This repository houses practical implementations for the Information Security Laboratory course (310258) offered in the Third Year of Computer Engineering (2019 Course) at Savitribai Phule Pune University. Dive in and explore the fascinating world of cryptography, security algorithms, and digital protection!
🏛️ Course Information:
- University: Savitribai Phule Pune University
- Course Name: Laboratory Practice II (310258)
- Focus: Information Security
- Companion Courses:
- Artificial Intelligence (310253)
- Elective II (310254)
- Credit: 02
- Examination Scheme:
- Practical: 04 Hours/Week
- Term Work: 50 Marks
- Practical Exam: 25 Marks
🎯 Learning Objectives:
- Master various search strategies fundamental to Artificial Intelligence (AI).
- Formalize and implement constraints within search problems.
- Gain a comprehensive understanding of core Information Security concepts.
- Develop practical skills in applying cryptographic techniques for problem-solving.
- Design and implement robust security solutions.
💡 Course Outcomes (Information Security):
Upon successful completion of this laboratory course, students will be able to:
- CO4: Confidently utilize tools and techniques central to the field of Information Security.
- CO5: Effectively apply cryptographic techniques to address real-world security challenges.
- CO6: Design and develop secure software solutions.
📂 Practical Implementations (Choose any five):
Practical No. | Description |
---|---|
1 | Bitwise Operations: Manipulate characters in a string using bitwise AND, OR, and XOR operations. |
2 | Transposition Cipher: Implement encryption and decryption using the Transposition cipher technique. |
3 | Data Encryption Standard (DES): Explore the inner workings of the DES algorithm through implementation. |
4 | Advanced Encryption Standard (AES): Gain proficiency in implementing the robust AES algorithm. |
5 | RSA Algorithm: Understand and implement the widely used RSA public-key cryptosystem. |
6 | Diffie-Hellman Key Exchange: Explore different Diffie-Hellman key exchange mechanisms. |
7 | MD5 Hashing: Calculate the MD5 message digest of a text input using Java. |
🚀 Getting Started:
Navigate to the directory of the practical implementation you want to explore. Each directory contains well-documented code files with clear instructions and explanations to guide your learning.
🙌 Contributions:
We welcome contributions from students, educators, and security enthusiasts alike! If you have any improvements, bug fixes, or additional practical examples to share, please open a pull request. Kindly refer to our CONTRIBUTING.md file for guidelines.
📄 License:
This repository is distributed under the MIT License. You are free to use, modify, and distribute the code for educational and personal projects.
Let's strengthen our understanding of information security together! 🛡️