{"id":7949,"date":"2024-04-04T11:26:15","date_gmt":"2024-04-04T11:26:15","guid":{"rendered":"https:\/\/www.inspirenignite.com\/kl\/5289a-data-and-application-security-lab-syllabus-for-cyber-forensics-information-security-6th-sem-2021-revision-sitttr-professional-elective-ii\/"},"modified":"2024-04-04T11:26:15","modified_gmt":"2024-04-04T11:26:15","slug":"5289a-data-and-application-security-lab-syllabus-for-cyber-forensics-information-security-6th-sem-2021-revision-sitttr-professional-elective-ii","status":"publish","type":"post","link":"https:\/\/www.inspirenignite.com\/kl\/5289a-data-and-application-security-lab-syllabus-for-cyber-forensics-information-security-6th-sem-2021-revision-sitttr-professional-elective-ii\/","title":{"rendered":"5289A: Data and Application Security Lab Syllabus for Cyber Forensics &amp; Information Security 6th Sem 2021 Revision SITTTR (Professional Elective-II)"},"content":{"rendered":"<p align=\"justify\">Data and Application Security Lab detailed syllabus for Cyber Forensics &amp; Information Security (CF) for 2021 revision curriculum has been taken from the <a class=\"rank-math-link\" href=\"http:\/\/www.sitttrkerala.ac.in\/\" style=\"color: inherit\" target=\"_blank\" rel=\"noopener\">SITTTRs<\/a> official website and presented for the Cyber Forensics &amp; Information Security (CF) students. For course code, course name, number of credits for a course and other scheme related information,  do visit full semester subjects post given below. <\/p>\n<p align=\"justify\">For Cyber Forensics &amp; Information Security 6th Sem scheme and its subjects, do visit <a class=\"rank-math-link\" href=\"..\/sitttr-diploma-cyber-forensics-information-security-cf-syllabus-for-6th-sem-2021-revision\">Cyber Forensics &amp; Information Security (CF) 6th Sem 2021 regulation scheme<\/a>. For Professional Elective-II scheme and its subjects refer to <a class=\"rank-math-link\" href=\"..\/sitttr-cyber-forensics-information-security-6th-sem-professional-elective-ii-syllabus-2021-revision\">Cyber Forensics &amp; Information Security (CF) Professional Elective-II syllabus scheme<\/a>. The detailed syllabus of data and application security lab is as follows. <\/p>\n<p><h4>Course Objectives:<\/h4>\n<ul>\n<li>Presenting symmetric and asymmetric cryptographic systems and covering most important parts of cryptology through introducing many cryptography techniques and algorithms.<\/li>\n<li>Presenting symmetric and asymmetric cryptographic systems and covering most important parts of cryptology through introducing many cryptography techniques and algorithms.<\/li>\n<li>Explaining the hash function as an application of cryptography aligning with the concept of message integrity and digital signature authentication.<\/li>\n<li>Understand the issues involved in using asymmetric encryption to distribute symmetric keys.<\/li>\n<\/ul>\n<p><h4>Course Outcomes:<\/h4>\n<p>On completion of the course student will be able to:<\/p>\n<ol>\n<li>Presenting the most important key security requirements that required for any security systems generally and specifically.<\/li>\n<li>Utilizing and code developing for encryption algorithms that required to achieve confidentiality key security<\/li>\n<li>Building an appropriate encrypting system that designed for specific key size and message length<\/li>\n<li>Investigating the suitability of a hash function for verifying the message integrity and digital signature authentication. 1<\/li>\n<\/ol>\n<p><h4>Module 1:<\/h4>\n<ol>\n<li>Introduction to Matlab (Plaintext to Ciphertext as an example. Plaintext encrypting using strfind()<\/li>\n<li>Introducing the four input arrays (plaintext, alphabet, key, and expected ciphertext) Caesar Algorithm + Mod function<\/li>\n<li>Monoalphabetic Ciphering (Shifting position) Playfair Ciphering (Dealing with 5 by 5 metrics + metrics indexes)<\/li>\n<\/ol>\n<p><h4>Module 2:<\/h4>\n<ol>\n<li>Hill Ciphering (Dealing with metrics operation), Polyalphabetic Ciphering<\/li>\n<li>Vigenere Ciphering, Vernam Ciphering<\/li>\n<li>One Time Pad Ciphering, Rail Fence Ciphering (Transposition Ciphering)<\/li>\n<\/ol>\n<p><h4>Module 3:<\/h4>\n<ol>\n<li>Data Encryption Standards: Building Functions of Bit Decoding (4 to 16) Functions for Substitution and Permutation<\/li>\n<li>Advance Encryption Standards:<\/li>\n<ul>\n<li>Building Functions (Substitute Bits and Transformation)<\/li>\n<li>Building Functions (Shift Rows and Mix Columns)<\/li>\n<\/ul>\n<li>Advance Encryption Standards:<\/li>\n<ul>\n<li>Building Functions (Add Round Key Transformation)<\/li>\n<li>Assembling Functions<\/li>\n<\/ul>\n<\/ol>\n<p><h4>Module 4:<\/h4>\n<ol>\n<li>Building function for finding e relatively prime to<\/li>\n<li>Building function for finding d value<\/li>\n<li>Assembling functions, building pair keys, test the keys<\/li>\n<li>Building Elgamal Encryption system<\/li>\n<li>One-way Hash function, Secure Hash Algorithm (SHA 3)<\/li>\n<\/ol>\n<p><h4>Open-Ended Experiments<\/h4>\n<p>(Not for End Semester Examination but compulsory to be included in Continuous Internal Evaluation. Students can do open-ended experiments as a group of 2-3. There is no duplication in experiments between groups.)<\/p>\n<ul>\n<li>Decrypting Ceasar Cipher<\/li>\n<p>Hash functions take data as an input and return an integer in the range of possible values into a hash table and then it consistently distributes the data across the entire set of possible hash values. The hash function generates completely different hash values even for similar strings.<\/p>\n<li>Image Encryption: Encrypt image through various algorithms like Advanced Encryption Standard(AES), DES(Data Encryption Standard), and RSA((Rivest-Shamir-Adleman).<\/li>\n<\/ul>\n<p><h4>Text Books:<\/h4>\n<ol>\n<li>Cryptography and Network Security: Principles and Practice, Global Edition, 7\/E, William Stallings, Pearson<\/li>\n<li>Padmanabhan T R, Shyamala C and Harini N, &#8220;Cryptography and Security&#8221;, Wiley Publications 2011.<\/li>\n<\/ol>\n<p><h4>Online Resources<\/h4>\n<ol>\n<li>https:\/\/www.tutorialspoint.com<\/li>\n<\/li>\n<\/ol>\n<p align=\"justify\">For detailed syllabus of all other subjects of Cyber Forensics &amp; Information Security, 2021 revision curriculum do visit <a class=\"rank-math-link\" href=\"..\/category\/sitttr\/cf\">Cyber Forensics &amp; Information Security (CF) 6th Sem subject syllabuses for 2021 revision<\/a>. <\/p>\n<p align=\"justify\">To see the syllabus of all other branches of diploma 2021 revision curriculum do visit <a class=\"rank-math-link\" href=\"https:\/\/www.inspirenignite.com\/kl\/sitttr-syllabus\/\"> SITTTR diploma all branches syllabus.<\/a>. <\/p>\n<p align=\"justify\">To see the results of Cyber Forensics &amp; Information Security of diploma 2021 revision curriculum do visit <a class=\"rank-math-link\" href=\"https:\/\/www.inspirenignite.com\/kl\/sitttr-results\/\"> SITTTR diploma results.<\/a>. <\/p>\n<p align=\"justify\">For all Cyber Forensics &amp; Information Security academic calendars, visit <a class=\"rank-math-link\" href=\"https:\/\/www.inspirenignite.com\/kl\/sitttr-academic-calendar\/\"> Cyber Forensics &amp; Information Security all semesters academic calendar<\/a> direct link. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Data and Application Security Lab detailed syllabus for Cyber Forensics &amp; Information Security (CF) for 2021 revision curriculum has been taken from the SITTTRs official website and presented for the [&hellip;]<\/p>\n","protected":false},"author":2462,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"categories":[79],"tags":[],"class_list":["post-7949","post","type-post","status-publish","format-standard","hentry","category-cf"],"_links":{"self":[{"href":"https:\/\/www.inspirenignite.com\/kl\/wp-json\/wp\/v2\/posts\/7949","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inspirenignite.com\/kl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inspirenignite.com\/kl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/kl\/wp-json\/wp\/v2\/users\/2462"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/kl\/wp-json\/wp\/v2\/comments?post=7949"}],"version-history":[{"count":0,"href":"https:\/\/www.inspirenignite.com\/kl\/wp-json\/wp\/v2\/posts\/7949\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.inspirenignite.com\/kl\/wp-json\/wp\/v2\/media?parent=7949"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/kl\/wp-json\/wp\/v2\/categories?post=7949"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/kl\/wp-json\/wp\/v2\/tags?post=7949"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}