{"id":50839,"date":"2023-03-22T07:16:32","date_gmt":"2023-03-22T07:16:32","guid":{"rendered":"https:\/\/www.inspirenignite.com\/anna-university\/cb3411-cryptography-and-cyber-security-laboratory-syllabus-for-cyber-security-2021-regulation\/"},"modified":"2023-03-22T07:16:32","modified_gmt":"2023-03-22T07:16:32","slug":"cb3411-cryptography-and-cyber-security-laboratory-syllabus-for-cyber-security-2021-regulation","status":"publish","type":"post","link":"https:\/\/www.inspirenignite.com\/anna-university\/cb3411-cryptography-and-cyber-security-laboratory-syllabus-for-cyber-security-2021-regulation\/","title":{"rendered":"CB3411: Cryptography and Cyber Security Laboratory syllabus for Cyber Security 2021 regulation"},"content":{"rendered":"<p align=\"justify\">Cryptography and Cyber Security Laboratory detailed syllabus for Cyber Security (Cyber Security) for 2021 regulation curriculum has been taken from the <a class=\"rank-math-link\" href=\"https:\/\/cac.annauniv.edu\/\" style=\"color: inherit\" target=\"_blank\" rel=\"noopener\">Anna University<\/a> official website and presented for the Cyber Security students. For course code, course name, number of credits for a course and other scheme related information,  do visit full semester subjects post given below. <\/p>\n<p align=\"justify\">For Cyber Security 4th Sem scheme and its subjects, do visit <a class=\"rank-math-link\" href=\"..\/cyber-security-4th-sem-syllabus-2021-regulation\">Cyber Security 4th Sem 2021 regulation scheme<\/a>. The detailed syllabus of cryptography and cyber security laboratory is as follows. <\/p>\n<p>  <title>Cryptography and Cyber Security Laboratory<\/title><\/p>\n<h4>Course Objectives:<\/h4>\n<ul>\n<li>Learn different cipher techniques.<\/li>\n<li>Implement the algorithms DES, AES, RSA and Diffie-Hellman.<\/li>\n<li>Implement hashing techniques such as SHA-1, MD-5.<\/li>\n<li>Develop a digital signature scheme.<\/li>\n<\/ul>\n<h4>Practical Exercises:<\/h4>\n<ol>\n<li>Write a program to implement the following cipher techniques to perform encryption and decryption\n<ol type=\"a\">\n<li>Caesar Cipher<\/li>\n<li>Playfair Cipher<\/li>\n<li>Hill Cipher<\/li>\n<\/ol>\n<\/li>\n<li>Write a program to implement the following transposition techniques\n<ol type=\"a\">\n<li>Rail fence technique -Row major transformation<\/li>\n<li>Rail fence technique &#8211; Column major transformation<\/li>\n<\/ol>\n<\/li>\n<li>Write a program to implement DES algorithm<\/li>\n<li>Write a program to implement AES algorithm<\/li>\n<li>Write a program to implement RSA Encryption algorithm<\/li>\n<li>Write a program to implement the Diffie-Hellman Key Exchange mechanism. Consider one of the parties as Alice and the other party as bob.<\/li>\n<li>Write a program to calculate the message digest of a text using the SHA-1 algorithm.<\/li>\n<li>Write a program to calculate the message digest of a text using the MD-5 algorithm.<\/li>\n<li>Write a program to implement digital signature standard.<\/li>\n<\/ol>\n<h4>Course Outcomes:<\/h4>\n<ol>\n<li>Develop a code for classical encryption techniques.<\/li>\n<li>Build a symmetric and asymmetric algorithms.<\/li>\n<li>Construct a code for various Authentication schemes.<\/li>\n<li>Apply the principles of digital signature.<\/li>\n<\/ol>\n<h4>List of Equipments:<\/h4>\n<h4>For a Batch of 30 Students:<\/h4>\n<p>  SOFTWARE: C \/ C++ \/ Java or equivalent compiler HARDWARE: Standalone desktops &#8211; 30 Nos. (or) Server supporting 30 terminals or more.<\/p>\n<p align=\"justify\">For detailed syllabus of all other subjects of Cyber Security, 2021 regulation curriculum do visit <a class=\"rank-math-link\" href=\"..\/category\/cyber-security+4th-sem\">Cyber Security 4th Sem subject syllabuses for 2021 regulation<\/a>. <\/p>\n<p align=\"justify\">For all Cyber Security results, visit <a class=\"rank-math-link\" href=\"https:\/\/www.inspirenignite.com\/anna-university\/anna-university-results\/\">Anna University Cyber Security all semester results<\/a> direct link. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cryptography and Cyber Security Laboratory detailed syllabus for Cyber Security (Cyber Security) for 2021 regulation curriculum has been taken from the Anna University official website and presented for the Cyber [&hellip;]<\/p>\n","protected":false},"author":2297,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"categories":[47,158],"tags":[],"class_list":["post-50839","post","type-post","status-publish","format-standard","hentry","category-4th-sem","category-cyber-security"],"_links":{"self":[{"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/posts\/50839","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/users\/2297"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/comments?post=50839"}],"version-history":[{"count":0,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/posts\/50839\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/media?parent=50839"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/categories?post=50839"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/tags?post=50839"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}