Index: S.N Practical'S Name Date Remark'S
Index: S.N Practical'S Name Date Remark'S
Authentication
Authentication refers to identifying each user of the system and associating the
executing programs with those users. It is the responsibility of the Operating
System to create a protection system which ensures that a user who is running a
particular program is authentic. Operating Systems generally
identifies/authenticates users using following three ways −
Username / Password − User need to enter a registered username and
password with Operating system to login into the system.
User card/key − User need to punch card in card slot, or enter key
generated by key generator in option provided by operating system to
login into the system.
User attribute - fingerprint/ eye retina pattern/ signature − User need
to pass his/her attribute via designated input device used by operating
system to login into the system.
One Time passwords
One-time passwords provide additional security along with normal
authentication. In One-Time Password system, a unique password is required
every time user tries to login into the system. Once a one-time password is
used, then it cannot be used again.
Cryptography
Windows also includes support for Elliptic curve cryptography. The Kerberos
protocol in Windows has been updated to use AES encryption over DES.
The Windows LAN manager has been updated to use NTLM2 hashes by default
instead of SHA1 or MD5 hashing algorithms.
Windows Firewall/Defender
Windows Firewall is a host based firewall that is included with each copy of
Windows. It has been extensively overhauled in Windows. It now provides full
support for IPsec. Windows firewall also makes use of a new framework called
Windows Filtering Platform (WFP). WFP provides improved packet filtering
capabilities that are integrated into the TCP/IP stack.
Bitlocker
Bitlocker is a Windows security feature that was first introduced for Windows
Vista and then further enhanced for Windows 7. It provides full disk encryption
capabilities for Windows 7, it is included as part of the operating system itself,
and it does not require any third party plug-ins to function. It is only available
for the Enterprise and Ultimate editions of Windows 7.
The encrypting file system or EFS is another security feature for Microsoft
Windows that was introduced for NTFS version 3.0 and above. It is supported
on all Windows systems from Windows 2000 onwards.
EFS provides file system level encryption for the user while the operating
system is running. This provides an additional layer of protection.
Both Bitlocker and EFS make use of 256 bit AES in CBC mode for its
encryption needs. EFS also has several other algorithms to choose from
Practical No. – 02
Object: - Recover the password of window machines using password
recover utility (John the ripper) or any other utility.
Process:
Step 7: Now again repeat the same process as in option 3,4 and 5..
Step 8: Click on Decrypt button.
Step 9: The text will be decrypted in the original form as shown .
Practical No. – 04
Object: - Encrypt and decrypt the message using Caesar Cipher with
variable key (Cryptool).
Process:
Step 1: Install the Cryptool application on your computer.
Step 2: Open the Cryptool and Type the Text or Paste it into the textbox.
Step 5: Select the variant: ‘Caesar’ and select the Key Entry as either
Alphabet or Number Value .
Step 6: Click on Encrypt button. The text will be encrypted as shown below :
Step 7: Now again repeat the same process as in option 3,4 and 5..
Step 8: Click on Decrypt button.
Step 9: The text will be decrypted in the original form as shown .
Practical No. – 05
Object: - Encrypt and decrypt the message using 3 X 3 Hill Cipher
(Cryptool)
Process:
Step 1: Install the Cryptool application on your computer.
Step 2: Open the Cryptool and Type the Text or Paste it into the textbox.
Step 5: Choose the type of Hill Key Matrix define the Multiplication Variant
and select the size of matrix to be 3 x 3.
Step 6: Click on “Generate Random Key” option. It will generate a random key
of defined matrix size.
Step 7: Click on Encrypt button. The text will be encrypted as shown below :
Step 8: Now again repeat the same process as in option 3,4 and 5.Then Type
the same Key Values in the matrix as used in encryption.
Step 9: Click on Decrypt button.
Step 10: The text will be decrypted in the original form as shown .
Practical No. – 06
Object: - Create Digital Signature document using (Cryptool)
Process:
Step 1: Click on Open Document this will open the document wizard, select
document.
Step 3: Click on Select Hash Function tab, a pop up menu will be shown.
Select MD 5 from the list.
Step 4: Click on Hash function tab and then click on Compute Hash Value
tab.
Step 5: the Hash value has now computed you can view it by clicking on Show
hash value tab.
Step 6: Click on Generate Key tab. On the next screen you have to add 2 prime
numbers p and q or you can generate them automatically by clicking on
Generate Prime Numbers. Now click on Store key to save the key generated.
Step 8:You can view the encrypted value by clicking on Show Encrypted
Hash Value tab.
Step 9:Now click on Provide Certificate tab and then click on Create
Certificate And PSE.
Step 10: Click on Generate Signature tab to generate the Digital Signature.
Practical No. – 07
Object: - Recover the data from formatted Pen Drive using Power Data
Recovery Utility or any other utility.
Process:
Step 1: Install the application setup MiniTool Power Data Recovery on
your system.
Step 2: Launch MiniTool Power Data Recovery, and select Removable Disk
Drive to recover files after formatting.
Step 3: Select the USB drive and then click Scan button.
In this window, you can click "Settings" tab to specify needed file system
(such as FAT12/16/32, NTFS and HFS+) and file types (including Documents,
Archive, Graphics/Picture, Audio, E-mail, Database and other files)
Step 4: Select all needed files, and save them by clicking Save button
located at the lower right corner.
Don't directly store needed data in the original partition (USB drive) where
data loss emerges, or the deleted data will be overwritten, causing
permanently data damage or data loss.
Step 5: Select the location where you want to save the recovered file and
click ok.