0% found this document useful (0 votes)
6 views21 pages

Nis 10-16

The document outlines practical exercises related to digital signatures, steganography, and firewalls at MVPS Rajarshi Shahu Maharaj Polytechnic. It explains the creation and verification of digital signatures, the process of encoding and decoding messages using steganography, and the installation and configuration of firewalls for network security. Additionally, it discusses the importance of digital certificates for authentication and secure communication.

Uploaded by

invincible0412
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views21 pages

Nis 10-16

The document outlines practical exercises related to digital signatures, steganography, and firewalls at MVPS Rajarshi Shahu Maharaj Polytechnic. It explains the creation and verification of digital signatures, the process of encoding and decoding messages using steganography, and the installation and configuration of firewalls for network security. Additionally, it discusses the importance of digital certificates for authentication and secure communication.

Uploaded by

invincible0412
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 21

MvPS Rajarshi Shahu Maharaj Polytechnic.

Nashik 13

Practical No.Ho
Create and veriey oigital signature
using tool Ce.g Cryptool)

oigital Signature
- A digital signatue i5 an
electronic Si9narue
used to autthenticate the identity of the
Gender or tthe Signer a document
Tt haG the ability to e that the
oiginal contet of the sends unchanged.
Qigital Signatue rre boGed upon hashing
funcionS and a aynmetric crypto graphy bgth:
Both encry ption method ploy an important ole
cohen signing a digital document

Encrypt hash

using
Key

Gigner S oigitally
Gigned document
public Key

SAVE PAPER & SAVE ENVIRONLIENT


Polytechnic, Nashik - 13.
MVPS Rajarshi Shahu Mabarai

Creation and Veri-fication oE Digital 5igature

A) At Sender 's End signing

Hash
Encry Pt hash
DatO
using
Signer'S
Privote
Key

Signatre

Attah

Digitouy signed
dattO

SAVE PAPER & SAVE ENVIRONMENT


Nashik - 13
MVPS Rajarshi Shahu Maharaj Polytechnic.

DMesSSage Digest iS aeoraHed using Hash functhon


a I t iG encrye+ed coith cendor'9 priv ate key
The resuting ency pr+ed message digs
digital signate send
3) Otal Signtre te ottoched to data
-to Tecoiver

CreatiOn and verification of Diatal Signature


B) At ReceiverS End - Veri-eicatioo

Digitay STgned
DctO

iloL10II1O
Sianacture
Decypt
DOto
USing
Hash Siqners
Public
anci KOY

|01100110101
|10110o|10101
HaSn
Hash
F t e hashe ate equa

the sgnatre iS Valid.


("SAVE PAPER &SAVE ENVIRONMENT)
Nashik- 13.
MVPS Rajarshi Shahu Maharai Polytechnic,

Practical NO. 11
Use GteqanOgTaphy to encode and
decode the nessage using any tOo
Introcduction
ne Dod Steqanoareapu is doived -fron too
Greek cOord9- stegos eneaning to cover and
qrayfia meaning 'oting thus translating
to Covered coting
or hidden cortting"
Steganography i9 a method of hiding Secret dat
by ernbedding it into an
oT text
audio. ideo imag
file. H i9 one of t e methodS to
protect Gecret Sensi-tive dato -ro
malicious attackG.
-Image 6teganography
As the nane
cefers to tte Guggests, Iage Steqanography
tile The imageprocesS ot hiding data ottin an irnage
Gelected for this purpose i6
Called the coV er-image and he image
after
Gteganography 1Gcalled the obtaine
stego-image

SAVE PAPER &SAVE


ENVIRONMENT
Polytechnic, Nashik - 13.
MVPS Rajarshi Shahu Maharaj

Hoco iG it done ?
An image i9 meresentod as an NKM
Cin case of 9reyscale Images 1 or N*M * 3
Cin case of colou images) rmatriy in cnenory oith

each entry mepresenting the intensity value cf a


pixel. Tn image Gteqano qoaphy ,a mesS age
embedded ito ao lmage by alterioa the values o
eorme pixels cohich ane chosen by an encrypon
algorithm, The ecipient of he inage muGt be
f the ame wgotho in ocde to knoco
aoare
ohich pixelS he r she must Gelect to extract the
message.
Cover-image
Encryption
Text
Alaonrithm

Stego -irnage

Cover-irnoge Decryption
Alqcrittm

Cia. ProcesS of Image Shegano qraphy

SAVE PAPER &SAVE ENVIRONMENT


Nashik13.
MVPS Rajarshi Shahu Maharai Polytechnic

Detectian of the neseage coithio ne cover-imag


1S done by -the process oc
steganolysi
This Can be done though compaison coi-th the
COVerimage hiGtogamn plotting OT O
detection, Nhile effortG being ioveGted
developing nes algoithms coith a gre
degree oF immuntty acai net 6uch attacks
eFfertS ame also being devotel t o o a r d s
improving existing algorithms -fer GteganalysiS
to detect exchange oE Secret information
beteoeen terroriSts on riminal eleOentS

H. Steganography Encode Conline)


Encode message
TO encode amessage intO an image.chooSethe
{mage you coart to ge,enter youtet 2
hit t h e encode buttOn
Save the last image, t o Contain your
hidden message.
Remember t h e n o e text you Oant to hide.
iae
he lanna e the inage has to b e I n caa
chooge an image that is to GrnalLto hold your
mesage ou oill be iformed
Neitther the image n a t h e mesGaago
bide coill bo at any moment transrol-tted
over he Oeb a l he magiC happeng
coithin youT brouOSer
SAVE PAPER & SAVE ENVIRONMENT
Poltechnic Pashik- 13
Raarsh Shabu Mahara

2.5egencgraphy
Decode image
Decode
TO decoe abiddGo Frorman imag
just chooSe an image
message
and h t he oecode
button.
h a t has
Nether -the inage no henesGage
monent ronGni
oeen hidden coiIl e at ay
ted ver the coeb.aI he magic hopp
ODOyom rooSer.
Conciueion
Thus coe have Use steaanogaphy to
encode and decode the message ASing any
tool

SAVE PAPER &SAVE ENNIRONNMENT


13.
Maharaj Polytechnic, Nashik-
MvPS Rajarshi Shahu

Practical No.H2
a .Iostall
I -fieoall on any operating system
b. Contigure Freball sertinaS on any Operoting
Stem.

Introduction
The fireuoall i9the sluo r hlo Gyster
o
Compuer
cohich iG ueed to divide one nlo
from another one, MOst op the cormmon
types of freoal help to protect an entie
unauthrize
a Computer -From the
acceSS Eromn an internet
used to control he dato
The PirecoallG also
to murtiple netorcG io
FlocD From ond
rganizationG.ThiS -FirecOall Can
the GOrme
filHer the daO
also be proroummed to
packet baSed on any information whic is
Contained in a packet

50ftuDare and HaduDaTe fireoal|S


SoPtaDaYe EirewalIL
fireaDall ,ethey are port of the
The Slo the rd prty application
opeating SyStem
install9 on the opeating SyGtern and
Cohich confiqure instead
also Can

ENVIRONMENT)
SAVE PAPER & SAVE
oein
Singi hosr as
Corfiqrration -for e
Gfiehbifrthe
orehan one n l

sntertace.Lt
hype6 of rafFic

coananes the fooG deend


Gnd hoto
funcEicn
likely o arovide O e r
the -ireoai1 ig Services and NAT
alitie
CHetorrk AddrGss Trangiation)

Hardaarre firewall
19the Specialized appliances
rte hlofrewaI1 the packeS betuoee
to filter
obich cre built Most
thenetuOgrg. oFthe Cormnonpe oP
n entire
cirreoalis 1S used tO prrevent
hluo
coroputer rorm an unauthrized
internet
a
acceeG frorn
qSed to cortrol -he dOko
Thefireoall can be
Garne
arqanissations .This fireoall
-floo o t t e rogarned
-to Cotrol
Can be used packet baged
data
-filer -the packet. The eampIe
Contained i n a
shic hlofireoals Such as Bluecoat
porty
and eorracudo
ENVIRONMEUT
AVE PAPER & SAVE
Nashik- 13.
MVPS Rajarshi Shahu Mabarai Polytechnic.

Gteps to installthe Firewoll


Gtep Open any coeb broOSer
step2Gerrch for porticulor reub all as per youT
Tequirernent.
etep 3 Doonlaad he fiewall sluo in you
COmpter SGte.
TnStal| the c i e a l ) i you SYSterm
6tep
step ou nave succgGfuily tnstalled tthe
fieHal in youT desktop System

StepS to Confique finewall :

Secre youm firewall


step and
fimeDalzones
Gtep : Ardhitect you
TP addresses.
Step 3 Coneiqure accesg control ligts
Services
Step 4 ConFiqrre our Other Eieoall
and logging
confiaration
Step 5 TeSt your fireoall

Conclusion confiaured o
succeGS-fully insfalTed and
We Operoting System.
Eireuo all on a n
demonStates fireoallG act aG-he
hou
This
line of de fense Netuogrk Geurity by
-flrst
and controlIìng 'ncoming % Outgoing
monitoring
& SAVE ENVIRONMENT
SAVE PAPER
trafeic.
Nashik 13
Maharai Polytechnic,
MVPS Rajarshi Shahu

Practical No.H3 Certificate


Creatte Digital
and Verify
using -tool Ce.g. Cryptool)

Digital certificates : secret - 4ey encryption


diecerent
a
-rhe other type of encryption USes
digial cortticotte G one exarnple
pocess. A individuals
DIgital certificates one 1aGued to
,apivate
by a certificate authority CCA)
useT
chaaeg orthe tho
Com pany t h a t certficate.
the meceiver -for isSuing au
iG an example of an
The cornpany DocuSign
Certficates.
isSuer of digital
uGe digital certficateg
Grqanizations collI
identities oe people &
to verify the business o i h . - - . .
Organizattion they do
trust
and need t o

an online
Tetaul StOre, o
For eyaople
paynent
even an ganzaation accepting a
for merchandise ,OantS t o m k e suTe hat

Sending credit crd iFor matton


Someone
aCtualo0nOY o the camd 2
iStne
tolen credit Camd no.
Someone orth
uSe i t forn a foreign coutry
trying to
ENVIRONMENT
SAVE PAPER & SAVE
Polytechnic Nashik - 3
MvPs Rajarshi Shahu Maharai

A àgital CertiEiee coaing ioformato


-that helps qumatee a nerson i6 at an
impost or. ou get a digirtal certiFicate
request by visiting a CA cDebete &
providing information that identifies you

-our digital certificate contain :


you name
the ame of the certiEicate authorty
n o t s expirrahon date
a unique cetificate serlal
you Gend)
unique private key Cincludeos
the digitol Signature of the CA

isSued , t t e CA oill put the


O5ce it'S
hrive,along coth
certificate on your hrd
a privte Key
hatS all in place yOu're ready +o
Once
certified emailS. 0ftentimes , a
Gend obtaun o
oill Tequest -that yo
omaanization
cetificate beEore Ou can connmnicate
A'kaital O02otecHoo
hem diqitally to thei
oh uSing a digital
an ennail
When Uou send onlythe publi
certieicate,it contains
inFomation ofE the uGer Such aS0.narme
The perSonal cOrmponent OF yon
and public key
credentiolSteponate Key ,
included
Siqnature in certi-ficate
Polytechnic, Nashik 15
Maharai
MVPS Rajarshi Shahu

Cew
Compred to handitten Signatres ohich
people bother to diqital signature is
verify a because o-f al1
hamd to -forget initate
he Safeguard hat anre in place

DemonGtration of diaitol signartureS uSing


CrypToo1

De need to aeoergt a bash valueO


- FiSt
the document
Next qenerate a key pair.
AEter Successfully generating Keye,ency pt
qenerated earlier.
-he hash Value
need toCrecrt e certieicate
- We
associated coith the RSA Key
Store Signature
click on

Conclusion
created and veriEied a
We successfully
CrypTool
dig ital certificate using
demonStrated hoo digita l certiEicateg
This
provide authentiCation alhtegrity,andtrust
Connmunicationg.
SecuTe

ENVIRONMENt
SAVE PAPER & SAVE
Polytechnic. Nashik 13
MVPS Rajarshi Shahu Mabarai

Practical No.H4
Ttace the origin of Email using
any ttool Cermai Tracker Pro)

.Introducti on

Step
from t e
Click ontte email uou want to preGS
inboX Uie
step 2
a doon aroco
When the email opens, th ere oill be
email li cking
inthe top righthand coner of the
Click onhe Shoco
-this oill open arop doon menu
riqinal option
6tep 3
open in the broOSe and io
Anew tab will
entire emails bath e
hat tab oill be the
header content oill be visible
header, The
Al hat is xequired intthe
top +ext i6 header
Very
Step 4 ennail racker
wIGe tiG header-he
TO
ro,yohave to oll06 Simple instuctions

belouD

ENVIRONMENT
SAVE PAPER & SAVE
Nashik-3
MVPS Rajarshi Shahu Maharaj Polytechnic

" Highlight the header b dicking and dragging


yocCuSoT Over e heodpr text. Make 5 r e
headers
you have got the cnole eoder as one
are to be for oindoO uou uoi|1 be r equlred to
Gcroll down By dragaino t soould automatically
Scroll douon -fo you.
Hold down the "ctr1 buttoo oo your Keyooard 3
-then presSCkey once this has Copied 3
heighlighted headers.
Open emailtraclker pro ie it is not already
ohere the
opened and click inside the dialoa box
The header should be
header are to bo pagted
his iS
autonahcally pased into the dlalog boX, if
not t he case hen hold doon the ctrl" key Claain

then pTessthe N keg to paSte the header into


enai tracker po
cliCk +he
once he header have been paSte
the trace
rTra ce b t t o o to intia+e

Per Forming a Trace:


Stroes -the ouHO
The above image While
cunenmheader
ake t o tra ce
tab o the Mytnace Report
-|e
in t h e
Secioo and cliCk the Trace Hecdersopion

ENVIRONMENT)
SAVE PAPER & SAVE
Polytechnic, Nashik 13
MVPS Rajarshi Shahu Maharaj

The email trace diolo boy oill appear a


Shoubn

tracing a ernail ace


an ernaiL 5ave

or loop up neton sponsible or


email addresS TO pin point the inelg oTigin of an
ernait he trace and eroaoch is received op
6 me Oay to go.this enuires une header frem
aeemail that neede radng.on ce the email
header has been cbained emolu copy and pose
ito the Ermgtl header ext ooX 8 click
tTace button .his niLl
iniaehe trace
A neOtab oll oneo o i h each ne0troCe
cloSing tthe tab wilL Stophe cument
traCe

The likely locaton oigio of


the email
oill appea o the coorld
map 2 he
oute table coil begi to
populate
Resources 0Sed

computer SyStem - hp i5 core)


Operating System SGe RAM
Software Puthon 3.
12,
EmoilTrockerpro
SAVE PAPER &L SAVE
ENVIRONMENT
Maharai Polytechnic. Nashik 13
MVPS Rajarshi Shahu

Conclusion

The uSe of tolg iíke a email-trckor Pro


e5 O Valuable eo09 cace -the crigtDS
of ernarls, providina ingights into tthe
Sender'g location and actvity through its
-tracking Capabilities,it enables use to uncouer
crucial detoilG reqar dina h e source mOte
potentialluthe authenticity of ernail
comuni cations
y leveraging Such tool8, ueer gain a deeper
anderstanding of e m l , Oiging,enhancing
heir ability to Nerify and authenticity
inconingmessage ohile alsofasterin a
me gecure and informed cpprochto
online CommuniCatioo

CAVE PAPER &SAVE ENVIRONE


13
Maharaj Polytechnic, Nashik
MVPS Rajarshi Shahu

Practical No. H5
Trace the ooth of website using
Tracert UEility pap Enail Gecurity

Lotroduction
Digital Networks ame a constantiy chonging
onstant
Phenomena Cohich meanS,-they reauire
monitring an d ceconguration iE they re
to be kept os eceiient aG possible
meanS the adoioiGtoatorS that re responsible
-OT-the nkeep ofSuch netuOGrkS Tequire
toolthat help then oake sense oF obat

today. has becooe a cornplicated mash-up


digital big h coays connecting a
CoTnucop+o of qadgetS ttat co omuni cate
transfer trafeic.
uSing inSanelq-ast data
USerS o n t e other and,have
Their
coroe to expect rellable and fast connecticrs
ohenever they \og on to a Netuoakk
otheroise)

CommoOSCenarGS have Creaed


eGe tuo0
roake all
o dernand for tool5 that help
Stakeholdes happy
tooISthere iS one
And among may Such
COonelp oith Iàetifing cOnnectivity
that
latency.1seues the traceroute
and
tracert
CommanepAPER& SAVE ENVIRONMENT)
Shahu Maharaj Polytechnic Nashik- 13
MVPS Rajarshi

GtepS

120,2%1

Conclusion

SAVE PAPER & SAVE ENVIRCNMENT


Maharaj Polytechnic. Nashik - 13
MVPS Rajarshi Shahu

Practical No16
a. Gene rate Pubiic and Drivate key pair.
pai
b. Encrypt and Decrpt nessage usiog key

Iotroduction
Steps:
double - clicking
tat the PuN geo utility, bu
on itS .exe -cile.
o aenerCrte,Select RS
2FOr Type oe keu
aenerated key
In the numbe of oitG in a
-field,Speciey ether 2oua or uog6
4 click on qonerate buttton
mouGe pointer cound iothe
Move your
blank area oF ley section .belouD the prrogress
,until the progressba iGull

|6 privtel public key paim has no been


qenerated.
Io he Key comment field, enter any
comment you' d il<e, to help you identfu
Hhis key pa ate/
click Save ^public key button
the chooSe
ohatever filenanne you'd 1ike.
Right clfck agai in the Game text Field
andchoose copy
Now caddthe public Key hash -to the arthori-
Zed Key - i l e on Lhe target serve,TeStanrt
sshdyou can aegjiOging jto that Specitic
S e r v r orth key
Polytechnic, Nashik - 13.
MVPS Rajarshi Shahu Maharaj

Conclusion
Thus coe have and
Stu died Encrypt
paim.
Decrypt message using key

ENVIRONMENT
SAVE PAPER &SAVE

You might also like