hellman Key Exchange algorithm for a given problem. (^6) Calculate the message digest of a text using the SHA-1 algorithm.
(^7) Implement the SIGNATURE SCHEME - Digital Signature Standard.
(^8) Case study on Kerberos.
(^9) Demonstrate intrusion detection system (ids).
10 Case study on Firewall system and its principles.
Unit/Topic: 2/DES
Apply DES algorithm for practical applications.
To develop a program to implement Data Encryption Standard for encryption and decryption
Theory attached here with.
Q.1 The DES Algorithm Cipher System consists of how many rounds (iterations) each with a round key? Q.2 what is the key length of the DES algorithm? Q.3 In the DES algorithm, although the key size is 64 bits only 48bits are used for the encryption procedure, the rest are parity bits. Is it true or false? Q.4 In the DES algorithm how the Round Input is expanded to 48? Q.5 In the DES algorithm the 64 bit key input is shortened to 56 bits by ignoring every 4th bit. Is it true or false?
Unit/Topic: 2/AES
Apply AES algorithm for practical applications.
To develop a program to implement Advanced Encryption Standard for encryption and decryption
Theory attached here with
Q.1 what is AES? Q.2 how many different AES algorithm are used? Q.3 how to define key length of different AES?
Unit/Topic: 3/Diffie-Hellman
Implement the Diffie-Hellman Key Exchange algorithm for a given problem.
Develop a program to implement Diffie Hellman Key Exchange Algorithm for encryption and Decryption.
Theory attached here with
Q.1 what’s the difference between Diffie-Hellman and RSA? Q.2 why is Diffie-Hellman required when RSA is already used for key exchange in TLS? Q.3 what is Authenticated Diffie-Hellman Key Agreement? Q.4 why is RSA preferred over Diffie-Hellman if they are both used to establish shared key? Q.5 Is Diffie-Hellman key exchange based on one-way function or trapdoor function?
Unit/Topic: 3/SHA-
Calculate the message digest of a text using the SHA-1 algorithm.
Develop a program to implement Secure Hash Algorithm (SHA-1).
Theory attached here with
Q.1 SHA-1 produces a hash value of how many bits? Q.2 In SHA-512, the message is divided into blocks size of how many bits for the hash computation? Q.3 what is the size of W (in bits) in the SHA-512 processing of a single 1024- bit block? Q.4 what is the maximum length of the message (in bits) that can be taken by SHA-512?
Unit/Topic: 4/Authentication
Case study on Kerberos
To understand the concept of Kerberos
Theory attached here with
Q.1 How Kerberos works? Q.2 Explain KDC in detail?
Unit/Topic: 5/IDS
Demonstrate intrusion detection system (ids).
To demonstrate intrusion detection system (ids) using the tool snort
Theory attached here with
Q.1 when discussing IDS/IPS, what is a signature? Q.2 What Is Ips and Ids? Q.3 what are the functions of Intrusion Detection? Q.4 what is an Intrusion Detection System?