Sem 7 - IT8761 - Security Lab QP R 2017 - Mark Splitup

Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

1.

Perform encryption, decryption using the following substitution techniques


(i) Ceaser cipher, (ii) playfair cipher iii) Hill Cipher iv) Vigenere cipher

Mark Split-up
Aim & Program /
Output &
Particulars Algorithm / Source Record Viva Voce Total
Result
Procedure Code
Mark
Allotted
20 40 20 10 10 100
Mark
Obtained

INTERNAL EXAMINER EXTERNAL EXAMINER

2. Perform encryption and decryption using following transposition techniques


i) Rail fence ii) row & Column Transformation

Mark Split-up
Aim & Program /
Output &
Particulars Algorithm / Source Record Viva Voce Total
Result
Procedure Code
Mark
Allotted
20 40 20 10 10 100
Mark
Obtained

INTERNAL EXAMINER EXTERNAL EXAMINER


3. Apply DES algorithm for practical applications.

Mark Split-up
Aim & Program /
Output &
Particulars Algorithm / Source Record Viva Voce Total
Result
Procedure Code
Mark
Allotted
20 40 20 10 10 100
Mark
Obtained

INTERNAL EXAMINER EXTERNAL EXAMINER

4. Apply AES algorithm for practical applications.

Mark Split-up
Aim & Program /
Output &
Particulars Algorithm / Source Record Viva Voce Total
Result
Procedure Code
Mark
Allotted
20 40 20 10 10 100
Mark
Obtained

INTERNAL EXAMINER EXTERNAL EXAMINER


5. Implement RSA Algorithm using HTML and JavaScript.

Mark Split-up
Aim & Program /
Output &
Particulars Algorithm / Source Record Viva Voce Total
Result
Procedure Code
Mark
Allotted
20 40 20 10 10 100
Mark
Obtained

INTERNAL EXAMINER EXTERNAL EXAMINER

6. Implement the Diffie-Hellman Key Exchange algorithm for a given problem.

Mark Split-up
Aim & Program /
Output &
Particulars Algorithm / Source Record Viva Voce Total
Result
Procedure Code
Mark
Allotted
20 40 20 10 10 100
Mark
Obtained

INTERNAL EXAMINER EXTERNAL EXAMINER


7. Calculate the message digest of a text using the SHA-1 algorithm.

Mark Split-up
Aim & Program /
Output &
Particulars Algorithm / Source Record Viva Voce Total
Result
Procedure Code
Mark
Allotted
20 40 20 10 10 100
Mark
Obtained

INTERNAL EXAMINER EXTERNAL EXAMINER

8. Implement the SIGNATURE SCHEME - Digital Signature Standard.

Mark Split-up
Aim & Program /
Output &
Particulars Algorithm / Source Record Viva Voce Total
Result
Procedure Code
Mark
Allotted
20 40 20 10 10 100
Mark
Obtained

INTERNAL EXAMINER EXTERNAL EXAMINER


9. Demonstrate intrusion detection system (ids) using any tool eg. Snort or any other
s/w.

Mark Split-up
Aim & Program /
Output &
Particulars Algorithm / Source Record Viva Voce Total
Result
Procedure Code
Mark
Allotted
20 40 20 10 10 100
Mark
Obtained

INTERNAL EXAMINER EXTERNAL EXAMINER

10. Automated Attack and Penetration Tools


Exploring N-Stalker, a Vulnerability Assessment Tool

Mark Split-up
Aim & Program /
Output &
Particulars Algorithm / Source Record Viva Voce Total
Result
Procedure Code
Mark
Allotted
20 40 20 10 10 100
Mark
Obtained

INTERNAL EXAMINER EXTERNAL EXAMINER


11. Defeating Malware
i) Building Trojans ii) Rootkit Hunter

Mark Split-up
Aim & Program /
Output &
Particulars Algorithm / Source Record Viva Voce Total
Result
Procedure Code
Mark
Allotted
20 40 20 10 10 100
Mark
Obtained

INTERNAL EXAMINER EXTERNAL EXAMINER

12. Perform encryption, decryption using the following substitution techniques


(i) Ceaser cipher, (ii) playfair cipher iii) Hill Cipher iv) Vigenere cipher

Mark Split-up
Aim & Program /
Output &
Particulars Algorithm / Source Record Viva Voce Total
Result
Procedure Code
Mark
Allotted
20 40 20 10 10 100
Mark
Obtained

INTERNAL EXAMINER EXTERNAL EXAMINER

You might also like