Network Security Essentials

R&D projects


[Home] [Plan] [Exercises] [Projects]
 
 

Students are required to conduct a number of practical exercises with network security to explore the concepts on their own.

EXERCISE 1: CRYPTOGRAPHY WITH MATLAB

The notion of cryptography consists of hiding secret information from non trusted peers by mangling messages into unintelligible text that only trusted peers can rearrange. In these small exercise you will explore different aspects of cryptography by using Matlab.

  • Exercise 1 [pdf];
  • Static seed: s.mat
  • A. Ray Millera, The Cryptographic Mathematics of Enigma, Cryptologia, Volume 19, Issue 1, pp. 65-80, 1995. Available from Statsbiblioteket.

EXERCISE 2: USING CRYPTOGRAPHY IN PROGRAMS

In this exercise, we will use and compare three different techniques commonly employed to hide or encrypt information: secret key cryptography (DES), public key cryptography (RSA) and message digests (SHA-1).

EXERCISE 3: SECURE CLIENTS AND SERVERS

EXERCISE 4: BREAKING INTERNET SECURITY

In this exercise you will break the security of a web server on the internet.

  • Exercise 4 [pdf]
  • Web security by Sreekanth Malladi [ppt]
  • Shell script to setup exercise environment in Lubuntu image [bash]

EXERCISE 5: BREAKING WIRELESS SECURITY

In this exercise we will see that a less secure wireless systems based on WEP can be cracked in about 5 minutes. For this purpose a WEP-enabled WiFi access point has been installed in the Edison building. Find it and crack it!

To easy your job a client has been configured to browse the WWW with a modest traffic intensity. Find out what are the URLs visited by this client (just a few examples)? As part of the exercise you are expected to discuss the vulenarbilities of the WEP system as well as your attack strategies. Furthermore, you should describe the essential parts of the cracking algorithm used.

Challenge: The first individual (or team) that returns the correct WEP key will win a price. (Remember, don't send the key by email. Your competitors might be eavesdropping!

EXERCISE 6: PRACTICAL SECURITY ASSESSMENT

Examining the current infrastructure and practices of an existing organization is one of the best ways of developing skills in assessing its security posture. Students, working either individually or in small groups, select a suitable small- to medium-sized organization and examine the organization in order to conduct a suitable selection of security risk assessment and review tasks as it relates to the organizationís IT infrastructure and practices.

 

[Home] [Plan] [Exercises] [Projects]

Copyright 2012, Aarhus University School of Engineering.
Course responsible: Associate Professor Rune Hylsberg Jacobsen