CF

5289A: Data and Application Security Lab Syllabus for Cyber Forensics & Information Security 6th Sem 2021 Revision SITTTR (Professional Elective-II)

Data and Application Security Lab detailed syllabus for Cyber Forensics & Information Security (CF) for 2021 revision curriculum has been taken from the SITTTRs official website and presented for the Cyber Forensics & Information Security (CF) students. For course code, course name, number of credits for a course and other scheme related information, do visit full semester subjects post given below.

For Cyber Forensics & Information Security 6th Sem scheme and its subjects, do visit Cyber Forensics & Information Security (CF) 6th Sem 2021 regulation scheme. For Professional Elective-II scheme and its subjects refer to Cyber Forensics & Information Security (CF) Professional Elective-II syllabus scheme. The detailed syllabus of data and application security lab is as follows.

Course Objectives:

  • Presenting symmetric and asymmetric cryptographic systems and covering most important parts of cryptology through introducing many cryptography techniques and algorithms.
  • Presenting symmetric and asymmetric cryptographic systems and covering most important parts of cryptology through introducing many cryptography techniques and algorithms.
  • Explaining the hash function as an application of cryptography aligning with the concept of message integrity and digital signature authentication.
  • Understand the issues involved in using asymmetric encryption to distribute symmetric keys.

Course Outcomes:

On completion of the course student will be able to:

  1. Presenting the most important key security requirements that required for any security systems generally and specifically.
  2. Utilizing and code developing for encryption algorithms that required to achieve confidentiality key security
  3. Building an appropriate encrypting system that designed for specific key size and message length
  4. Investigating the suitability of a hash function for verifying the message integrity and digital signature authentication. 1

Module 1:

  1. Introduction to Matlab (Plaintext to Ciphertext as an example. Plaintext encrypting using strfind()
  2. Introducing the four input arrays (plaintext, alphabet, key, and expected ciphertext) Caesar Algorithm + Mod function
  3. Monoalphabetic Ciphering (Shifting position) Playfair Ciphering (Dealing with 5 by 5 metrics + metrics indexes)

Module 2:

  1. Hill Ciphering (Dealing with metrics operation), Polyalphabetic Ciphering
  2. Vigenere Ciphering, Vernam Ciphering
  3. One Time Pad Ciphering, Rail Fence Ciphering (Transposition Ciphering)

Module 3:

  1. Data Encryption Standards: Building Functions of Bit Decoding (4 to 16) Functions for Substitution and Permutation
  2. Advance Encryption Standards:
    • Building Functions (Substitute Bits and Transformation)
    • Building Functions (Shift Rows and Mix Columns)
  3. Advance Encryption Standards:
    • Building Functions (Add Round Key Transformation)
    • Assembling Functions

Module 4:

  1. Building function for finding e relatively prime to
  2. Building function for finding d value
  3. Assembling functions, building pair keys, test the keys
  4. Building Elgamal Encryption system
  5. One-way Hash function, Secure Hash Algorithm (SHA 3)

Open-Ended Experiments

(Not for End Semester Examination but compulsory to be included in Continuous Internal Evaluation. Students can do open-ended experiments as a group of 2-3. There is no duplication in experiments between groups.)

  • Decrypting Ceasar Cipher
  • Hash functions take data as an input and return an integer in the range of possible values into a hash table and then it consistently distributes the data across the entire set of possible hash values. The hash function generates completely different hash values even for similar strings.

  • Image Encryption: Encrypt image through various algorithms like Advanced Encryption Standard(AES), DES(Data Encryption Standard), and RSA((Rivest-Shamir-Adleman).

Text Books:

  1. Cryptography and Network Security: Principles and Practice, Global Edition, 7/E, William Stallings, Pearson
  2. Padmanabhan T R, Shyamala C and Harini N, “Cryptography and Security”, Wiley Publications 2011.

Online Resources

  1. https://www.tutorialspoint.com

For detailed syllabus of all other subjects of Cyber Forensics & Information Security, 2021 revision curriculum do visit Cyber Forensics & Information Security (CF) 6th Sem subject syllabuses for 2021 revision.

To see the syllabus of all other branches of diploma 2021 revision curriculum do visit SITTTR diploma all branches syllabus..

To see the results of Cyber Forensics & Information Security of diploma 2021 revision curriculum do visit SITTTR diploma results..

For all Cyber Forensics & Information Security academic calendars, visit Cyber Forensics & Information Security all semesters academic calendar direct link.

Leave a Reply

Your email address will not be published. Required fields are marked *

*

This site uses Akismet to reduce spam. Learn how your comment data is processed.