Reference no: EM133932933
Cryptography Algorithms and Implementation
Introduction
This is a group project of 3 - 4 students in a group. You are to critically analyse how encryption is used on the dark web to hide from law enforcement. Initially you may critically evaluate the difference between the darkweb and the surface Internet and it functions. Then you have to Compare and contrast this level of encryption with standard HTTPS technologies. Explain using cryptographic and tunnel terminology and equations in your report. Explain what options are available for law enforcement to analyse dark traffic. You will present your findings in a written report and defend the findings face-to-face. Get top-notch online assignment help.
In this collaborative investigation, your team (3-4 students) will explore how encryption technologies are used to facilitate anonymous communication and conceal digital footprints in covert online ecosystems. You will examine the structure and behaviour of encrypted traffic in anonymised networks and compare it with standard encrypted protocols used in public web services.
Your findings will contribute to a simulated advisory report for the Australian Cyber Security Centre (ACSC), aimed at informing future strategies for monitoring encrypted traffic while respecting civil liberties.
Your team is part of a cybersecurity research unit at an Australian university, working under a grant from the Department of Home Affairs. You've been tasked with analysing encrypted traffic patterns in anonymised networks (such as those used in whistleblowing platforms and illicit marketplaces) and comparing them with conventional encrypted traffic on the public Internet.
The goal is to identify:
How encryption is layered and structured in anonymised networks.
What forensic techniques can be used to interpret encrypted traffic.
How law enforcement can ethically and effectively respond to encrypted criminal activity.
Module A: Mapping Encrypted Ecosystems
Define and differentiate between anonymised networks (e.g., TOR) and public encrypted services (e.g., HTTPS).
Explore the architectural differences in how encryption is applied.
Identify the cryptographic algorithms and routing protocols used in each ecosystem.
Present your findings using diagrams and comparative tables.
Module B: Traffic Capture and Behavioural Analysis
Tool Deployment:
Install and configure anonymised browsing tools (e.g., TOR Browser).
Use Wireshark or similar tools to capture traffic during anonymised and public browsing sessions.
Document your setup with annotated screenshots.
Traffic Interpretation:
Analyse captured packets to identify encryption layers, protocols, and tunnelling mechanisms.
Compare traffic visibility, metadata exposure, and encryption strength.
Explain how different algorithms (e.g., AES, RSA, ECC) manifest in packet structures.
Technical Breakdown:
For each encryption method observed, explain:
Its operational mechanism.
Strengths and vulnerabilities.
Alternatives and emerging technologies.
Module C: Ethical Surveillance and Countermeasures
Threat Landscape:
Research cryptographic vulnerabilities and attacks relevant to anonymised networks.
Discuss how these attacks could be used to expose or disrupt encrypted communications.
Law Enforcement Capabilities:
Investigate how Australian agencies (e.g., AFP, ACSC) approach encrypted traffic analysis.
Explore legal and ethical boundaries in surveillance and data interception.
Policy Recommendations:
Propose strategies for improving encrypted traffic monitoring without compromising privacy.
Include technical, legal, and ethical justifications.