6
KONGUNADU COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS)
NAMAKKAL - TRICHY MAIN ROAD, THOTTIAM, TRICHY
DEPARTMENT OF INFORMATION TECHNOLOGY
PO MAPPING WITH EACH EXPERIMENT
20IT702L
/ SECURITY LABORATORY
COURSE OUTCOME:
SNO DESCRIPTION
PO(1…12) & PSO(1,2)
MAPPING
C407.1
Implement the cipher techniques to applications which
offer secure services
PO1,PO2, PO3, PO5, PO9,
PO12, PSO1, PSO2
C407.2
Develop the various security symmetric key algorithms
for real time applications
PO1,PO2, PO3, PO5, PO9,
PSO1, PSO2
C407.3
Illustrate various public key cryptographic algorithms PO1,PO2, PO3, PO5, PO9,
PSO1, PSO2
C407.4
Evaluate the authentication and hash function where
authentication is required
PO1,PO2, PO3, PO5, PO9,
PSO1, PSO2
C407.5
Apply different open-source tools for network security
and analysis
PO1,PO2, PO3, PO5, PO9,
PO12, PSO2
List of Experiments Mapping with COs, POs and PSOs
S.
NO
Experiment Name
Mapping
with
Cos
Mapping
with POs
Mapping
with
PSOs
1
Implement the following substitution &
Transposition techniques concepts:
a. Caesar Cipher
b. Playfair Cipher
c. Hill Cipher
d. Rail-Fence & Row & Column Transformation
1
1,2,3,5,9,12
1,2
2
Implement the following algorithms
a. DES
b. RSA Algorithm
c. Diffie-Hellman Key Exchange
d. MD5
2
1,2,3,5,9
1,2
3
Implement the SIGNATURE SCHEME - Digital
Signature Standard
4 1,2,3,5,9 1,2
4
Demonstrate how to provide secure data storage,
secure data transmission and for creating digital
signature (GnuPG)
5
1,2,3,5,9
1,2