FdSc in Information and Communication Technology

Τεχνίτη Νοημοσύνη και Ρομποτική

21 Νοε 2013 (πριν από 4 χρόνια και 7 μήνες)

137 εμφανίσεις

Herefordshire College of Technology

Validated by the University of Gloucestershire

FdSc in Informat
ion and Communication Technolog
y

Student:

Assessor:
Leonard Shand

Module:
20
5

Information Security and Cryptography

Title:
Workbook Exercises

Internal Verification of assignment:
Bob Higgie

Date:
16 September 2010

Issue Date:
26

September 201
3

Outcome and Principal Objective(s):

1.

Demonstrate systematic knowledge and understanding of ciphers, cryptographic
methods and secure transmission of data

Overall percentage score

Sections

1

Score

Maximum

100

First submission: Chapters 1 to 4

Second submission: Chapters 5 and 6

Third submission: Chapters 7 to 10

Due Date

Submitted
date

Pass/Fail/Refer

Assessor

Verifier

1

8 Novem
ber 2012

2

10 January

2012

3

9

May 2013

Date assessment completed:

Herefordshire College of Technology

Validated by the University of Gloucestershire

Allocation of
Marks for Module 205

Assignment 1

Ciphers

....................................
.
1
0
%

(
1
000 words

equivalent
)

Assignment 2

Extended Cryptography

.....................
4
5%

(
2
5
00 words)

Assignment 3

IT Security …………………………………………..
4
5%

(
2
500 words)

Project

brief:

This coursework component is worth
50
% of the overall coursework mark for this
module.

Th
is

coursework is for
10
0 marks.

For this coursework assessment, you are required to
complete the tasks as set out

First submission:

Chapters 1 to 4

(
8 November

201
3
)

Second submission: Chapters 5 and 6

(
10 January

2012
)

Third submission: Chapters 7 to 10

(
9

May 201
3
)

There is no scenario for this assignment.

complete the following exercises in the
workbook:

T
utorial Exercises

1.2.5 Introduction and overview................................................................................
11

2.1.7 Modular
arithmetic............................................................................................
14

2.2.5 Exponentiation..................................................................................................
17

2.3.5 Factorisation and prim
es...................................................................................
19

3.4 Secrecy, authentication and non
-
repudiation.......................................................
21

4.1.3 Caesar cipher..........................................
...........................................................
23

4.2.2 Substitution ciphers...........................................................................................
24

4.3.5 Vigenère cipher...................................................
..............................................
28

4.4.5 Playfair cipher...................................................................................................
30

4.5.3 Enigma......................................................................
........................................
31

5.1.10 One
-
36

5.2.3 Stream ciphers......................................................................
.............................
38

43

5.4.3 DES and AES...........................................................................................
.........
47

6.2.4 RSA...................................................................................................................
54

7.1.5 Digital signatures...........................................................................................
...
61

7.1.6 Extended exercise.............................................................................................
62

7.2.4 Digital certificates.............................................................................................
66

7.3.3 E
lectronic cash..................................................................................................
67

8.2.5 Protocols...........................................................................................................
72

9.2.3 Attacks.
.............................................................................................................
75