Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

B.E / B.Tech.

PRACTICAL END SEMESTER EXAMINATIONS


Seventh Semester

IT8761 Security Laboratory


(Regulations 2017)

Time : 3 Hours Answer any one Question Max. Marks 100

Aim/Principle/Apparatus Tabulation/Circuit/ Calculation Viva-Voce Record Total


required/Procedure Program/Drawing & Results
20 40 20 10 10 100

1. Implement the RSA Algorithm using HTML and JavaScript. Consider the end user as one of the
parties (Alice) and the JavaScript application as other party (Bob).

2. Calculate the message digest of a text using the SHA-1 algorithm.

3. Write a Java/C/C++ program to implement the DES algorithm logic.

4. a) Write a Java/C/C++ program to implement substitution technique using Caesar cipher


algorithm with shift key = 19.

b) Implement and show how to protect your system from Malware using Rootkit Hunter.

5. Write a Java/C/C++ program to implement Playfair cipher algorithm with the keyword “Hello
World”.

6. a) Write a program to implement hill cipher algorithm to perform encryption using 3*3 key
matrix.

b) Implement a Vulnerability Assessment tool, N-stalker and show how it protects your system.

7. a) Write a program to implement hill cipher algorithm to perform decryption using 3*3 inverse
key matrix.

b) Implement and show how to protect your system from Malware using Building Trojans.

Page 1 of 3
8. a) Write a Java/C/C++ program to implement Vigénere cipher which encrypts the plaintext
“ATTACK AT DAWN” using the keyword “LEMON”.

b) Implement IDS in your system and show how intrusion is detected.

9. a) Write a Java/C/C++ program to implement rail fence algorithm with a depth of 4.

b) Demonstrate the Installation of Rootkit Hunter and explore its various options.

10. Write a Java/C/C++ program to implement the AES algorithm logic.

11. a) Implement the Diffie-Hellman Key Exchange mechanism to share secret key between two end
users (Alice & Bob).

b) Implement Rootkit Hunter and show how to protect your system from Malware.

12. a) Implement DSA algorithm, to generate the digital signature at the sender’s end and to verify
the same signature at the recipient’s end.

b) Implement and Examine how N-stalker protects your system.

13. a) What does “CRYPTOGRAHY” become with a shift of F? Write a program to implement this
cipher technique.

b) Install and explore the various options of Rootkit Hunter.

14. a) Write a Java/C/C++ program to implement row transposition technique.

b) Implement and show how to protect your system from Malware using Building Trojans.

15. a) Implement the Diffie-Hellman Key Exchange mechanism to share secret key between two end
users (Alice & Bob).

b) Demonstrate intrusion detection system using the tool like snort or any software.

16. a) Implement the key “CODE” to encrypt the sentence “TO BE OR NOT TO BE”. Also write
the algorithm to implement.

b) Implement and Examine how N-stalker protects your system.

Page 2 of 3
17. What does “CAESAR” become with a shift of F? Write a program to implement this cipher
technique.

18. Write a Java/C/C++ program to implement the Playfair Substitution technique.

19. Write a program to implement Hill cipher technique which executes both encryption and
decryption using a 2*2 key matrix.

20. a) Write a program to implement the signature scheme using DSA.

b) Demonstrate the Installation of Rootkit Hunter and explore its various options.

Page 3 of 3

You might also like