Critically analyse how encryption is used on the dark web

Assignment Help Computer Engineering
Reference no: EM133932933

Cryptography Algorithms and Implementation

Introduction

This is a group project of 3 - 4 students in a group. You are to critically analyse how encryption is used on the dark web to hide from law enforcement. Initially you may critically evaluate the difference between the darkweb and the surface Internet and it functions. Then you have to Compare and contrast this level of encryption with standard HTTPS technologies. Explain using cryptographic and tunnel terminology and equations in your report. Explain what options are available for law enforcement to analyse dark traffic. You will present your findings in a written report and defend the findings face-to-face. Get top-notch online assignment help.

In this collaborative investigation, your team (3-4 students) will explore how encryption technologies are used to facilitate anonymous communication and conceal digital footprints in covert online ecosystems. You will examine the structure and behaviour of encrypted traffic in anonymised networks and compare it with standard encrypted protocols used in public web services.

Your findings will contribute to a simulated advisory report for the Australian Cyber Security Centre (ACSC), aimed at informing future strategies for monitoring encrypted traffic while respecting civil liberties.

Your team is part of a cybersecurity research unit at an Australian university, working under a grant from the Department of Home Affairs. You've been tasked with analysing encrypted traffic patterns in anonymised networks (such as those used in whistleblowing platforms and illicit marketplaces) and comparing them with conventional encrypted traffic on the public Internet.

The goal is to identify:
How encryption is layered and structured in anonymised networks.
What forensic techniques can be used to interpret encrypted traffic.
How law enforcement can ethically and effectively respond to encrypted criminal activity.

Module A: Mapping Encrypted Ecosystems
Define and differentiate between anonymised networks (e.g., TOR) and public encrypted services (e.g., HTTPS).
Explore the architectural differences in how encryption is applied.
Identify the cryptographic algorithms and routing protocols used in each ecosystem.
Present your findings using diagrams and comparative tables.

Module B: Traffic Capture and Behavioural Analysis
Tool Deployment:
Install and configure anonymised browsing tools (e.g., TOR Browser).
Use Wireshark or similar tools to capture traffic during anonymised and public browsing sessions.
Document your setup with annotated screenshots.
Traffic Interpretation:
Analyse captured packets to identify encryption layers, protocols, and tunnelling mechanisms.
Compare traffic visibility, metadata exposure, and encryption strength.
Explain how different algorithms (e.g., AES, RSA, ECC) manifest in packet structures.
Technical Breakdown:
For each encryption method observed, explain:
Its operational mechanism.
Strengths and vulnerabilities.
Alternatives and emerging technologies.

Module C: Ethical Surveillance and Countermeasures
Threat Landscape:
Research cryptographic vulnerabilities and attacks relevant to anonymised networks.
Discuss how these attacks could be used to expose or disrupt encrypted communications.
Law Enforcement Capabilities:

Investigate how Australian agencies (e.g., AFP, ACSC) approach encrypted traffic analysis.
Explore legal and ethical boundaries in surveillance and data interception.
Policy Recommendations:
Propose strategies for improving encrypted traffic monitoring without compromising privacy.
Include technical, legal, and ethical justifications.

Reference no: EM133932933

Questions Cloud

What type of symmetry do most sessile animals possess : What type of symmetry do most sessile animals possess? What are some distinctions between protostome development and deuterostome development?What are some dist
Outline the key developmental milestones : Explain how the space supports learning, safety, and engagement - Explain what intentional teaching strategies you'll use (e.g., modelling, questioning
What is the innovation dashboard designed to do : What is the innovation dashboard designed to do? Be specific, clearly discussing three-to-five key benefits of using an innovation dashboard.
How DNA gene can be transcribed and translated into protein : How is messenger RNA Transcribed from DNA molecule of the chromosome. Explain how a DNA gene can be transcribed and translated into a protein.
Critically analyse how encryption is used on the dark web : ITNE3013R Cryptography Algorithms and Implementation, Victorian Institute of Technology - Discuss how these attacks could be used to expose or disrupt encrypted
What make marketing service different from marketing product : How has the move into the service economy changed marketing? Discuss what makes marketing a service different from marketing a product.
Consequences of biomedical label of psychosomatic illness : Discuss the psychological consequences of the biomedical label of psychosomatic illness.
water vascular system in echinoderms : Explain the significance of the water vascular system in echinoderms.
Establishing circadian rhythms : Discuss evidence suggesting that there is a genetic molecular pacemaker involved in establishing circadian rhythms

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd