Reference no: EM133860888
End-Of-Semester (EOS) Seminar Research Paper - The EOS Seminar Research Paper is a culmination of all (13) weekly assignment research papers. The Seminar Research Paper shall consist of a minimum of 40 pages, double-spaced, excluding the title page and reference page sections. All references must be from peer reviewed authentic, established, and reliable sources (sites like Wikipedia will not be accepted). When selecting credible sources to use in your research documentation, peer-reviewed journals, governmental publications and newspapers/magazines tend to be the best places to begin. Assignment must contain a minimum of (65) references. References cited shall be within five years. Each assignment must adhere to the standards set forth in the APA 7th Edition guidelines. Seminar Research Paper consists of cybersecurity trends and importance focused on block-chain and cryptocurrencies, cryptanalysis, cryptographic algorithms and protocols, post-quantum cryptography, and public and symmetric key cryptography.
Introduction Paragraph
Incorporate Assignment 1 Content with appropriate Level Headings: Provide an Overview of Cryptography reflecting the security goal of cryptography consisting of confidentiality, integrity, authenticity, and non-repudiation, including cryptography historical development • Describe symmetric and asymmetric cryptography. • Discuss the evolution of cryptographic techniques from the 1970s to the present, focusing on key developments like DES, RSA, and AES. • Research common problems with cryptography and address how these problems/issues may be mitigated.
Incorporate Assignment 2 Content with appropriate Level Headings: Research and provide an overview of Classical Cryptography. • Provide an overview of Substitution Ciphers. Research their cybersecurity problems and respective cybersecurity risk mitigations. • Provide an overview of Transposition Ciphers. Research their cybersecurity problems and respective cybersecurity risk mitigations. • Research challenges with Classical Cryptanalysis Techniques.
Incorporate Assignment 3 Content with appropriate Level Headings: Research and identify potential cybersecurity issues with Symmetric Key Cryptography. • Analyze the strengths and weaknesses of block ciphers and their resistance to cryptanalysis. • Evaluate the security features of stream ciphers and potential vulnerabilities. • Comparing different modes of operation in terms of security and efficiency and discussing their practical applications.
Incorporate Assignment 4 Content with appropriate Level Headings: Research and summarize Public Key Cryptography • Research asymmetric cryptographic principles and their significance in modern cryptography • Analyze the strengths and potential vulnerabilities of RSA, including factors like key length and implementation practices • Discuss the security aspects of the Diffie-Hellman key exchange, potential vulnerabilities, and mitigation strategies.
Incorporate Assignment 5 Content with appropriate Level Headings: Research and describe hash functions and their role in cryptography • Research and describe the Secure Hash Algorithm (SHA) family of Hashes • Discuss primary cybersecurity concerns of cryptographic hashes, to include researched mitigation approaches of respective cybersecurity concerns • Synthesize the use of hash functions in maintaining the integrity of blockchain transactions
Incorporate Assignment 6 Content with appropriate Level Headings: Research and describe digital signatures and their role in cryptography • Research and explain strengths and weaknesses of RSA digital signatures • Research and provide an overview of how digital signatures are used to verify the authenticity of software and updates. • Research key cybersecurity aspects of the future of digital signatures.
Incorporate Assignment 7 Content with appropriate Level Headings: • Research and provide an overview of various protocols, including encryption protocols, key exchange protocols, and authentication protocols • Research and examine common threats and attacks on cryptographic protocols • Research and examine real-world applications and configurations of SSL/TLS in securing web communications • Research and examine vulnerabilities in Kerberos and strategies risk mitigation.
Incorporate Assignment 8 Content with appropriate Level Headings: Research the best practices for implementing AES securely in various applications. • Research the security concern of 3DES, to include the phase-out timeline and reasons for deprecating 3DES • Examine symmetric key distribution and asymmetric key distribution techniques. • Research cybersecurity concerns associated with Public Key Infrastructure (PKI).
Incorporate Assignment 9 Content with appropriate Level Headings: • Address cybersecurity concerns of ECDSA (Elliptic Curve Digital Signature Algorithm) and ECDH (Elliptic Curve Diffie-Hellman) • Provide an overview of lattice-based cryptographic schemes and their importance in modern cryptography • Explore the potential impact of quantum computing on traditional cryptographic systems. • Research and discuss the practical aspects of transitioning to post-quantum cryptographic systems, including implementation challenges and potential impact on existing infrastructure.
Incorporate Assignment 10 Content with appropriate Level Headings: Research and provide an overview of cryptographic primitives • Research and summarize the security properties of Message Authentication Codes, such as resistance to forgery and replay attacks • Research the security properties of Key Derivation Functions, such as resistance to brute-force and dictionary attacks • Research cybersecurity concerns with Random Number Generation in cryptologic systems
Incorporate Assignment 11 Content with appropriate Level Headings: Research cryptanalysis and discuss the importance of cryptanalysis in evaluating cryptographic systems. • Exam real-world examples of successful side-channel attacks and their impact. • Discuss strategies and countermeasures to defend against side-channel attacks, such as masking, blinding, and randomization. • Research strategies to protect against fault analysis, such as redundancy, error detection and correction, and hardened cryptographic implementations
Incorporate Assignment 12 Content with appropriate Level Headings: Research common pitfalls and vulnerabilities in cryptographic programming, such as timing attacks and side-channel vulnerabilities. • Research and provide an overview of cryptographic capabilities for C, Java, and Python • Demonstrates in-depth understanding of fuzz testing principles and its importance in security testing. • Explore formal verification methods to mathematically prove the correctness and security of cryptographic algorithms utilizing tools/frameworks (e.g., Coq, Tamarin, EasyCrypt, ProVerif, SPARK).
Incorporate Assignment 13 Content with appropriate Level Headings: Evaluate the security properties of quantum cryptography and its resistance to classical cryptographic attacks. • Provide an overview of different types, including partially homomorphic, somewhat homomorphic, and fully homomorphic encryption • Discuss the security challenges and vulnerabilities in blockchain systems, including 51% attacks, double-spending, and smart contract exploits • Explore emerging trends and future directions in blockchain technology and cryptocurrencies.
Include at least (1) properly formatted APA 7 Table within the assignment
Exceeds 20 pts, Mastery 15 pts, Near 10 pts, Below 5 pts, No Evidence 0 pts/20 pts
Include at least (1) properly formatted APA 7 Figure within the assignment
Exceeds 20 pts, Mastery 15 pts, Near 10 pts, below 5 pts, No Evidence 0 pts/20 pts
Conclusion Paragraph