AssignmentDetails
AssignmentDescription
ReviewthefollowingLinkedInLearningvideostohelpyouwithyourassignmentsinthisUnit.
Therearetwopartstothisassignment.Part1involvestheencryption/decryptionscenariobelowandPart2requiresresearchontheclassificationofciphers,andpopular
algorithms.
Part1
Useatwostagetranspositiontechniquetoencryptthefollowingmessageusingthekey”Decrypt”.Ignorethecommaandtheperiodinthemessage.
Message:”TheTranspositionciphertechniqueworksbypermutingthelettersoftheplaintext.Itisnotverysecure,butitisgreatforlearningaboutcryptography.”
Ina2?3pagesummary,discussthefollowing:
Isitpossibletodecryptthemessagewithadifferentkey?Justifyyouranswer.
Doyouagreewiththestatementofthemessage?Whyorwhynot?Giveatleasttwoexamplesthatsupportyourview.
Part2
Providea1?2pageresearchedresponsestothefollowing:
Researchandprovideadetailedmeaningforatleastthreetechniquesinwhichencryptionalgorithmscanproduceciphertext.Pickatleast3fromthecipherlistbelow:
Monoialphabetic
Steganographic
Polyalphabetic
Polygraphic
Routetransposition
ColumnarTransposition
SynchronousStream
AsynchronousStream
Pleasesubmityourassignment.
Forassistancewithyourassignment,pleaseuseyourtext,Webresources,andallcoursematerials.
ReadingAssignment
Stallings,Chap.1,34,App.B3,B.4
ReadselectedarticlesfromtheAIULibraryasidentifiedintheLearningMaterials.
AssignmentObjectives
Identifyunsoundsecuritypracticesinsoftwaresystems.
OtherInformation
Thereisnoadditionalinformationtodisplayatthistime.
Legend
ExtraCredit ViewAssignmentRubric
Unit1IndividualProject
AssignmentOverview
Unit: ConventionalEncryptionTechniques
DueDate: Tue,6/28/22
GradingType: Numeric
PointsPossible: 140
PointsEarned: 105
DeliverableLength: 4?5pages
Type: IndividualProject
GoTo:
Lookingfortutoring?GotoSmarthinking
AssignmentDetails
LearningMaterials
ReadingAssignment
MyWork:
OnlineDeliverables:Submissions
AssignmentDetails
AssignmentDescription
ReviewthefollowingLinkedInLearningvideostohelpyouwithyourassignmentsinthisUnit.
UsingtheAPAwritingstyle,writea4?5pagepaperthatanswersthequestionsbelow.Bepreparedtofullysupportyouranswers.Withintheidentifiedpaperstructurebelow,
explaininyourownwordsthefollowing:
TitlePage
Introduction
MainBody:
WhatisthehistoryofDES,andwhyissDESstudied?
HowdoesDESand3DESwork?Provideanexampleofeach.
ExplainthefollowingingredientsthatdecidethealgorithmintheFiestelcipher:
BlocksizeKeysize
Subkeygeneration
Roundfunction
Fastsoftwareencryption/decryption
EaseofAnalysis
Conclusion
APAReferenceList(Note:Makesuretoalsoincludeintextcitations)
Pleasesubmityourassignment.
Forassistancewithyourassignment,pleaseuseyourtext,Webresources,andallcoursematerials.
ReadingAssignment
Stallings,Chap.67
ReadselectedarticlesfromtheAIULibraryasidentifiedintheLearningMaterials.
AssignmentObjectives
DiscusscommonlyusedauthenticationprotocolsusedincurrentInternettechnology.
Explaincommonvulnerabilitiesincryptographicprotocolsandhowtheycanbeavoided.
OtherInformation
Thereisnoadditionalinformationtodisplayatthistime.
Legend
ExtraCredit ViewAssignmentRubric
Unit2IndividualProject
AssignmentOverview
Unit: AES,Ciphers,andConfidentiality
DueDate: Tue,7/12/22
GradingType: Numeric
PointsPossible: 140
PointsEarned:
DeliverableLength: 4?5pagesummary
Type: IndividualProject
GoTo:
Lookingfortutoring?GotoSmarthinking
AssignmentDetails
LearningMaterials
ReadingAssignment
MyWork:
OnlineDeliverables:Submissions