Difference between cryptography and cryptanalysis

Assignment Help Computer Network Security
Reference no: EM131478972

Assessment - A comparative analysis of cryptographic algorithms

Aims of assessment.

1. To allow you to demonstrate a deep knowledge of cryptography Including ciphers and authentication)

2. To help you express your ability to implement and use cryptographic algorithms to encrypt and decrypt messages

3. To allow you to compare and evaluate different cryptographic methods used in modern-day computing

4. To allow you to identify areas for development in existing cryptographic algorithms

Learning outcomes

Investigate in-depth the core structure and operation(s) of modern ciphers and authentication primitives

Demonstrate a strong technical proficiency on applying current cryptographic methods to specific scenarios and critically reflect upon the best alternatives for a given case

Critically evaluate all the modern cryptanalysis techniques, methods and tools to attack a crypto-system

Fully justify the different types of cryptography and the structure of each type underpinning the frameworks governing their operation

Extensively practice the tools and methods provided for practical cryptography.

Fully justify selections in relation to a given case study as part of the in course assessment.

Combine the characteristics of the mechanisms/algorithms examined in order to stress out the areas of improvement and selection of the optimal solutions

Assignment

1. A written academic report that includes the following:
a. A discussion of the difference between cryptography and cryptanalysis (500 words)

b. A comparative analysis of symmetric and asymmetric cryptographic protocols and a discussion of the potential weaknesses of each method (1000 words)

c. By using a specific example of how a particular cryptographic protocol has been used (e.g. RSA, AES, Elliptic Curve Cryptography) explain at least two known methods that have been used to 'attack' these protocols in order to show that they are insecure (500 words)

d. A personal reflection on what the next developments will be in cryptography and what you think the greatest challenge to digital security is (500 words)

2. You also need to install the 'cryptography' or ‘pycrypto' library for Python and use one of the asymmetric algorithms to encrypt and decrypt the following message 'I am a secure protocol and my ID is XXX' where XXX should be replaced by your student ID number. As part of your submission you should show a set of screen shots that demonstrate that you have completed the task.

Guidance and tutorial information regarding Python and the 'cryptography' library will be placed under the assignment and feedback session. This will allow you to get a good understanding of the programming requirements and the way in which the Python package can be used.

Verified Expert

The solution file is prepared in ms word which explained the cryptography and cryptoanalysis , comparison between them. and also discussed about the symmetric and asymmetric algorithms with comparison chart. It is also discussed about the RSA protocol attacks techniques and challenges in digital security. The word count of this report is and references are included as per APA format.

Reference no: EM131478972

Questions Cloud

Draw a structure of an aromatic amide : Draw a structure of an aromatic amide (a benzene ring with a single attached amide and no other groups) that would be deactivating in EAS.
The socio-political aspects of the institution of slavery : What role did the socio-political aspects of the institution of Slavery in the USA play in forming the provisions of the Treaty of Guadalupe Hidalgo
How offshoring creates opportunities for countries involved : Sudhakar Shenoy, chief executive of Information Management Consultants (IMC) in Reston, makes an effective pitch for offshoring.
Draw the structures of compounds : On the basis of this data, draw the structures of compounds A to E. Show your work for full credit.
Difference between cryptography and cryptanalysis : discussion of the difference between cryptography and cryptanalysis - comparative analysis of symmetric and asymmetric cryptographic protocols
Why does mankiw say that outsourcing is a good thing : The quote from the 2004 Economic Report of the President at the beginning of the chapter generated a lot of controversy that year, as discussed at the beginning
Identify and define the managerial leadership skills : Briefly describe the five key elements of leadership. Identify the managerial leadership skills. List ten managerial roles based on their three categories.
What do you notice about the export supply curve : In Figure, we saw that a fall in the relative price of components leads to an increase in the amount of components imported but that the amount of R&D exported.
The best research instrument for your study : Why is this research instrument the best research instrument for your study as opposed to another assessment tool?

Reviews

inf1478972

5/19/2017 5:33:18 AM

Good Evening, Thanks for Solution, but i need references 15 or above.. Received..updated thanks a lot. I need to say that I would love to utilize you again for any exploration that I may have. What zones are your claim to fame. Awesome occupation!

len1478972

4/29/2017 8:31:29 AM

i want written assignment within 5 daysFully justify the different types of cryptography and the structure of each type underpinning the frameworks governing their operation Extensively practice the tools and methods provided for practical cryptography. Fully justify selections in relation to a given case study as part of the in course assessment. Combine the characteristics of the mechanisms/algorithms examined in order to stress out the areas of improvement and selection of the optimal solutions

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd