Online Courses
Free Tutorials  Go to Your University  Placement Preparation 
0 like 0 dislike
in DTU B.Tech (CSE-VII) Information and Network Security Lab by Goeduhub's Expert (7.1k points)

Delhi Technical University(DTU) B.Tech (CSE-VII) Information and Network Security Lab Experiments and Solutions With Required Theory

DTU Home

Goeduhub's Top Online Courses @Udemy

For Indian Students- INR 360/- || For International Students- $9.99/-


Course Name



Tensorflow 2 & Keras:Deep Learning & Artificial Intelligence || Labeled as Highest Rated Course by Udemy

Apply Coupon


Complete Machine Learning & Data Science with Python| ML A-Z Apply Coupon


Complete Python Programming from scratch | Python Projects Apply Coupon
    More Courses

1 Answer

0 like 0 dislike
by Goeduhub's Expert (7.1k points)
edited by
Best answer

Delhi Technical University(DTU) B.Tech (CSE-VII) Information and Network Security Lab

S.No.List of Experiments
1.Introduction: Need for security, Introduction to security attacks, services and mechanism, introduction to cryptography, Conventional Encryption: Conventional encryption model, classical encryption techniques- substitution ciphers and transposition ciphers, cryptanalysis, stereography, stream and block ciphers, Intruders, Viruses and related threads.
2.Modern Block Ciphers: Block ciphers principals, Shannon’s theory of confusion and diffusion, Fiestal structure, data encryption standard(DES), strength of DES, crypt analysis of DES, block cipher modes of operations, triple DES, IDEA encryption and decryption, strength of IDEA, key distribution.
3.Introduction to graph, ring and field, prime and relative prime numbers, modular arithmetic, Fermat’s and Euler’s theorem, primarily testing, Euclid’s Algorithm, Chinese Remainder theorem, discrete logarithms, Principals of public key crypto systems, RSA algorithm, security of RSA, key management, Diffle-Hellman key exchange algorithm, introductory idea of Elliptic curve cryptography, Elgamal encryption.
4.Message Authentication and Hash Function: Authentication requirements, authentication functions, message authentication code (MAC), hash functions, security of hash functions and MACS, MD5 message digest algorithm, Secure hash algorithm(SHA), Public Key Infrastructure(PKI): Digital Certificate, private key management, Digital Signatures: Digital Signatures, authentication protocols, digital signature standards (DSS), proof of digital signature algorithm.
5.Authentication Applications: Kerberos and X.509, directory authentication service, password, challenge-response, biometric authentication, electronic mail security-pretty good privacy (PGP), S/ MIME.
6.IP Security: Architecture, Authentication header, Encapsulating security payloads, combining security associations, key management. Web Security: Secure Socket Layer(SSL) and transport layer security, TSP, Secure Electronic Transaction (SET), Electronic money, WAP security, firewall design principals, Virtual Private Network (VPN) security.

3.3k questions

7.1k answers


4.6k users

Related questions


About Us | Contact Us || Terms & Conditions | Privacy Policy || Youtube Channel || Telegram Channel © Social::   |  |