IMPLEMENTATION OF SHA-1 ALGORITHM using JAVA

Image
AIM: To   write a java program to calculate the message digest of a text using the SHA-1 algorithm ALGORITHM: Step 1: Input the plain text Step 2: Append padding bits Step 3: Append length Step 4:Initialize   buffer. Step 5: Process message in 512-bit (16word)blocks Step 6: Encrypted in hexa decimal format Step 7: Display the encrypted text. PROGRAM: importjava.security.*; public class SHA1 { public static void main(String[] a) { try { MessageDigest md = MessageDigest.getInstance("SHA1"); System.out.println("Message digest object info: "); System.out.println(" Algorithm = " +md.getAlgorithm()); System.out.println(" Provider = " +md.getProvider()); System.out.println(" ToString = " +md.toString());   String input = ""; md.update(input.getBytes()); byte[] output = md.digest(); System.out.println(); System.out.println("SHA1(\""+...

IT6712 SECURITY LABORATORY SYLLABUS

IT6712 SECURITY LABORATORY                                                                                         L T P C 0 0 3 2 
OBJECTIVES: 


  • The student should be made to:
  •  Be exposed to the different cipher techniques
  •  Learn to implement the algorithms DES, RSA,MD5,SHA-1
  •  Learn to use tools like GnuPG, KF sensor, Net Strumbler

LIST OF EXPERIMENTS
1. Implement the following SUBSTITUTION & TRANSPOSITION TECHNIQUES concepts:
a) Caesar Cipher
b) Playfair Cipher
c) Hill Cipher
d) Vigenere Cipher
e) Rail fence – row & Column Transformation
2. Implement the following algorithms
a) DES
b) RSA Algorithm
c) Diffiee-Hellman
d) MD5
e) SHA-1
3 Implement the SIGNATURE SCHEME - Digital Signature Standard
4. Demonstrate how to provide secure data storage, secure data transmission and for creating digital signatures (GnuPG).
5. Setup a honey pot and monitor the honeypot on network (KF Sensor)
6. Installation of rootkits and study about the variety of options
7. Perform wireless audit on an access point or a router and decrypt WEP and WPA.( Net Stumbler)
8. Demonstrate intrusion detection system (ids) using any tool (snort or any other s/w)

                                                                                                               TOTAL: 45 PERIODS

LAB EQUIPMENTS FOR A BATCH OF 30 STUDENTS: SOFTWARE: 
C / C++ / Java or equivalent compiler GnuPG, KF Sensor or Equivalent, Snort, Net Stumbler or Equivalent

HARDWARE:
 Standalone desktops -30 Nos. (or) Server supporting 30 terminals or more

Comments

Popular posts from this blog

IMPLEMENTATION OF SHA-1 ALGORITHM using JAVA

IMPLEMENTATION OF DIFFIE HELLMAN KEY EXCHANGE ALGORITHM

IMPLEMENTATION OF VIGENERE CIPHER using C++