0% found this document useful (0 votes)
107 views80 pages

DIPLOMA Computer Networking & Cyber Security Lab MANUAL (CME)

Uploaded by

msravani.vani
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
107 views80 pages

DIPLOMA Computer Networking & Cyber Security Lab MANUAL (CME)

Uploaded by

msravani.vani
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 80

SREE VENKATESWARA COLLEGE OF ENGINEERING

(An UGC AUTONOMOUS Institution)


NORTH RAJUPALEM, NELLORE (DIST)

AFFILIATED TO SBTET, AP

Computer network
and cyber security
(C 23

REGULATION) II

DIPLOMA CME

IV-SEMESTER

NAME OF THE
STUDENT
ROLL NUMBER

YEAR

BRANCH
DEPARTMENT OF COMPUTER SCIENCE
AND ENGINEERING

Vision of the Institute

 Be a best institute to originate and foster skilled engineers and create


changemaker’s for the development of nation with a phenomenal
wisdom with morals, values and societal responsibilities.

Mission of the Institute

 M1: To impart graduate with quality education and use innovative


teaching-learning process to excel in their careers.
 M2: To build an ecosystem and play a vital role in strengthening
innovative research and entrepreneurship skills among graduates.
 M3: To produce engineers with moral values and social
responsibility, and address societal needs for better nation.
DEPARTMENT OF COMPUTER SCIENCE
AND ENGINEERING

Vision of the Department

 To produce the globally competent professionals in the field of


computer science and engineering with socio economic and
ethical values.

Mission of the Department

 M1: To provide state-of-the-art computer science and engineering


facilities through innovative teaching and learning practices.
 M2: To prepare the graduates for higher learning, emphasizing
researchand entrepreneurship.
 M3: To inculcate ethical values, leadership qualities, and
professional behaviour to improve the living standards of society.
Program Educational Objectives

PEO-1: To provide the graduates with effectively applying mathematics,


science, and engineering methodologies for analyzing, designing, and
implementing software solutions for real-world problems.

PEO-2: To become recognized professional engineers with a demonstrated


commitment to lifelong learning, continuous learning, and self-
improvement to change in computer science engineering.

PEO-3: To train the graduates to have basic interpersonal skills and a sense
of social responsibility that covers them a way to become good team
members and leaders.
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

Program Outcomes (PO’s)

PO_1 Engineering knowledge: Apply the knowledge of mathematics, science, engineering


fundamentals, and an engineering specialization to the solution of complex engineering problems.
PO_2 Problem analysis: Identify, formulate, review research literature, and analyze complex
engineering problems reaching substantiated conclusions using first principles of mathematics,
natural sciences, and engineering sciences.
PO_3 Design/development of solutions: Design solutions for complex engineering problems and design
system components or processes that meet the specified needs with appropriate consideration for
the public health and safety, and the cultural, societal, and environmental
considerations.
PO_4 Conduct investigations of complex problems: Use research-based knowledge and research
methods including design of experiments, analysis and interpretation of data, and synthesis of the
information to provide valid conclusions.
PO_5 Modern tool usage: Create, select, and apply appropriate techniques, resources, and modern
engineering and IT tools including prediction and modeling to complex engineering activities
with an understanding of the limitations.
PO_6 The engineer and society: Apply reasoning informed by the contextual knowledge to assess
societal, health, safety, legal and cultural issues and the consequent responsibilities relevant to the
professional engineering practice.
PO_7 Environment and sustainability: Understand the impact of the professional engineering
solutions in societal and environmental contexts, and demonstrate the knowledge of, and need
for sustainable development.
PO_8 Ethics: Apply ethical principles and commit to professional ethics and responsibilities and norms
of the engineering practice.
PO_9 Individual and team work: Function effectively as an individual, and as a member or leader in
diverse teams, and in multidisciplinary settings.
PO_10 Communication: Communicate effectively on complex engineering activities with the
engineering community and with society at large, such as, being able to comprehend and write
effective reports and design documentation, make effective presentations, and give and receive
clear instructions.
PO_11 Project management and finance: Demonstrate knowledge and understanding of the
engineering and management principles and apply these to one’s own work, as a member and
leader in a team, to manage projects and in multidisciplinary environments.
PO_12 Life-long learning: Recognize the need for, and have the preparation and ability to engage in
independent and life-long learning in the broadest context of technological change.
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

Program Specific Outcomes (PSO’s)

PSO-1: Domain-specific knowledge: Acquire knowledge of hardware


functionality, design, and development of software components required to
process the information.

PSO-2: Problem-solving skills: Analyze data, identify data structures, design


suitable algorithms, develop and maintain software for real-world
problems.
Name:
Roll No.:
Branch:

Year-Sem:

S. No Date Experiment Name Marks Instructor


Signature
Table of Contents

s.no Name of the Experiment Page No.


1 Task 1: Exercise on Identification and familiarization of
various components of computer system.
2 Task 2: Exercise on various operations and modifications
required for CAIOS setup.
3 Task3: Exercise on Print the summary of your system Hardware
and verify for correctness
4 Task4: Exercise on Hard drive, optical drive installation.

5 Task 5: Exercise on recovery of lost data on hard drive.

6 Task 6: Exercise on Preparing the Ethernet cable for cross and


direct connections using crimping tool and test using LAN
tester
7 Task 7: Installation of switch and connect systems

8 Task 8: Exercise on Installation of a modem (internal, external


or USB) and connecting to internet
9 Task 9: Exercise on Using FTP for uploading and downloading
files.
10 Task 10: Exercise on Installation and configuring the proxy server for
internet access
11 Task 11: Exercise on Setting of particular IP address to an
existing terminal system
12 Task 12: To implement Transportation and Substitution using
Caesar Cipher Technique
13 Task 13: To implement Transportation and Substitution using
Playfair Cipher Technique
14 Task 14: Exercise encryption and decryption by using Hill Cipher
technique
15 Task15: perform encryption and decryption by using Veneer Cipher

16 Task 16: . Perform encryption and decryption using RSA public and
private key
17 Task17: To perform the validation of the digital document using Digital
signature standard encryption and decryption
18 Task 18: To perform the procedure of installation process of antivirus
to detect threats.
19 Task 19: learn the procedure to ensure security basic firewalls can be
enabled in the system.
1. Exercise on Identification and familiarization of
various components of computer system.

 Great choice of lab experiment! Understanding the motherboard


is like learning the blueprint of your computer. How to Use This
Guide
 Compare your motherboard: Look closely at the image in your
lab manual. Does it match any of the common motherboard types
(ATX, Micro ATX, Mini ITX)?

Identify key components: Use the descriptions and images below to


match the parts on your motherboard.
Label your diagram: Carefully label the components you've identified
on your lab manual's image.

Key Components to Look For:

1. CPU Socket:
This is the most important part. It's where the CPU (the brain of
your computer) sits.

 CPU socket on a motherboard


2. RAM Slots:
 These long, narrow slots hold the RAM (computer's
short-term memory).

Opens in a new window


RAM slots on a motherboard
3. Expansion Slots:
 These are where you can add extra parts like graphics
cards or sound cards.
o PCI Express (PCIe) slots: These are the most common
for modern graphics cards.
o PCI slots: Older expansion cards might use these.
4. Chipset:
 Often a large, heat. It controls how all the parts communicate.

5. BIOS Chip:
 A small, round chip that stores basic
computerinformation.
6. Heat Sinks:
 Metal parts with fins that help cool the CPU and other hot
components.
7. Fans:
 Help keep the computer cool by moving air.

8. Ports:
 These are where you plug in your keyboard, mouse,
monitors, and another devices Common types include USB,
HDMI, Ethernet, and audio jacks.
2. Exercise on various operations and modifications
required for CAIOS setup.
CAIOS (Computer Architecture and Integrated Operating
Systems) is a fascinating subject!

It's like building your own digital world. Let's explore the
different ways you can set up your CAIOS system.

Key Setup Options:


1.Hardware Configuration:
 Processor: The brain of your system. You'll choose based on
speed, cores, and power consumption.

 different types of processors


 Memory (RAM): The system's short-term memory. More
RAM means better performance.
.

Storage: Where you'll store your data. Options include HDD, SSD, or a
combination.

.
HDD, SSD, and a motherboard with storage connector
different types of motherboards

Operating System Installation:


Select OS: Decide on a suitable OS like Windows, Linux, or
macOS based on your needs.
4.Hard drive, optical drive installation.
To create or find images for a lab manual on installing hard
drives and optical drives, you’ll want to provide clear and
illustrative visuals that guide users through the process. Here’s a
description of the types of images you might need and tips for
capturing or sourcing them:
1. Computer Case Interior
Image Description:
 Show the inside of a computer case with drive bays clearly
labeled.
 Highlight where the hard drive and optical drive will be
installed.
 Ensure the image is well-lit and in focus.
Tips:
 Use a camera with a macro setting for close-up shots.
 Label different components in the image if necessary.
Example:

Image Description:
 Show the hard drive being inserted into the drive bay.
 Include images of the mounting screws and bracket if
applicable.
 Display the data and power cables being connected.
Tips:
 Photograph the hard drive from various angles.
 Ensure the connectors and mounting points are visible.
Example:

2. Optical Drive Installation


Image Description:
 Show the optical drive being inserted into the 5.25-inch bay.
 Display how the drive is secured with screws or a mounting
bracket.
 Include images of connecting data and power cables.
Tips:
 Take a shot of the drive from the front and side.
 Include close-ups of the connection points.
3. Data and Power Cable Connections
Image Description:
 Show the data cable (SATA or IDE) being connected to
both the drive and motherboard.
 Display the power cable being plugged into the drive.
Tips:
 Use a clean background to make the cables stand out.
 Ensure the connectors are clearly visible.
4. BIOS/UEFI Setup
Image Description:
 Capture a screenshot or photo of the BIOS/UEFI interface
where the drives are detected.
 Show how to navigate to the section where drives are listed.
Tips:

. Use high-resolution screenshots for clarity.

 Highlight the relevant sections of the BIOS/UEFI.


Example:
Finding or Creating Images
 Create Your Own: Use a digital camera or smartphone
with a good resolution. Ensure proper lighting and focus.
You can use photo editing software to add labels or
annotations if needed.
 Stock Images: Search for relevant images on stock photo
websites like Shutterstock, Getty Images, or Un splash.
Some images might be available for educational use or
under Creative Commons licenses.
 Manufacturer's Documentation: Often, hardware
manufacturers provide detailed installation guides with
images that you can use for educational purposes.
Remember to ensure that any images used comply with
copyright laws and are properly attributed if required.
3.
Exercise on Print the summary of your system
Hardware and verify for correctness
Your compute A camera or smartphone to take pictures

Steps:
1. Check Your Computer's Information:
Windows: Press the Windows key + R on your keyboard.
Type "msinfo32" and press Enter.
Mac:
Click on the Apple menu in the top left corner.
Choose "About This Mac."
Write down or copy the information about your processor,
memory, storage, and graphics card.

2. Take Pictures:
 Computer Case: Take a picture of the back of your
computer case. This often shows information about
the processor, memory, and graphics card.
 Inside the Case (Optional): If you're comfortable
and with adult supervision, you can carefully open
your computer case and take pictures of the
motherboard, processor, and other components. This
is more advanced and not necessary for everyone.
3. Compare and Verify:
 Compare the information you wrote down from the
System Information with the labels on your
computer case.
 Use online resources to search for your hardware
components based on their model numbers. This can
help you verify the specifications.

Example Pictures:
 Image of motherboard with processor and RAM Opens in a
new windowpcbuyerbeware.co.uk
 Image of computer case with labels Opens in a new window
www.chegg.com

Important Safety Tips:

 Always ask an adult for help before opening your


computer case.
 Be careful when handling computer components. Static
electricity can damage them.
 Ground yourself by touching a metal object before
handling components.
Let's Get Started!
• Are you ready to explore your computer's hardware? Do you
have any questions before we begin?
Remember: Safety is important! Always ask a grown-up before
opening your computer case.
4. Exercise on Hard drive, optical drive
installation Working inside a computer can be
dangerous.

 It's essential to have adult supervision and follow


proper safety procedures. Electrostatic discharge
(ESD) can damage computer components.
Understanding the Task .
 While I can't provide visual aids, I can give you a
general idea of what's involved in installing a hard
drive or optical drive. This exercise would typically be
done in a computer lab under the guidance of a teacher.
Hard Drive Installation
Purpose: Stores data for your computer.

Process:
• Open the computer case carefully.
• Locate the hard drive bay.
• Secure the hard drive in the bay using screws.
• Connect the data cable (SATA) to the hard drive and
motherboard.
• Connect the power cable to the hard drive.
• Close the computer case.
Optical Drive Installation

Purpose: Reads and writes data to CDs and DVDs.

Process:
• Open the computer case carefully.
• Locate the optical drive bay.
• Secure the optical drive in the bay using screws.
• Connect the data cable (SATA) to the optical drive and
motherboard.

• Connect the power cable to the optical drive.


• Close the computer case.

Lab Manual and Safety Guidelines:

A proper lab manual would provide detailed instructions,


diagrams, and safety precautions. It's crucial to follow these
guidelines to avoid damaging your computer or injuring yourself.

Key Safety Tips:

• Always wear an anti-static wrist strap when working on


computer components.
• Handle components carefully to avoid damaging them.
• Make sure to disconnect the computer from the power
source before opening the case.
• Use the correct tools and follow the manufacturer's
instructions.
Learning Opportunities

While you can't physically perform this exercise at home, you


can learn about:
• Computer hardware components
• Data storage and retrieval
• Computer assembly and maintenance
• Safety precautions when working with electronic.


5. Exercise on recovery of lost data on hard drive
Objective: Learn how to recover lost data from a hard drive
using data recovery software.
Prerequisites:
1. A Computer: With a functioning operating system.
2. Data Recovery Software: For example, Recurve, Ease US
Data Recovery Wizard, or Disk Drill.
3. A Hard Drive: The one from which data is to be recovered
(the source drive).
4. A Destination Drive: A separate drive or external storage to
save the recovered data.
Steps:
1. Download and Install Data Recovery Software:
• Visit the official website of the chosen software.
• Download and install it on your computer. Ensure it's
installed on a different drive from the one you are
recovering data from to avoid overwriting data.
2. Connect the Hard Drive:
• Connect the hard drive (source drive) to your
computer if it’s not already connected.
• select the hard drive you wish to recover data.
3. Choose a Recovery Mode:
o Most software will offer options like "Quick Scan" and

"Deep Scan." Start with "Quick Scan" to find recently


deleted files. If that doesn't yield results, try "Deep Scan"
for a more thorough search.
4. Scan the Hard Drive:
o Initiate the scanning process. The software will begin to

search for recoverable files. This may take some time


depending on the size of the drive and the extent of data
loss.
5. Preview and Select Files:
o After the scan completes, the software will list the

recoverable files. Preview them if possible to ensure they


are intact and select the ones you wish to recover.
6. Recover Files:
o Choose a destination (preferably not the source drive) to

save the recovered files. Click the "Recover" button and


wait for the process to finish.
7. Verify Recovered Data:
o Once the recovery process is complete, check the

destination drive to ensure all selected files have been


recovered and are accessible.
o Sample Image: Below is a general example of what you

might see in the data recovery software interface:

Tips:
• Stop Using the Drive: If you accidentally delete files, avoid
using the drive to prevent overwriting data.
• Backup Regularly: Regular backups can prevent data loss in
the future.
• Consult Professionals: For critical data, consider consulting
professional data recovery services.
6.Exercise on Preparing the Ethernet cable for cross
and direct connections using crimping tool and test
using LAN tester
Objectives:
 Learn the difference between straight-through and crossover
cables.
 Understand the pinout configurations for both types of cables.
 Gain practical experience in crimping Ethernet cables using a
crimping tool.
 Test the cable connectivity using a LAN tester.
Materials:
 Ethernet cable (Cat5e or higher)
 RJ-45 connectors
 Crimping tool
 LAN tester
Theory: Straight-through Cable:
 Used to connect a device to a hub, switch, or router.
 Pinout is the same at both ends.
Crossover Cable:
 Used to connect two similar devices directly (e.g., PC to PC,
router to router).
 Pinout is different at both ends.
Procedure:
Part A: Straight-through Cable
1. Cut the Ethernet cable to the desired length.
2. Strip the outer jacket of the cable to expose the twisted pairs.
3. Separate the twisted pairs and arrange them in the correct
order for a straight-through cable:
o Orange white
o Orange
o Green white

o Blue

o Blue white

o Green

o Brown white

o Brown

4. Insert the wires into the RJ-45 connector, ensuring correct


alignment.
5. Crimp the connector using the crimping tool.
6. Repeat steps 2-5 for the other end of the cable.
7. Test the cable using the LAN tester. All lights should
illuminate sequentially.
Part B: Crossover Cable
1. Cut the Ethernet cable to the desired length.
2. Strip the outer jacket of the cable to expose the twisted pairs.
3. Separate the twisted pairs and arrange them in the correct
order for a crossover cable:
o Orange white

o Green

o Orange

o Blue

o Blue white

o Green white

o Brown white

o Brown

4. Insert the wires into the RJ-45 connector, ensuring correct


alignment.
5. Crimp the connector using the crimping tool.
6. Repeat steps 2-5 for the other end of the cable, but reverse the
wire order.
7. Test the cable using the LAN tester. All lights should
illuminate sequentially.
Additional Tips:
 Ensure that the wires are inserted fully into the RJ-45
connector.
 Use a good quality crimping tool to avoid damaged connectors.
 Trim any excess wire after crimping.
 Always test the cable after crimping to verify connectivity
Conclusion: By following these steps, you should be able to
successfully create both straight-through and crossover
Ethernet cables and test their connectivity using a LAN tester.
7.Installation of switch and connect systems
Switch Installation
 Network Switch Installation typically refers to the
physical setup of a network switch within a network
infrastructure. This involves:
1.Unboxing and Inspection: Carefully unpack the switch,
checking for any physical damage.
2.Rack Mounting: If applicable, securely mount the switch in
a rack using appropriate hardware.
3.Power Connection: Connect the power cord to the switch
and a grounded power outlet.
4. Network Cabling: Connect network cables to the switch
ports based on your network topology.
5. Configuration: Configure the switch's basic settings (IP
address, VLANs, port configurations, etc.) using a
management interface (console, web, or SSH).
Image:
Image of network switch installation Opens in a new window
thewifispecialist.co.uk
network switch installation
Connecting a Systems Image to a switch is usually not
applicable. Systems images are primarily used for loading
operating systems onto servers, computers, or other devices.
If you meant installing an operating system (OS) on a network
device, such as a router or firewall, then the process would
involve:
1. Obtaining the OS Image: Acquire a compatible OS image
for your device from the vendor.
2. Transferring the Image: Use a TFTP server or other method
to transfer the image to the device's storage.
3. Booting from the Image: Configure the device to boot from
the image and initiate the installation process.
Image:
Image of transferring OS image to network device Opens in a new
window transferring OS image to network device
Clarifying Your Needs
To provide more specific guidance, please clarify the following:
 Type of Switch: Are you referring to a network switch,
power switch, or something else?
 Systems Image: What type of image are you working
with? An operating system image for a network device,
a software image for a switch, or something else?
 Specific Device Models: Knowing the exact models of
the switch and any other devices involved can help
provide tailored instructions.
 Desired Outcome: What is the final goal of this
process? What do you want to achieve?
8.Exercise on Installation of a modem (internal,
external or USB) and connecting to internet.
 Make sure you have all the necessary equipment. This
includes a modem, an Ethernet cable, and a router (if you're
using one).
 Follow the instructions that came with your modem. This
will vary depending on the type of modem you have.
 Connect your modem to your computer or router. If you're
using a router, connect the modem to the router's WAN port.
 Connect your computer to the router. If you're using a
router, connect your computer to one of the router's LAN ports.
 Turn on your modem and router. Wait a few minutes for
them to establish a connection.
 Open a web browser and try to access a website. If you can
access a website, your modem is working properly.

If you're having trouble connecting to the internet, here are


some things you can try:
 Check the status lights on your modem and router. These
lights will indicate whether the devices are connected to the
internet.
 Restart your modem and router. This can sometimes fix
connection problems.
 Contact your internet service provider. They can help you
troubleshoot the problem.
9.Exercise on Using FTP for uploading and
downloading files.
Objective:
• To understand the basic concepts of FTP.
• To gain hands-on experience in uploading and downloading
files using an FTP client.
Materials:
• Computer with internet access.
• FTP client (FileZilla, WinSCP, or built-in FTP client).
• Access to an FTP server (you can use a free FTP server like
FileZilla Server or an online FTP service). Image files
(e.g., .jpg, .png, .gif).
• Diploma lab manual (in PDF format).

Procedure:
1. Set Up the FTP Server (if necessary):
 If you don't have access to an FTP server, set one up using
FileZilla Server or create a free account on an online FTP
service.
 Configure the server with a username and password.
2. Connect to the FTP Server:
• Open your FTP client.
• Enter the server's hostname or IP address.
• Enter the username and password.
• Establish a connection to the server.
3. Create Remote Directories:
• In the right pane of your FTP client (which represents the
remote server), create two directories:
4. Upload Image Files:
• In the left pane of your FTP client (which represents your
local computer), navigate to the directory containing your
image files.
• Drag and drop the image files into the images directory on
the remote server.
• Alternatively, right-click on the image files and select the
"Upload" option.
5. Upload Diploma Lab Manual:
• In the left pane, navigate to the location of your diploma lab
manual (PDF file).
• Drag and drop the PDF file into the documents directory
on the remote server.
6. Download Image Files:
• Navigate to the image ‘s directory on the remote server.
• Select the image files you want to download.
• Drag and drop the selected files to a desired location on your
local computer.
• Alternatively, right-click on the image files and select the
"Download" option.
7. Download Diploma Lab Manual:
• Navigate to the document directory on the remote server.
• Select the diploma lab manual (PDF file).
• Download the file to your local computer.
8. Verify File Integrity:
Compare the downloaded files with the original files to ensure
they are identical.
Additional Exercises:
• Experiment with different file types (e.g., text, audio, video).
• Upload and download large files to test transfer speeds.
• Create subdirectories within the remote directories.
• Delete files and directories from the remote server.
• Use FTP commands (e.g., ls, cd, rm) in command-line FTP
clients.
• Explore FTP security options (e.g., SSL/TLS).

Set up automatic proxy using script on Windows 10


It is also possible to configure a proxy server using a setup script
You’ll need to manually configure this option adding the address to
the server hosting the script, but the proxy setup will happen
automatically.
To configure a proxy server using a script, use these step:
1.Open Settings.
2. Click on Network & Internet.
3. Click on Proxy.
4.Under the “Automatic proxy setup” section, turn on the Use setup
script toggle switch.
5.In the “Script address” textbox, type the address of the script
(or .pac file).

Windows 10
proxy server script setup

1.Click the Save button:

After you complete the steps, Windows 10 will read the


configuration from the script located in the address you specified.
Set up automatic proxy using manual configuration on Windows 10

To fully set up or change proxy server settings manually on


Windows 10, use these steps:

1. Open Settings.

2. Click on Network & Internet.

3. Click on Proxy.

4. Under the “Manual proxy setup” section, turn on the Use a


proxy server toggle switch.
5. In the “Address” textbox, type the address that connects to
proxy server.

6. In the “Port” textbox, type the port number required for the
proxy to work.

Proxy server manual setup on Windows 10

7. Click the Save button.

• Once the proxy is configured, network traffic will


automatically pass through the proxy server. However, it is
also possible to specify a list of addresses that will not use the
proxy. You can use the text box in the “Manual proxy setup”
section to specify these addresses using a semicolon (;) to
separate each entry. If you have multiple addresses from the
same domain, you can use an asterisk as a wildcard. For
example, *.website.com will match all the address in the
asterisk part,including forums.website.com, docs.website.com,
etc.Technically, there is no need for local network traffic to go
through a proxy unless required for your organization. do not
want to connect to local resources using a proxy. check the
Don’t use the proxy server for local(intranet)addressesoption
10. SETTING OF IP ADDRESS TO AN EXISTING
TERMINAL

Step 1: Open the Control Panel

Press “Windows + R”, then a Run box comes out.


Input control panel and press Enter to open the control panel.

You can also type control panel in the search bar at the lower left
of the screen and press Enter to open the control pan
Step 2: Go to Network Connections
Go to Network and Internet > Network and Sharing Center.

Select Change adapter settings on the left.


Step 3: Find the IP address
Right click the Ethernet icon and select Status from the context
menu.

Then click Details... to view all detailed information of network


connection.
Step 4: Set the IP address
Right Click Local Area Connection and select Properties.

Then double click Internet Protocol Version 4 (TCP/IPv4).


Select Use the Following IP address: and type in the IP
address, Subnet mask and Default gateway. Click OK to apply the
settings.

Note: If you need to set a static DNS server, select Use the
following DNS server address: and input the address of DNS
server. By default, the computer obtains the address automatically

11. To implement Transportation and Substitution using


Caesar Cipher Technique
AIM:
To implement the simple substitution technique named Caesar
cipher using C language.
DESCRIPTION:
To encrypt a message with a Caesar cipher, each letter in the
message is changed using
a simple rule: shift by three. Each letter is replaced by the letter
three letters ahead in the
alphabet. A becomes D, B becomes E, and so on. For the last
letters, we can think of the
alphabet as a circle and "wrap around". W becomes Z, X becomes
A, Y becomes B, and Z
becomes C. To change a message back, each letter is replaced by
the one three before it.
EXAMPLE:

ALGORITHM:
STEP-1: Read the plain text from the user.
STEP-2: Read the key value from the user.
STEP-3: If the key is positive then encrypt the text by adding the
key with each character in the plain text.

STEP-4: Else subtract the key from the plain text.


STEP-5: Display the cipher text obtained above.
PROGRAM: (Caesar Cipher)
#include <stdio .h>
#include <string .h>
#include<conio.h>
#include <ctype.h>
void main ()
{
char plain [10], cipher[10];
int key,i,length;
int result;
clrscr();
printf("\n Enter the plain text:");
scanf("%s", plain);
printf("\n Enter the key value:");
scanf("%d", &key);
printf("\n \n \t PLAIN TEXT: %s", plain);
printf("\n \n \t ENCRYPTED TEXT: ");
for(i = 0, length = strlen(plain); i < length; i++)
{
cipher[i]=plain[i] + key;
if (isupper(plain[i]) && (cipher[i] > 'Z'))
cipher[i] = cipher[i] - 26;
if (islower(plain[i]) && (cipher[i] > 'z'))
cipher[i] = cipher[i] - 26;
printf("%c", cipher[i]);
}
Printf ("\n \n \t AFTER DECRYPTION : ");

for (i=0; i<length; i++)


{
plain[i]=cipher[i]-key;
if(isupper(cipher[i])&&(plain[i]<'A'))
plain[i]=plain[i]+26;
if(islower(cipher[i])&&(plain[i]<'a'))
plain[i]=plain[i]+26;
printf("%c",plain[i]);
}
getch();
}

Output:
Result:

12. IMPLEMENTATION OF PLAYFAICIPHER

AIM:
To write a C program to implement the Playfair Substitution
technique.
DESCRIPTION:
The Playfair cipher starts with creating a key table. The key table is
a 5×5 grid of letters that will act as the key for encrypting your
plaintext. Each of the 25 letters must be unique and one letter of the
alphabet is omitted from the table (as there are 25 spots and 2letters
in the alphabet).
To encrypt a message, one would break the message into diagrams
(groups of 2 letters) such that, for example, "HelloWorld" becomes
"HE LL OW OR LD", and map them out on the key table. The two
letters of the diagram are considered as the opposite corners of a
rectangle in the key table. Note the relative position of the corners
of this rectangle. Then apply the following 4 rules, in order, to each
pair of letters in the plaintext:
1. If both letters are the same (or only one letter is left), add an "X"
after the first letter
2. If the letters appear on the same row of your table, replace them
with the letters to their
immediate right respectively
3. If the letters appear on the same column of your table, replace
them with the letters
immediately below respectively
4. If the letters are not on the same row or column, replace them
with the letters on the same
row respectively but at the other pair of corners of the rectangle
defined by the original
pair.

EXAMPLE:

ALGORITHM:
STEP-1: Read the plain text from the user.
STEP-2: Read the keyword from the user.
STEP-3: Arrange the keyword without duplicates in a 5*5 matrix
in the row order and fill
the remaining cells with missed out letters in alphabetical order.
Note that ‘i’ and
‘j’ takes the same cell.
STEP-4: Group the plain text in pairs and match the corresponding
corner letters by forming
a rectangular grid.
STEP-5: Display the obtained cipher text.
PROGRAM: (Playfair Cipher)
#include<stdio.h>
#include<conio.h>
#include<string.h>
#include<ctype.h>
#define MX 5
void playfair(char ch1,char ch2, char key[MX][MX])
{
int i, j, w, x, y, z;
FILE *out;
if((out=fopen("cipher. txt", "a+")) ==NULL)
{
printf("File Currupted.");
}
for(i=0;i<MX;i++)
{
}}}
for(j=0; j<MX; j++)
{
if(ch1==key[i][j])
{
w=i;
x=j;
}
else if(ch2==key[i][j])
{
y=i;
z=j;
//printf("%d %d %d %d", w, x, y, z);
if(w==y)
{
x= (x+1) %5; z=(z+1) %5;
printf("%c %c", key[w][x], key[y][z]);
printf(out, "%c %c", key[w][x], key[y][z]);
}
else if(x==z)
{

}
else
{
} w=(w+1) %5; y=(y+1) %5;
printf("%c %c", key[w][x], key[y][z]);

printf(out, "%c %c", key[w][x], key[y][z]);


printf("%c %c", key[w][z], key[y][x]);
printf(out, "%c %c" ,key[w][z], key[y][x]);
fclose(out);
}
void main ()
{
int i, j, k=0, l, m=0, n;
char key[MX][MX], key minus[25],key str[10],str[25]={0};
alpa [26] = {'A','B','C','D','E','F','G','H','I','J','K','L'
,'M','N','O','P','Q','R','S','T','U','V','W','X','Y','Z'};
Clrscr ();
printf("\n Enter key:");
gets(key str);
printf("\n Enter the plain text:");
gets(str);
n=strlen(key str);
//convert the characters to upper text
for (i=0; i<n; i++)
{
If(key str[i]=='j')key str[i]='i';
else if (key str[i]=='J') key str[i]='I';
key str[i] = to upper key str[i]);

}
//convert all the characters of plaintext to uppertext
for (i=0; i<strlen(str); i++)
{
}

j=0;
if(str[i]=='j') str[i]='i';
else if(str[i]=='J')str[i]='I';
str[i] = to upper(str[i]);
for(i=0; i<26; i++)
{
for(k=0; k<n; k++)
{
If (key str[k]==alpa[i])
break;
else if(alpa[i]=='J')
break;
}
if(k==n)
{
Key minus[j]=alpa[i]; j++;
}}
//construct key key matrix
k=0;
for(i=0; i<MX; i++)
{
for(j=0; j<MX; j++){
if(k<n)
{key[i][j] =key str[k];
k++;}
else
{
key[i][j] = key minus[m]; m++;
}

Printf ("%c ", key [i][j];


}
printf("\n");
}
Printf ("\n \n Entered text: %s\n Cipher Text:", str);
for(i=0; i<strlen(str); i++)
{
if(str[i]=='J') str[i]='I';
if(str[i+1] =='\0')
playfair(str[i],'X', key);
else
{
if(str[i+1] =='J') str[i+1] ='I';
if(str[i]==str[i+1])
playfair(str[i],'X', key);
else
{
playfair(str[i], str[i+1], key); i++;
}}
{
getch ();
}

Output:

Result:

13. IMPLEMENTATION OF HILL CIPHER

Aim:
To write a C program to implement the hill cipher substitution
techniques.

DESCRIPTION:
Each letter is represented by a number modulo 26. Often the simple
scheme A = 0, B= 1... Z = 25, is used, but this is not an essential
feature of the cipher. To encrypt a message, each block of n letters
is multiplied by an invertible n × n matrix, against modulus 26.
Tode crypt the message, each block is multiplied by the inverse of
them trix used for encryption. The matrix used for encryption is the
cipher key, and it should be chosen randomly from the set of
invertible n × n matrices (modulo 26).
ALGORITHM:
STEP-1: Read the plain text and key from the user.
STEP-2: Split the plain text into groups of length three.
STEP-3: Arrange the keyword in a 3*3 matrix.
STEP-4: Multiply the two matrices to obtain the cipher text of
length three.
STEP-5: Combine all these groups to get the complete cipher text.
PROGRAM: (Hill Cipher)
#include<stdio.h>

#include<conio.h>
#include<string.h>
int main ()
{
unsigned int a [3][3] = {{6,24,1}, {13,16,10}, {20,17,15}};
unsigned int b [3][3] = {{8,5,10}, {21,8,21}, {21,12,8}};
int i, j, t=0;
unsigned int c [20], d [20];
char msg [20];
clrscr ();
printf ("Enter plain text\n ");
scanf ("%s", msg);
for (i=0; i<strlen(msg); i++)
{
c[i]=msg[i]-65;
printf ("%d ", c[i]);
}
for (i=0; i<3; i++)
{
t=0;
for (j=0; j<3; j++)
{
t=t+(a[i][j] *c[j]);
}
d[i]=t%26;
}
Printf ("\n Encrypted Cipher Text:");
for (i=0; i<3; i++)
printf (" %c", d[i]+65);
for (i=0; i<3; i++)
{
t=0;
for (j=0; j<3; j++)
{
t=t+(b[i][j] * d[j]);
}
c[i]=t%26;
}
Printf ("\n Decrypted Cipher Text:");
for (i=0; i<3; i++)

printf (" %c", c[i]+65);


getch();
return 0;
}
OUTPUT:

Result:
14. IMPLEME TATION OF VIGENERE CIPHER

AIM:
To implement the Vigenere Cipher substitution technique
using C program.
DESCRIPTION:
To encrypt, a table of alphabets can be used, termed a tabula recta,
Vigenère square, or Vigenère table. It consists the alphabet written
out 26 times in different rows, each alphabet shifted cyclically to
the left compared to the previous alphabet, corresponding to the
possible Caesar ciphers. At different points in the encryption
process, the cipher uses a different alphabet from one of the rows.
The alphabet used at each point repeating keyword. depends on a
Each row starts with a key letter. The remainder of the row holds
the letters A to Z. Although there are 26 key rows shown, you will
only use as many keys as there are unique letters in the key string,
here just 5 keys, {L, E, M, O, N}. For successive letters of the
message, we are going to take successive letters of the key string,
and encipher each message letter using its corresponding key row.
Choose the next letter of the key, go al ng that row to find the
column heading that at the message character; the letter at the
intersection of [key-row, msg-col] is the enciphered letter.

ALGORITHM:
STEP-1: Arrange the alphabets in row and column of a 26*26
matrix.
STEP-2: Circulate the alphabets in each row to position left such
that the first letter is attached to last.
STEP-3: Repeat this process for all 26 rows and construct the final
key matrix.
STEP-4: The keyword and the plain text is read from the user.
STEP-5: The characters in the keyword are repeated sequentially
so as to match with
that of the plain text.
STEP-6: Pick the first letter of the plain text and that of the
keyword as the row indices
and column indices respectively.
STEP-7: The junction character where these two meet forms the
cipher character.
STEP-8: Repeat the above steps to generate the entire cipher text.
PROGRAM: (Vigenere Cipher)
#include <stdio.h>
#include<conio.h>
#include < ctype. h>
#include <string .h>
void encipher ();
void decipher ();
void main ()
{
int choice;
clrscr ();
while (1)
{
Print f ("\n1. Encrypt Text");
Print f ("\t2. Decrypt Text");
Print f ("\t3. Exit");

Print f ("\n\n Enter Your Choice: ");


Scan f ("%d", &choice);
If (choice == 3)
Exit (0);
else if (choice == 1)
encipher ();
else if (choice == 2)
decipher ();
else
print f ("Please Enter Valid Option.");
}
}
void encipher ()
{
unsigned int I, j;
char input [50], key [10];
print f ("\n\n Enter Plain Text: ");
scan f ("%s", input);
print f ("\n Enter Key Value: ");
scan f ("%s", key);
print f ("\n Resultant Cipher Text: ");

for (i=0, j=0; i<strlen(input); i++, j++)


{
if(j>=strlen(key))
{
j=0;
}

Printf ("%c",65+(((to upper(input[i])-65) +(to upper (key[j])65))


%26));
}}
void decipher ()
{
unsigned int i, j;
char input [50], key [10];
int value;
printf ("\n \n Enter Cipher Text: ");
scanf ("%s", input);
printf ("\n \n Enter the key value: ");
scanf ("%s", key);
for (i=0, j=0; i<strlen(input); i++, j++)
{
if(j>=strlen(key))
{
j=0;
}
value = (toupper(input[i])-64) -(toupper(key[j])-64);
if( value < 0)
{ value = value * -1;
}
printf("%c",65 + (value % 26));
}}
Output:

Result:

15. IMPLEMENTATION OF RSA

AIM:
To write a program to implement the RSA encryption
algorithm.
DESCRIPTION:
RSA is an algorithm used by modern computers to encrypt and
decrypt messages. It is an asymmetric cryptographic algorithm.
Asymmetric means that there are two different keys.
This is also called public key cryptography, because one of them
can be given to everyone. A basic principle behind RSA is the
observation that it is practical to find three very large positive
integers e, d and n such that with modular exponentiation for all
integer m:
(me) d = m (mod n)
The public key is represented by the integers n and e; and, the
private key, by the integer d. m represents the message. RSA
involves a public key and a private key. The public key can be
known by everyone and is used for encrypting messages. The
intention is that messages encrypted with the public key can only
be decrypted in a reasonable amount of time using the private key.

ALGORITHM:
STEP-1: Select two co-prime numbers as p and q.
STEP-2: Compute n as the product of p and q.
STEP-3: Compute (p-1) * (q-1) and store it in z.
STEP-4: Select a random prime number e that is less than that of z.
STEP-5: Compute the private key, d as e * mod-1 (z).
STEP6: The cipher text is computed as message * mod n. STEP7:
Decryption is done as ciphered mod n.
PROGRAM: (RSA)
#include<stdio.h>
#include<conio.h>
#include<stdlib.h>
#include<math.h>
#include<string.h>
long int
p, q, n, t, flag, e[100], d[100],temp[100],j, m[100], en[100],i;
char msg[100];
int prime(long int);
void ce ();
long int cd (long int);
void encrypt();
void decrypt();
void main()
{
clrscr();
printf("\n ENTER FIRST PRIME NUMBER\n");
scanf("%d", &p);
flag=prime(p);
if(flag==0)
{
printf("\n WRONG INPUT\n");
getch();
}
printf("\n ENTER ANOTHER PRIME NUMBER\n");
scanf("%d", &q);
flag=prime(q);
if(flag==0||p==q)
{
Print f ("\n WRONG INPUT\n");
getch ();
}
Printf ("\nENTER MESSAGE\n");
flush(stdin);
scanf("%s", msg);
for(i=0; msg[i]! =NULL; i++)
m[i]=msg[i];
n=p*q;
t=(p-1) * (q-1);
ce ();
print f ("\n POSSIBLE VALUES OF e AND d ARE\n");
for (i=0; i<j-1; i++)
printf ("\n % ld \t %ld", e[i], d[i]);
encrypt ();
decrypt ();
getch();
}
int prime (long int pr)
{
int i;

j=sqrt(pr);
for(i=2; i<=j; i++)
{
If (pr% i==0)
return 0;
}
return 1;
}
void ce()
{
int k;
k=0;
for (i=2; i<t; i++)
{
if(t% i==0)
continue;
flag=prime(i);
if (flag==1&& i! = p&&i! = q)
{
e[k]=i;
flag=cd(e[k]);
if(flag>0)
{
d[k]=flag;
k++;
}
if(k==99)
break;
}}}

long int cd(long int x)


{
long int k=1;
while(1)
{
k=k+t;
if(k %x==0)
return(k/x);
}}
void encrypt() {
long int pt, ct, key=e[0],k,len;
i=0;
len=strlen(msg);
while (i! = len ) {
pt=m[i];
pt=pt-96;
k=1;
for (j=0; j<key; j++)
{
k=k*pt;
k=k %n;
}
temp[i]=k;
ct=k+96;
en[i]=ct;
i++;
}
en[i]=-1;
printf("\n THE ENCRYPTED MESSAGE IS\n");

for (i=0; en[i]! = -1; i++)


printf ("%c", en[i]);
}
void decrypt ()
{
long int pt, ct, key=d [0], k;
i=0;
while(en[i]! =-1)
{
ct=temp[i];
k=1;
for (j=0; j<key; j++)
{
k=k*ct;
k=k %n;
}
pt=k+96;
m[i]=pt;
i++;
}
m[i]=-1;
printf("\n THE DECRYPTED MESSAGE IS\n");
for (i=0; m[i]! = -1; i++)
printf ("%c", m[i]);
}
OUTPUT:

Result:

16.IMPLEMENTATION OF DIGITAL SIGNATURE


STANDARD
AIM:
To write a program to implement the signature scheme named
digital signature
standard
ALGORITHM:
STEP-1: Alice and Bob are investigating a forgery case of x and y.
STEP-2: X had document signed by him but he says he did not
sign that document digitally.
STEP-3: Alice reads the two prime numbers p and a.
STEP-4: He chooses a random co-primes alpha and beta and the
x’s original signature
STEP-5: With these values, he applies it to the elliptic curve
cryptographic equation to obtain y.
STEP-6: Comparing this ‘y’ with actual y’s document, Alice
concludes that y is a forgery.
PROGRAM: (Digital Signature Standard)
import java. util.*;
import java. Math. Big Integer;
class dsaAlg {
final static Big Integer one = new Big Integer("1");
final static Big Integer zero = new Biginteger ("0");
public static Big Integer get Next Prime (String ans)
{
BigInteger test = new BigInteger(ans);
{
test = test. add(one);
}

return test;

}
public static BigInteger find Q (BigInteger n)
{
BigInteger start = new BigInteger("2");
while (! n.is Probable Prime(99))
{
while (! ((n.mod(start)).equals(zero)))
{
start = start.add(one);
}
n = n.divide(start);
}
return n;
}
public static BigInteger getGen(BigInteger p, BigInteger q,
Random r)
{
BigInteger h = new BigInteger(p.bitLength(), r);
h = h.mod(p);
return h.modPow((p.subtract(one)).divide(q), p);
}
public static void main (String[] args) throws
java.lang.Exception
{
Random randObj = new Random();
BigInteger p = getNextPrime("10600"); /* approximate prime */
Big Integer q = findQ (p. subtract(one));

BigInteger g = getGen(p, q, r and Obj);


System. out. Println (" \n simulation of Digital Signature
Algorithm \n");
System. out. Println (" \n global public key components
are:\n");
System. Out. Println ("\np is: " + p);
System. out. Println ("\nq is: " + q);
System. out. Println ("\ng is: " + g);
BigInteger x = new BigInteger(q. bit length(), randObj);
x = x.mod(q);

BigInteger y = g. mod Pow (x, p);


BigInteger k = new BigInteger (q. bitlength (), randObj);
k = k.mod(q);
BigInteger r = (g.modPow(k, p)).mod(q);
BigInteger hashVal = new BigInteger(p.bitLength(),
randObj);
BigInteger kInv = k.modInverse(q);
BigInteger s = kInv.multiply(hashVal.add(x.multiply(r)));
s = s.mod(q);
System. out. Println ("\n secret information are:\n");
System. out println ("r is: " + r);
System. out. Println ("s is: " + s); println ("x (private) is:" + x);
System. out. println("k (secret) is: " + k);
System. out. println("y (public) is: " + y);
System. out. println("h (r ndhash) is: " + hashVal);
System. out. println("\n generating digital signature:\n");
BigInteger w = s. modInverse (q);
BigInteger u1 = (hashVal.multiply(w)).mod(q);

BigInteger u2 = (r.multiply(w)).mod(q);
BigInteger v = (g.mod Pow (u1, p)). Multiply (y.modPow(u2, p));
v = (v.mod(p)).mod(q);
System. out. Println ("\n verifying digital signature
(checkpoints)\n:");
System. out. println("w is: " + w);
System. out. println("u1 is: " + u1);
System. out. println("u2 is: " + u2);
System. out. println("v is: " + v);
if (v. equals(r))
{
}
else
{
}
}
}
System .out. print ln ("\n success: digital signature is
verified! \ n " + r);
System. out. Print ln ("\n error: incorrect digital
signature\n ");
OUTPUT:

Result:

17. TO PERFORM THE PROCEDURE OF INSTALLATION


PROCESS OF ANTIVIRUS TO DETECT THREATS

Installing Avast Free Antivirus


Applies to Avast Free Antivirus for Windows show details

Avast Free Antivirus for Windows is an essential security


application that helps prevent viruses, spyware, and other malicious
threats from infecting your PC. This article explains how to
download and install Avast Free Antivirus.
Install Avast Free Antivirus
1. Click the button below to download the Avast Free
Antivirus setup file, and save it in a familiar location on your
PC (by default, downloaded files are saved to
your Downloads folder).
Download Avast Free Antivirus for Windows
2. Right-click the downloaded setup
file avast_free_antivirus_setup_online.exe and select Run as
administrator from the context menu.
Note: If you do not see the Run as administrator option, refer to the
following article for instructions to manage administrative accounts
on your PC: Managing administrative accounts on your Windows
PC.

3. If prompted for permission by the User Account


Control dialog, click Yes.

4. To change the default setup language, choose your preferred in


the top-right corner of the screen. Then, click Install.

5. Wait while setup installs Avast Free Antivirus on your PC.

6. When the installation is complete, click Run smart scan to start


a comprehensive Smart Scan, which can detect viruses,
malware, bad browser add-ons, and other issues on your PC.

Avast Free Antivirus is now installed, but some components may


not fully function until you restart your PC.
18. LEARN THE PROCEDURE TO ENSURE SECURITY
BASIC FIREWALLL CAN BE ENABLED IN THE SYSTEM

Checking Firewall Settings on a PC


 Open your Start menu. Windows' default firewall
program is located in the "System and Security" folder of
the Control Panel app, but you can easily access your
firewall's settings by using the Start menu's search bar.
 You can also tap the ⊞ Win key to do this.

1.Type "firewall" into the search bar. Doing so will


automatically search your computer for applications matching your
typing.

2.Click the "Windows Firewall" option. You should see this at


the top of the search window
1.Review your firewall settings. You should see two sections
entitled "Private networks" and "Guest or public networks" with
green shields to the left of them, signifying that your firewall active.
 Clicking on either of these sections will prompt a drop-
down menu with details about your current private or
public networks.

2.Click the "Advanced Settings" option. This is to the left of the


main menu; clicking it will open your firewall's advanced settings
menu, from which you can view or alter the following:
 "Inbound Rules" - Which incoming connections are
automatically allowed.
 "Outbound Rules" - Which outgoing connections are
automatically allowed.
 "Connection Security Rules" - Baselines for which
connections your computer will allow and which ones it
will block.
 "Monitoring" - An overview of your firewall's basic
monitoring guidelines.

1. Exit the Advanced Settings menu when you're


finished. You have successfully checked your PC's
firewall settings!
 Note that you can also click the "Turn Windows Firewall
on or off" in the same option menu in which you found
Advanced Settings. Be wary of disabling your firewall,
especially when connected to a public network.

You might also like