项目作者: ravijainpro
项目描述 :
CNS Lab; Caser Cipher; Playfair Cipher; Vigenere Cipher; Brute Force Attack on Additive Cipher; Implementation of Affine Cipher; Brute Force and Know Plain Text Attacks on Affine Cipher; Implementation of Transposition Cipher; RC4 Encrypt; RC4 Decrypt; BruteForce Attack; Known Plain Text Attack; DES Encrypt; DES Decrypt; Triple DES Encrypt; Triple DES Decrypt; Round Keys for Weak Keys; Implement AES; Analyze the possibilities of perpetrating an attack on AES; Implement RSA; Perform low exponent attack on RSA
高级语言: Python
项目地址: git://github.com/ravijainpro/CNS-Lab.git
CNS-Lab
Week 1
- Caser Cipher
- Playfair Cipher
- Vigenere Cipher
Week 2
- Brute Force Attack on Additive Cipher
- Implementation of Affine Cipher
- Brute-Force and Know Plain Text Attacks on Affine Cipher
- Implementation of Transposition Cipher
Week 3
- RC4 Encrypt
- RC4 Decrypt
- BruteForce Attack
- Known Plain Text Attack
Week 4
- DES Encrypt
- DES Decrypt
Week 5
- Triple DES Encrypt
- Triple DES Decrypt
- Round Keys for Weak Keys
Week 6
- Implement AES
- Analyze the possibilities of perpetrating an attack on AES
Week 7
- Implement RSA
- Perform low exponent attack on RSA
Week 8
Mid Semester Exams Week
Week 9
- Implement Diffie-Hellman Key Agreement Protocols
- What happens when a primitive root (g) of p is not chosen ?
- Will every p has primitive roots?
Week 10
Implement Elgamal Algorithm (Public Key Cryptosystem).
What are your observations on Elgamal Cryptosystem? How is it different from its counterparts?
How to implement Elliptic Curve Cryptography? (Possible Ways)
Week 11
- Implement SHA-1
- Implement Elgamal Digital Signature Scheme
Week 11 (Extended)
- A network in which each node can act as a client or server for the other computers in the network, allowing shared access to various resources such as files, peripherals, etc without the need for a central server.
a. Design and code security association/agreement between server and client b.
b. Procedure for key management c.
c. Design and code for authentication between server and client vice versa
Week 12
- Design and implement a communication system with the following details
a. The users are divided logically into groups.
b. Each user can have many public and private key pairs.
c. Each user maintains a table in which public key is stored.
d. Each user maintains private keys in another table along with the id of the public key which is in encrypted form.
e. The encryption and decryption is based on the public key id sent along with the cipher text. Use any public key cryptography for encryption and decryption
- Explore Packet sniffing tools and make a report with practical screenshots possibly
Week 13
Implement Kerberos Authentication Protocol