Provide an overview of cryptography reflecting the security

Assignment Help Computer Network Security
Reference no: EM133860888

End-Of-Semester (EOS) Seminar Research Paper - The EOS Seminar Research Paper is a culmination of all (13) weekly assignment research papers. The Seminar Research Paper shall consist of a minimum of 40 pages, double-spaced, excluding the title page and reference page sections. All references must be from peer reviewed authentic, established, and reliable sources (sites like Wikipedia will not be accepted). When selecting credible sources to use in your research documentation, peer-reviewed journals, governmental publications and newspapers/magazines tend to be the best places to begin. Assignment must contain a minimum of (65) references. References cited shall be within five years. Each assignment must adhere to the standards set forth in the APA 7th Edition guidelines. Seminar Research Paper consists of cybersecurity trends and importance focused on block-chain and cryptocurrencies, cryptanalysis, cryptographic algorithms and protocols, post-quantum cryptography, and public and symmetric key cryptography.

Introduction Paragraph
Incorporate Assignment 1 Content with appropriate Level Headings: Provide an Overview of Cryptography reflecting the security goal of cryptography consisting of confidentiality, integrity, authenticity, and non-repudiation, including cryptography historical development • Describe symmetric and asymmetric cryptography. • Discuss the evolution of cryptographic techniques from the 1970s to the present, focusing on key developments like DES, RSA, and AES. • Research common problems with cryptography and address how these problems/issues may be mitigated.

Incorporate Assignment 2 Content with appropriate Level Headings: Research and provide an overview of Classical Cryptography. • Provide an overview of Substitution Ciphers. Research their cybersecurity problems and respective cybersecurity risk mitigations. • Provide an overview of Transposition Ciphers. Research their cybersecurity problems and respective cybersecurity risk mitigations. • Research challenges with Classical Cryptanalysis Techniques.

Incorporate Assignment 3 Content with appropriate Level Headings: Research and identify potential cybersecurity issues with Symmetric Key Cryptography. • Analyze the strengths and weaknesses of block ciphers and their resistance to cryptanalysis. • Evaluate the security features of stream ciphers and potential vulnerabilities. • Comparing different modes of operation in terms of security and efficiency and discussing their practical applications.

Incorporate Assignment 4 Content with appropriate Level Headings: Research and summarize Public Key Cryptography • Research asymmetric cryptographic principles and their significance in modern cryptography • Analyze the strengths and potential vulnerabilities of RSA, including factors like key length and implementation practices • Discuss the security aspects of the Diffie-Hellman key exchange, potential vulnerabilities, and mitigation strategies.

Incorporate Assignment 5 Content with appropriate Level Headings: Research and describe hash functions and their role in cryptography • Research and describe the Secure Hash Algorithm (SHA) family of Hashes • Discuss primary cybersecurity concerns of cryptographic hashes, to include researched mitigation approaches of respective cybersecurity concerns • Synthesize the use of hash functions in maintaining the integrity of blockchain transactions

Incorporate Assignment 6 Content with appropriate Level Headings: Research and describe digital signatures and their role in cryptography • Research and explain strengths and weaknesses of RSA digital signatures • Research and provide an overview of how digital signatures are used to verify the authenticity of software and updates. • Research key cybersecurity aspects of the future of digital signatures.

Incorporate Assignment 7 Content with appropriate Level Headings: • Research and provide an overview of various protocols, including encryption protocols, key exchange protocols, and authentication protocols • Research and examine common threats and attacks on cryptographic protocols • Research and examine real-world applications and configurations of SSL/TLS in securing web communications • Research and examine vulnerabilities in Kerberos and strategies risk mitigation.

Incorporate Assignment 8 Content with appropriate Level Headings: Research the best practices for implementing AES securely in various applications. • Research the security concern of 3DES, to include the phase-out timeline and reasons for deprecating 3DES • Examine symmetric key distribution and asymmetric key distribution techniques. • Research cybersecurity concerns associated with Public Key Infrastructure (PKI).

Incorporate Assignment 9 Content with appropriate Level Headings: • Address cybersecurity concerns of ECDSA (Elliptic Curve Digital Signature Algorithm) and ECDH (Elliptic Curve Diffie-Hellman) • Provide an overview of lattice-based cryptographic schemes and their importance in modern cryptography • Explore the potential impact of quantum computing on traditional cryptographic systems. • Research and discuss the practical aspects of transitioning to post-quantum cryptographic systems, including implementation challenges and potential impact on existing infrastructure.

Incorporate Assignment 10 Content with appropriate Level Headings: Research and provide an overview of cryptographic primitives • Research and summarize the security properties of Message Authentication Codes, such as resistance to forgery and replay attacks • Research the security properties of Key Derivation Functions, such as resistance to brute-force and dictionary attacks • Research cybersecurity concerns with Random Number Generation in cryptologic systems

Incorporate Assignment 11 Content with appropriate Level Headings: Research cryptanalysis and discuss the importance of cryptanalysis in evaluating cryptographic systems. • Exam real-world examples of successful side-channel attacks and their impact. • Discuss strategies and countermeasures to defend against side-channel attacks, such as masking, blinding, and randomization. • Research strategies to protect against fault analysis, such as redundancy, error detection and correction, and hardened cryptographic implementations

Incorporate Assignment 12 Content with appropriate Level Headings: Research common pitfalls and vulnerabilities in cryptographic programming, such as timing attacks and side-channel vulnerabilities. • Research and provide an overview of cryptographic capabilities for C, Java, and Python • Demonstrates in-depth understanding of fuzz testing principles and its importance in security testing. • Explore formal verification methods to mathematically prove the correctness and security of cryptographic algorithms utilizing tools/frameworks (e.g., Coq, Tamarin, EasyCrypt, ProVerif, SPARK).

Incorporate Assignment 13 Content with appropriate Level Headings: Evaluate the security properties of quantum cryptography and its resistance to classical cryptographic attacks. • Provide an overview of different types, including partially homomorphic, somewhat homomorphic, and fully homomorphic encryption • Discuss the security challenges and vulnerabilities in blockchain systems, including 51% attacks, double-spending, and smart contract exploits • Explore emerging trends and future directions in blockchain technology and cryptocurrencies.

Include at least (1) properly formatted APA 7 Table within the assignment
Exceeds 20 pts, Mastery 15 pts, Near 10 pts, Below 5 pts, No Evidence 0 pts/20 pts
Include at least (1) properly formatted APA 7 Figure within the assignment
Exceeds 20 pts, Mastery 15 pts, Near 10 pts, below 5 pts, No Evidence 0 pts/20 pts
Conclusion Paragraph

Reference no: EM133860888

Questions Cloud

Conducting research for their organisation : What do you understand by the applied research policies and procedures that employees are required to follow while conducting research for their organisation?
Explain the paradoxical nature of servant leadership : Explain the paradoxical nature of servant leadership. Provide examples that support your rationale.
While white-collar criminals : Is this thesis statement arguable: While white-collar criminals may have a better chance at seeming less like a criminal
What role does the body have in producing truth in contexts : Since the 2021 Coup, many former political prisoners from the same community of naingkyin. What role does the body have in producing "truth" in both contexts?
Provide an overview of cryptography reflecting the security : Provide an Overview of Cryptography reflecting the security goal of cryptography consisting of confidentiality - Discuss the evolution of cryptographic
Identify high-profile case involving wealthy defendant : Identify a high-profile case involving a wealthy defendant and compare it to a similar case involving a poor individual--within the past 10 years
Believed to contribute to criminal behavior : Name three challenges life-course persistent offenders experience that are believed to contribute to their criminal behavior.
Discussed the many different rights of victims : Discussed the many different rights of victims, and how they've expanded over the years. What do you think is still missing?
Restraining order or order of protection against the accused : Victims are given the right to be at proceedings as well as obtain a restraining order or order of protection against the accused.

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd