We can work on Algorithm, Course and research report, Cryptography

University of the Cumberlands

School of Computer and Information Sciences

ISOL 535 – Cryptography

Summer 2018, IIG

IIG term (8-week, 100% online course): July 2nd – August 21st

University of the Cumberlands

School of Computer and Information Sciences

ISOL 535 – Cryptography

Summer 2018, IIG

IIG term (8-week, 100% online course): July 2nd – August 21st

Course Summary
Course Description

The course covers the Cryptography techniques and algorithms use to secure data, The course will cover classical, and modern cryptography algorithms in the first part, in the second part will cover the use of cryptography, applications, standard and some legal issues needed for cybersecurity. The course will look at classical algorithms, stream cipher, block cipher, public key, digital signature, hash functions, cryptography access control, cryptography standards

Course Objectives

1. Understand the cryptography algorithms

2. Understand the cryptography applications

3. Understands the use of cryptography

4. Understand the cryptography standards

Course Outcomes

The course examines methods and techniques for concealing data for security purposes. Topics covered will include cryptographic techniques, approaches, and technologies.

Upon completion of the course, students will be able to

· Define key cryptographic terms.

· Identify the classical and modern cryptography algorithms

· Understand Symmetric algorithms

· Understand Asymmetric algorithms

· Distinguish between types of symmetric

· Distinguish between types of Asymmetric

· Understand different Hashing algorithms

· Identify the use of hashing and digital signatures

· Understand the Cryptography Key Managements and Access control

· Identify cryptography standards national and international

· Recognize the legal issue with cryptography applications and use

Learning Materials
Required Resources

All notes will be provided on the blackboard

References

· Christof Paar and Jan Pelzl. Understanding Cryptography: A Textbook for Students and Practitioners Springer; 2010 edition

· https://www.staff.uni-mainz.de/pommeren/Cryptology/References.html

· http://www.cse.iitd.ac.in/~murali/crypt/books.html

· https://en.wikipedia.org/wiki/Books_on_cryptography

· https://www.sanfoundry.com/best-reference-books-cryptography-network-security/

Labs:

There are no labs but you need to get use to different resource to speed up you question solutions

You can use any of the following

· DOSBox 0.74 the mount on C directory CALC: it Dos a dos calculator very fast to calculate cryptography solutions (we will have a presentation on it)

· CrypTool you can load it (very useful to solve some reports) or use online version

· Sage online version or load the compiler

· GNU Octave (CLI)

There is no ready cryptography tools to help you need to focus on one or two tools to solve some problems

Algorithm Report 10% Due date Due Date 8/11 @11:59 PM

Take a sample of Plain text, encrypt this plaintext step by step using AES, you must show each step how it has been done with all tables and codes, till you generate the Ciphertext. the reverse your work step by step until you generate the Plaintext

Your plaintext is:

“Here you can encrypt a block of bytes with a key using the popular Advanced Encryption Standard cipher” . All the internal steps of the computation are shown, which can be helpful for anyone debugging their own AES implementation. In each of the 10/12/14 rounds, the sub-steps of SubBytes, ShiftRows, MixColumns, AddRoundKey, and key schedule are shown”

Encryption
5%

Decryption
5%

Due date Due Date 8/11 @11:59 PM

Course Report 10% Due date Due Date 8/11 @11:59 PM

A class report is 20 pages, each page 300 word, single space with Arial font and size of 10

Titles and subtitles are in Arial font and size of 12 (bolds)

A Class report is a report to describe a cryptography algorithm, this report focuses on the algorithms mechanism and an example to explain the mechanism.

The report covers one of the following:

Lattice-Based Cryptography (You need to go through Vector Space first)

Quantum Cryptography

Post-quantum Cryptography

Blowfish

Twofish

MARS

DEAL, a Feistel cipher using DES as the round function

The Tiny Encryption Algorithm, or TEA

LOKI97, one of the LOKI family of ciphers, from Australia

Course Report structure

The report has one section called:

The …… Algorithm

· Algorithm specification

· Encryption Procedure: step by step as algorithm (NOT programming Language)

· Decryption procedure: step by step as algorithm (NOT programming Language)

· Security analysis

· Example: Step by Step

Course Report grades:

Report part
Marks

Algorithm specification
2%

Encryption Procedure
5%

Decryption procedure
5%

Security analysis
4%

Example
6%

SUM
20%

Research Paper 20% Due date 8/12 @11: 59 PM

Each student will write a research paper, the paper focus on the technical, mathematical and the use of Cryptography application. Each student will be located on a project from the following list. OR you can select your application after you send me a short email describing your interests

· Cryptography Access control

· Cryptography key management

· Cryptography Authentication

· BB84 Protocol

· Cryptography Quantum key distribution

· Cryptography Quantum Coin Flipping

· Symmetric encryption and message authentication material construction

· Secured application-level data transport

· Non-repudiation methods

· Secret sharing methods

· Secure multi-party computation

· Cryptography formal model: Burrows–Abadi–Needham logic

· Cryptography formal model: Dolev–Yao model

· Cryptography formal model: π-calculus (or pi-calculus)

· Cryptography formal model: Protocol composition logic

· PKI

· SSL/TLS

· Secure Shell

· Network Link encryption

· VPN

· Wireless communication

· Digital signature

· Content encryption

· Security Token

· Identity federations

· Steganography algorithms

· Pseudorandom functions

· Cryptography Protocols

· Authentication protocols

· Secure remote passwords

· Bluetooth pairing

· Common criteria (cryptography product) certification and accreditation

· Cryptographic product selection criteria

· Network Link encryption

· VPN

· Wireless communication

· Device encryption

· Content encryption

· Physical Access and contactless Token

· Identity Federation

Research paper Structure

· Introduction summary of the work

· The benefit of the application

· Application description

· Application implementation description

· Implementations issues (if any)

· Application use (end user use) description

· References

Research paper Format

Each research papers should not less than 25-30 pages, each page 300 word, single space with Arial font and size of 10

Titles and subtitles are in Arial font and size of 12 (bolds)

Do not use pictures copied from the web, use graphic design through MS Visio

Research paper marks

The paper worth 20% of the course divided as

Section
Marks
Comments

Introduction summary of the work
1%

The benefit of the application
2%

Application description
5%

Application implementation description
5%
(use step by step examples, flowcharts, Visio diagrams)

Should go to implantations details

Application use (end user use) description
5%

References and citations
2%

SUM
20%

All Reports will be checked Plagiarism Detection
Course Outline *

Note: Assignments in the following table are listed as when they are due.

Week 1
7/2
Chapter 1: Introduction to Cryptography

Chapter 2: Mathematics

[i]

The normal procedure will be collecting evidence, inform the student and report the issue to the academic affaire

 

Your network and keeping your computer healthy it is your responsibilities.

 

In all Exams and Quizzes Asking for the second attempt, third or fourth will be subject to reducing your grades by 25%, 50% or 75%

 

· In all Exams and Quizzes Asking for the second attempt for a quiz or midterm or final your grads will be calculated as

· Grades =Second attempt grads – 25% of the original grades value

· In all Exams and Quizzes Asking for the third attempt for a quiz or midterm or final your grades will be calculated as

· Grades =Second attempt grades – 50% of the original grades value

· In all Exams and Quizzes Asking for the fourth attempt

Grads= Third attempt grades – 75% of the original grades value

Example

Midterm =20% of the final course grades

Midterm  ask for the second attempt

Final Midterm Grades =Second attempt grades – 5 marks

Midterm  ask for the third attempt

Final Midterm Grades =Second attempt grades – 10 marks

Midterm   ask for forth attempt

Final Midterm Grades =Second attempt grades – 15 marks

 

ASKING FOR THE SECOND ATTEMPT

Asking for a second attempt or third must be within the due date;

Example:

Midterm star on 05/24/2018 and due date   06/30/2018 @11:59 PM

If you want to ask for the second attempt IT MUST BE before 11:59 PM on 6/30/2018

Any request after the due date will be ignored

 

 

 

 

 

 

 

[i] Students handbook page 9

Course Email Policy

All email must have the following subject   information:

Subject: Course Number; your first name     your last name

 

Any email does not have these subject Information will be ignored

 

Subject:  ITS 631 ; xyz  abc

The post Algorithm, Course and research report, Cryptography appeared first on Custom Writing Service.

Post navigation

Testimonials

Great writer, open to making any changes if necessary. Definitely would hire again!

customer-1080648

Get Your Offer NOW

Sample Assignment Questions

Respond to 2 classmates posts for Psychology Course

Respond to 2 classmates posts for Psychology Course 2

Response to four posts (50-100 words)

600-850 word paper on Industrialization and the Modern State – The Creation of the Regulated Economy

Research Final

MODE OF PAYMENTS

WE GUARANTEE

Nursing Mentorship Essay Powered By nursingeditingservices.com

var Tawk_API=Tawk_API||{};
var Tawk_LoadStart=new Date();
(function(){
var s1=document.createElement(“script”),s0=document.getElementsByTagName(“script”)[0];
s1.async=true;
s1.src=’https://embed.tawk.to/5a8d49e3d7591465c707de10/default’;
s1.charset=’UTF-8′;
s1.setAttribute(‘crossorigin’,’*’);
s0.parentNode.insertBefore(s1,s0);
})();

/* */

var tw_100000 = null;

jQuery(document).ready(function() {
tw_100000 = jQuery(‘.testimonials-widget-testimonials100000’).bxSlider({
adaptiveHeight: true,
auto: true,
autoControls: true,
autoHover: true,
controls: false,
mode: ‘fade’,
pager: false,
pause: 4000,
video: false,
slideMargin: 2,
slideWidth: 0
});
});

Is this question part of your assignment?

Place order