FdSc in Information and Communication Technology

wanderooswarrenΤεχνίτη Νοημοσύνη και Ρομποτική

21 Νοε 2013 (πριν από 3 χρόνια και 11 μήνες)

119 εμφανίσεις

Herefordshire College of Technology



Validated by the University of Gloucestershire

FdSc in Informat
ion and Communication Technolog
y

Student:

Assessor:
Leonard Shand

Module:
20
5

Information Security and Cryptography

Title:
Workbook Exercises

Internal Verification of assignment:
Bob Higgie

Date:
16 September 2010

Issue Date:
26

September 201
3

Outcome and Principal Objective(s):

1.

Demonstrate systematic knowledge and understanding of ciphers, cryptographic
methods and secure transmission of data

Overall percentage score

Sections

1









Score










Maximum

100









Comments:

First submission: Chapters 1 to 4

Second submission: Chapters 5 and 6

Third submission: Chapters 7 to 10

Due Date

Submitted
date

Pass/Fail/Refer

Assessor

Verifier

1

8 Novem
ber 2012





2

10 January

2012





3

9

May 2013





Date assessment completed:

Herefordshire College of Technology



Validated by the University of Gloucestershire

Allocation of
Marks for Module 205

Assignment 1


Ciphers

....................................
.
1
0
%

(
1
000 words

equivalent
)

Assignment 2


Extended Cryptography

.....................
4
5%

(
2
5
00 words)

Assignment 3


IT Security …………………………………………..
4
5%

(
2
500 words)




Project

brief:

This coursework component is worth
50
% of the overall coursework mark for this
module.

Th
is

coursework is for
10
0 marks.

For this coursework assessment, you are required to
complete the tasks as set out
in your workbook. There are three deadlines for the coursework namely:



First submission:

Chapters 1 to 4

(
8 November

201
3
)



Second submission: Chapters 5 and 6

(
10 January

2012
)



Third submission: Chapters 7 to 10

(
9

May 201
3
)



There is no scenario for this assignment.


Your Task

Your task is to
complete the following exercises in the
workbook:

T
utorial Exercises


1.2.5 Introduction and overview................................................................................
11


2.1.7 Modular
arithmetic............................................................................................
14


2.2.5 Exponentiation..................................................................................................
17


2.3.5 Factorisation and prim
es...................................................................................
19


3.4 Secrecy, authentication and non
-
repudiation.......................................................
21


4.1.3 Caesar cipher..........................................
...........................................................
23


4.2.2 Substitution ciphers...........................................................................................
24


4.3.5 Vigenère cipher...................................................
..............................................
28


4.4.5 Playfair cipher...................................................................................................
30


4.5.3 Enigma......................................................................
........................................
31


5.1.10 One
-
time pad...................................................................................................
36


5.2.3 Stream ciphers......................................................................
.............................
38


5.3.4 Block ciphers and padding................................................................................
43


5.4.3 DES and AES...........................................................................................
.........
47


6.2.4 RSA...................................................................................................................
54


7.1.5 Digital signatures...........................................................................................
...
61

7.1.6 Extended exercise.............................................................................................
62


7.2.4 Digital certificates.............................................................................................
66


7.3.3 E
lectronic cash..................................................................................................
67


8.2.5 Protocols...........................................................................................................
72


9.2.3 Attacks.
.............................................................................................................
75