Difference between cryptography and cryptanalysis

Assignment Help Computer Network Security
Reference no: EM131478972

Assessment - A comparative analysis of cryptographic algorithms

Aims of assessment.

1. To allow you to demonstrate a deep knowledge of cryptography Including ciphers and authentication)

2. To help you express your ability to implement and use cryptographic algorithms to encrypt and decrypt messages

3. To allow you to compare and evaluate different cryptographic methods used in modern-day computing

4. To allow you to identify areas for development in existing cryptographic algorithms

Learning outcomes

Investigate in-depth the core structure and operation(s) of modern ciphers and authentication primitives

Demonstrate a strong technical proficiency on applying current cryptographic methods to specific scenarios and critically reflect upon the best alternatives for a given case

Critically evaluate all the modern cryptanalysis techniques, methods and tools to attack a crypto-system

Fully justify the different types of cryptography and the structure of each type underpinning the frameworks governing their operation

Extensively practice the tools and methods provided for practical cryptography.

Fully justify selections in relation to a given case study as part of the in course assessment.

Combine the characteristics of the mechanisms/algorithms examined in order to stress out the areas of improvement and selection of the optimal solutions

Assignment

1. A written academic report that includes the following:
a. A discussion of the difference between cryptography and cryptanalysis (500 words)

b. A comparative analysis of symmetric and asymmetric cryptographic protocols and a discussion of the potential weaknesses of each method (1000 words)

c. By using a specific example of how a particular cryptographic protocol has been used (e.g. RSA, AES, Elliptic Curve Cryptography) explain at least two known methods that have been used to 'attack' these protocols in order to show that they are insecure (500 words)

d. A personal reflection on what the next developments will be in cryptography and what you think the greatest challenge to digital security is (500 words)

2. You also need to install the 'cryptography' or ‘pycrypto' library for Python and use one of the asymmetric algorithms to encrypt and decrypt the following message 'I am a secure protocol and my ID is XXX' where XXX should be replaced by your student ID number. As part of your submission you should show a set of screen shots that demonstrate that you have completed the task.

Guidance and tutorial information regarding Python and the 'cryptography' library will be placed under the assignment and feedback session. This will allow you to get a good understanding of the programming requirements and the way in which the Python package can be used.

Verified Expert

The solution file is prepared in ms word which explained the cryptography and cryptoanalysis , comparison between them. and also discussed about the symmetric and asymmetric algorithms with comparison chart. It is also discussed about the RSA protocol attacks techniques and challenges in digital security. The word count of this report is and references are included as per APA format.

Reference no: EM131478972

Questions Cloud

Draw a structure of an aromatic amide : Draw a structure of an aromatic amide (a benzene ring with a single attached amide and no other groups) that would be deactivating in EAS.
The socio-political aspects of the institution of slavery : What role did the socio-political aspects of the institution of Slavery in the USA play in forming the provisions of the Treaty of Guadalupe Hidalgo
How offshoring creates opportunities for countries involved : Sudhakar Shenoy, chief executive of Information Management Consultants (IMC) in Reston, makes an effective pitch for offshoring.
Draw the structures of compounds : On the basis of this data, draw the structures of compounds A to E. Show your work for full credit.
Difference between cryptography and cryptanalysis : discussion of the difference between cryptography and cryptanalysis - comparative analysis of symmetric and asymmetric cryptographic protocols
Why does mankiw say that outsourcing is a good thing : The quote from the 2004 Economic Report of the President at the beginning of the chapter generated a lot of controversy that year, as discussed at the beginning
Identify and define the managerial leadership skills : Briefly describe the five key elements of leadership. Identify the managerial leadership skills. List ten managerial roles based on their three categories.
What do you notice about the export supply curve : In Figure, we saw that a fall in the relative price of components leads to an increase in the amount of components imported but that the amount of R&D exported.
The best research instrument for your study : Why is this research instrument the best research instrument for your study as opposed to another assessment tool?

Reviews

inf1478972

5/19/2017 5:33:18 AM

Good Evening, Thanks for Solution, but i need references 15 or above.. Received..updated thanks a lot. I need to say that I would love to utilize you again for any exploration that I may have. What zones are your claim to fame. Awesome occupation!

len1478972

4/29/2017 8:31:29 AM

i want written assignment within 5 daysFully justify the different types of cryptography and the structure of each type underpinning the frameworks governing their operation Extensively practice the tools and methods provided for practical cryptography. Fully justify selections in relation to a given case study as part of the in course assessment. Combine the characteristics of the mechanisms/algorithms examined in order to stress out the areas of improvement and selection of the optimal solutions

Write a Review

Computer Network Security Questions & Answers

  Illustrate three security services-confidentiality-integrity

Illustrate that three security services: Confidentiality, Integrity, and Availability are enough to deal with threats of: (a) Disclosure, (b) Disruption, (c) Deception (deceive = to cause to accept as true.

  Assignment on cybersquatting

Discuss your reaction to this issue and the implications this issue causes. Can you see the pros and cons of this from the business point of view versus the personal point of view? Discuss your thoughts.

  What you have done to protect the network

Prepare a 2-page memo in Word outlining what you have done as the network administrator to protect the network against such attacks, as well as additional measures to secure the network against other security concerns including worms, viruses

  How will cross-forest trusts be implemented

CMIT-371 Windows Network ServicesProposal- How will Forest Functional Levels be implemented? How will cross-forest trusts be implemented? How will replication be handled? Read-Only Domain Controllers - how and where will they be used?

  Assignment on cryptographic systems

The Week 10 Critical Thinking assignment continues with the scenario set up for the Critical Thinking assignment in Week 8. You have been hired as the chief officer of information technology at a retail store in Medina City. The store has 5000 cus..

  Discuss the steps necessary to make electronic evidence

Identify and discuss the steps necessary to make electronic evidence admissible in court and identify various crimes and incidents that are involved in electronic forensic investigations.

  Cryptography assignment

cryptography assignment:  Consider the following problems: (P1) computing the output p from an input n; (P2) computing the output phi(n) from an input n. Which one of the following statements is true?

  Case study-the ethical hacker

Imagine for a moment that you are a hacker; an ethical one. You are called upon by law enforcement based on your expertise to hack into a network of a business known to be launching crimes against humanity as its primary mission for operation and ..

  What are strength for current and future of given app

What are strength for current and future of app (application to be used for smart phone like devices) in term of development. At least 2 paragraph with two in-text reference.

  Analyze specific potential malicious attacks

Analyze specific potential malicious attacks and / or threats that could be carried out against the network and organization and explain in detail the potential impact of the three selected malicious attacks

  Identify the virus software running on your computer

Explain the origin and effects of at least 3 different types of viruses/malicious programs as well as how your computer can become vulnerable to these threats.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd