T. Y. B. Tech (Computer Science and Engineering) Sem – V
Information Security (PCC-CS501)
Experiment List
1. GCD Using Euclidean algorithm/Computing Multiplicative inverses/ Prime number and modular arithmetic operations.
2. Substitution/Transposition/ Product Cipher and their Analysis
3. Single round of DES algorithm/Double DES/ Triple DES and its analysis
4. RSA Algorithm to provide Confidentiality and Authentication services or any other Public-Key Algorithm.
5. Diffie–Hellman or any other key exchange Algorithm.
6. Implementation and use of any authentication functions/algorithm.
7. Generation and use of Digital Signatures for real-world situations.
8. Usage of PGP security package and S/MIME features.
9. Experimenting with SSL/TLS/E-Commerce Applications and identifying their Vulnerabilities.
10. Demo and usage of network traffic analysis tools.
11. Experimentation on identifying non-cryptographic Protocol Vulnerabilities and remedies thereon.
12. Experiment with identifying software Vulnerabilities using various tools/techniques and their analysis.
13. Any other Implementation/Demo/Experimentation based on the topics of the syllabus.
Post a Comment