This document provides a list of experiments for the Cryptographic and System Security Lab course at A.C. Patil College of Engineering. It includes 10 experiments that cover topics like implementing symmetric and asymmetric ciphers, network reconnaissance tools, packet analysis, port scanning, ARP spoofing detection, DoS attack simulation, and setting up firewalls and intrusion detection systems. The experiments are mapped to 5 course outcomes related to applying cryptography, exploring security tools, analyzing network packets, setting up firewalls and intrusion detection, and exploring different types of attacks.
This document provides a list of experiments for the Cryptographic and System Security Lab course at A.C. Patil College of Engineering. It includes 10 experiments that cover topics like implementing symmetric and asymmetric ciphers, network reconnaissance tools, packet analysis, port scanning, ARP spoofing detection, DoS attack simulation, and setting up firewalls and intrusion detection systems. The experiments are mapped to 5 course outcomes related to applying cryptography, exploring security tools, analyzing network packets, setting up firewalls and intrusion detection, and exploring different types of attacks.
This document provides a list of experiments for the Cryptographic and System Security Lab course at A.C. Patil College of Engineering. It includes 10 experiments that cover topics like implementing symmetric and asymmetric ciphers, network reconnaissance tools, packet analysis, port scanning, ARP spoofing detection, DoS attack simulation, and setting up firewalls and intrusion detection systems. The experiments are mapped to 5 course outcomes related to applying cryptography, exploring security tools, analyzing network packets, setting up firewalls and intrusion detection, and exploring different types of attacks.
Department of Computer Engineering Academic Year 2023-24 List of Experiments Class : TE Course : Cryptographic and system security Lab Course Code :CSL602 Lab Outcomes Sr. No CO Code Course Outcomes Apply the knowledge of symmetric and asymmetric cryptography to implement simple 1. CSL602.1 ciphers. 2. CSL602.2 Explore the different network reconnaissance tools to gather information about networks. Explore and use tools like sniffers, port scanners and other related tools for analyzing 3. CSL602.3 packets in a Network. Set up firewalls and intrusion detection systems using open-source technologies and to 4. CSL602.4 explore email security. 5. CSL602.5 Explore various attacks like buffer-overflow and web application attack.
Sr. No Name of Experiment Mapped CO
Implementation of a product cipher using Substitution and Transposition 1 CSL602.1 ciphers Implementation and analysis of RSA cryptosystem / Digital signature scheme 2 CSL602.2 using RSA/El Gamal. 3 Implementation of Diffie Hellman Key exchange algorithm CSL602.2 4 Write program to demonstrate integrity of message using MD5/SHA-1 CSL602.2,3 Study the use of network reconnaissance tools like WHOIS, dig, traceroute, 5 CSL602.4 nslookup to gather information about networks and domain registrars. Study of packet sniffer tools : wireshark, : 1. Download and install wireshark and capture icmp, tcp, and http packets in CSL602.4 6 promiscuous mode. CSL602.5 2. Explore how the packets can be traced based on different filters. Download and install nmap/or equivalent tool. Use it with different options to CSL602.4 7 scan open ports, perform OS fingerprinting, do a ping scan, tcp port scan, udp CSL602.5 port scan, xmas scan etc. Detect ARP spoofing using nmap and/or open source tool ARPWATCH and CSL602.4 8 wireshark. Use arping tool to generate gratuitous arps and monitor using CSL602.5 wireshark 9 Simulate DOS attack using Hping, hping3 and other tools. CSL604.4,5 Set up IPSEC under LINUX. b) Set up Snort and study the logs & 10 CSL602.5 Setting up personal Firewall