Program to implement a vigenère cipher

Assignment Help Other Subject
Reference no: EM132465688

CTEC5801 - Foundation of Cyber Security - De Montfort University

Combined Coursework

Learning Outcomes

Learning Outcome 1: Create a new or modify an existing C program in order to complete a given specification
Learning Outcome 2: Explain and demonstrate understanding of an operating system's persistent storage
Learning Outcome 3: Evaluate and justify the use of cryptographic tools and techniques in an application context
Learning Outcome 4: Critically analyse network traffic to identify potential vulnerabilities
Learning Outcome 5: Relate knowledge of topics to cyber security domain

Task 1. Write a C program to implement a Vigenère cipher. You may use whatever IDE you wish but the program must be compile with the standard gcc compiler. Your program should give the user the option to either encrypt or decrypt a message. The user should be prompted to enter the passphrase to be entered and the keyword to be used in the cipher. The output should be text printed to stdout. Comments should be used to explain the rationale behind the design of your code. You must also provide a critical analysis as to the robustness of the Vigenère cipher and provide a recommendation as to whether or not it would be it would be sufficient for use in communications between colleagues within a non-technical environment.

Task 2. In your role as an Information Security Specialist for Global Designs Limited, you have been tasked with creating a set of policies for secure data. The data stored by Global Designs Ltd has a useful lifetime of 1 year, after which it is deleted. This deletion is done simply using the delete functionality of the Operating System. You are required to determine if this is adequate to fully delete the data, if not provide potential ways to recover the data and recommendations for how the data could be securely destroyed. They have asked that the report contains an overview of how data is deleted and recovered at a level the non-technical staff can understand as well as a more technical explanation of the architectural differences between the two for the IT Department. You may include any images or other supporting material within a single appendix. The report should not exceed 1,500 words.

Task 3. In your role as a consultant for Data Storage Solutions, you have been tasked with providing a report into the current state of the art encrypted e-mail solutions. Identify if information can be extracted from e-mails if the network traffic has been intercepted. If it can, identify how the solutions you have assessed solve this problem. Different existing solutions should be considered, critically analysed and compared. Additionally, an overview of the current state of the art research in the field should be included. At the end of the report, clear guidelines should be included detailing when it would be most appropriate to use each solution covered in the main report.

Task 4. Download the pcap file CTEC5801_coursework.pcap and analyse the traffic. Identify, analyse and explain all connections and interactions you can identify. Assess whether or not any of the connections might be suspicious, identify these and explain why they might pose a danger. You must include:
- Start frame
- Mac address of host initiating the connection
- Mac address of destination host
- IP address of host initiating connection
- IP address of destination host
- The port used by the initialising host
- The port used by the destination host

Attachment:- Foundation of Cyber Security.rar

Reference no: EM132465688

Questions Cloud

Discuss your findings and list two interesting items : This online discussion is about the life of William Shakespeare, considered the greatest playwright in theatre history. Before the internet age, if one wanted.
What is npv if the firm investment is entitled to immediate : What is NPV if the firm investment is entitled to immediate 100% bonus depreciation?
What were the nobles complaints : Consider the historical context of England in 1215 with the costs of King Richard the Lionheart's ransom and the Crusades. What were the nobles' complaints?
What are a few specific examples of the effects and changes : At the same time Europeans were venturing east to the Americas, they were also traveling south to Africa. This resulted in a significant disruption.
Program to implement a vigenère cipher : Write a C program to implement a Vigenère cipher. You may use whatever IDE you wish but the program must be compile with the standard gcc compiler.
Determine how much did bonita pay for the bonds : Determine How much did Bonita pay for the bonds? (Round factor values to 5 decimal places, e.g. 1.25124 and final answer to 0 decimal places, e.g. 458,581.)
Why the late bronze age collapse happened : You may or may not agree with your assigned topic. Write a paragraph (3-5 good sentences) explaining your personal perspective on why the Late Bronze Age.
What would the hospital expect to get paid from medicaid : The particular patient in question had previously used 25 of his or her annual 30 day of hospital care covered by Medicaid. Based on what has been provided
Describe how the company is governed : Describe how the company is governed. That is, is it a corporation? If so, who do you think the stockholders are? Do they live where you do

Reviews

Write a Review

Other Subject Questions & Answers

  Completing a community service for the public

If Dexter Morgan is a vigilante, does that make him an acceptable serial killer? A heroic one? Is he completing a community service for the public?

  Elements of the marketing mix

Write a 1,400- to 1,750-word paper in which you describe the elements of the marketing mix (product, place, price, and promotion). In addition, select an organization with which you are familiar and describe how each one of the four elements of th..

  List and define the types of extrinsic motivation

Responses for questions 1 & 2 should be between 200 - 300 words long and contain a reference to source materials that support your statements.

  Explain the use and limitations of geotechnical design

BLAR 12052 GEOTECHNICAL STUDIES - Interpret the influences of geological processes and natural environments on geotechnical design

  Digital retouching and poster design

Create a portrait illustration, based on given tutorial techniques, and accompany it with a 4 panel comic strip - development of a Poster using photographic

  Describe the taft-hartley act in detail

The final piece of legislation is the Taft-Hartley Act which tried to swing the balance of power back to the middle and give some protection to employers.

  Assess the evidence-based practices implemented in the case

Assess the evidence-based practices implemented in this case study by addressing the following issues: Explain the connection between each theoretical.

  What can you do to enhance collaboration

Which business functions will be impacted by your action plan? What tactics will you use to manage implementation across business functions? What can you do to.

  The forensic psychology booklet

The Forensic Psychology Booklet

  Internet based psychological intervention

With so many individuals using the Internet today, the psychology of the individual, the family, the community, and the society has changed. Some might argue that the traditional psychological theories cannot be applied and therefore psychology as..

  Analyze the available research on social anxiety

Review and analyze the available research on social anxiety. From the viewpoint of a future practitioner, defend or criticize the current status of social anxiety as a psychological disorder. Defend your response

  Freezing process

A freezing process takes in 1.5 t/h of saltwater (4.0% saltwater) and produces salt-free ice and brine solution (8.5% salt). How much ice is produced in 8-hour day?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd