University of the Cumberlands
School of Computer and Information Sciences
ISOL 535 – Cryptography
Summer 2018, IIG
IIG term (8-week, 100% online course): July 2nd – August 21st
University of the Cumberlands
School of Computer and Information Sciences
ISOL 535 – Cryptography
Summer 2018, IIG
IIG term (8-week, 100% online course): July 2nd – August 21st
Course Summary
Course Description
The course covers the Cryptography techniques and algorithms use to secure data, The course will cover classical, and modern cryptography algorithms in the first part, in the second part will cover the use of cryptography, applications, standard and some legal issues needed for cybersecurity. The course will look at classical algorithms, stream cipher, block cipher, public key, digital signature, hash functions, cryptography access control, cryptography standards
Course Objectives
1. Understand the cryptography algorithms
2. Understand the cryptography applications
3. Understands the use of cryptography
4. Understand the cryptography standards
Course Outcomes
The course examines methods and techniques for concealing data for security purposes. Topics covered will include cryptographic techniques, approaches, and technologies.
Upon completion of the course, students will be able to
· Define key cryptographic terms.
· Identify the classical and modern cryptography algorithms
· Understand Symmetric algorithms
· Understand Asymmetric algorithms
· Distinguish between types of symmetric
· Distinguish between types of Asymmetric
· Understand different Hashing algorithms
· Identify the use of hashing and digital signatures
· Understand the Cryptography Key Managements and Access control
· Identify cryptography standards national and international
· Recognize the legal issue with cryptography applications and use
Learning Materials
Required Resources
All notes will be provided on the blackboard
References
· Christof Paar and Jan Pelzl. Understanding Cryptography: A Textbook for Students and Practitioners Springer; 2010 edition
· https://www.staff.uni-mainz.de/pommeren/Cryptology/References.html
· http://www.cse.iitd.ac.in/~murali/crypt/books.html
· https://en.wikipedia.org/wiki/Books_on_cryptography
· https://www.sanfoundry.com/best-reference-books-cryptography-network-security/
Labs:
There are no labs but you need to get use to different resource to speed up you question solutions
You can use any of the following
· DOSBox 0.74 the mount on C directory CALC: it Dos a dos calculator very fast to calculate cryptography solutions (we will have a presentation on it)
· CrypTool you can load it (very useful to solve some reports) or use online version
· Sage online version or load the compiler
· GNU Octave (CLI)
There is no ready cryptography tools to help you need to focus on one or two tools to solve some problems
Algorithm Report 10% Due date Due Date 8/11 @11:59 PM
Take a sample of Plain text, encrypt this plaintext step by step using AES, you must show each step how it has been done with all tables and codes, till you generate the Ciphertext. the reverse your work step by step until you generate the Plaintext
Your plaintext is:
“Here you can encrypt a block of bytes with a key using the popular Advanced Encryption Standard cipher” . All the internal steps of the computation are shown, which can be helpful for anyone debugging their own AES implementation. In each of the 10/12/14 rounds, the sub-steps of SubBytes, ShiftRows, MixColumns, AddRoundKey, and key schedule are shown”
Encryption
5%
Decryption
5%
Due date Due Date 8/11 @11:59 PM
Course Report 10% Due date Due Date 8/11 @11:59 PM
A class report is 20 pages, each page 300 word, single space with Arial font and size of 10
Titles and subtitles are in Arial font and size of 12 (bolds)
A Class report is a report to describe a cryptography algorithm, this report focuses on the algorithms mechanism and an example to explain the mechanism.
The report covers one of the following:
Lattice-Based Cryptography (You need to go through Vector Space first)
Quantum Cryptography
Post-quantum Cryptography
Blowfish
Twofish
MARS
DEAL, a Feistel cipher using DES as the round function
The Tiny Encryption Algorithm, or TEA
LOKI97, one of the LOKI family of ciphers, from Australia
Course Report structure
The report has one section called:
The …… Algorithm
· Algorithm specification
· Encryption Procedure: step by step as algorithm (NOT programming Language)
· Decryption procedure: step by step as algorithm (NOT programming Language)
· Security analysis
· Example: Step by Step
Course Report grades:
Report part
Marks
Algorithm specification
2%
Encryption Procedure
5%
Decryption procedure
5%
Security analysis
4%
Example
6%
SUM
20%
Research Paper 20% Due date 8/12 @11: 59 PM
Each student will write a research paper, the paper focus on the technical, mathematical and the use of Cryptography application. Each student will be located on a project from the following list. OR you can select your application after you send me a short email describing your interests
· Cryptography Access control
· Cryptography key management
· Cryptography Authentication
· BB84 Protocol
· Cryptography Quantum key distribution
· Cryptography Quantum Coin Flipping
· Symmetric encryption and message authentication material construction
· Secured application-level data transport
· Non-repudiation methods
· Secret sharing methods
· Secure multi-party computation
· Cryptography formal model: Burrows–Abadi–Needham logic
· Cryptography formal model: Dolev–Yao model
· Cryptography formal model: π-calculus (or pi-calculus)
· Cryptography formal model: Protocol composition logic
· PKI
· SSL/TLS
· Secure Shell
· Network Link encryption
· VPN
· Wireless communication
· Digital signature
· Content encryption
· Security Token
· Identity federations
· Steganography algorithms
· Pseudorandom functions
· Cryptography Protocols
· Authentication protocols
· Secure remote passwords
· Bluetooth pairing
· Common criteria (cryptography product) certification and accreditation
· Cryptographic product selection criteria
· Network Link encryption
· VPN
· Wireless communication
· Device encryption
· Content encryption
· Physical Access and contactless Token
· Identity Federation
Research paper Structure
· Introduction summary of the work
· The benefit of the application
· Application description
· Application implementation description
· Implementations issues (if any)
· Application use (end user use) description
· References
Research paper Format
Each research papers should not less than 25-30 pages, each page 300 word, single space with Arial font and size of 10
Titles and subtitles are in Arial font and size of 12 (bolds)
Do not use pictures copied from the web, use graphic design through MS Visio
Research paper marks
The paper worth 20% of the course divided as
Section
Marks
Comments
Introduction summary of the work
1%
The benefit of the application
2%
Application description
5%
Application implementation description
5%
(use step by step examples, flowcharts, Visio diagrams)
Should go to implantations details
Application use (end user use) description
5%
References and citations
2%
SUM
20%
All Reports will be checked Plagiarism Detection
Course Outline *
Note: Assignments in the following table are listed as when they are due.
Week 1
7/2
Chapter 1: Introduction to Cryptography
Chapter 2: Mathematics
[i]
The normal procedure will be collecting evidence, inform the student and report the issue to the academic affaire
Your network and keeping your computer healthy it is your responsibilities.
In all Exams and Quizzes Asking for the second attempt, third or fourth will be subject to reducing your grades by 25%, 50% or 75%
· In all Exams and Quizzes Asking for the second attempt for a quiz or midterm or final your grads will be calculated as
· Grades =Second attempt grads – 25% of the original grades value
· In all Exams and Quizzes Asking for the third attempt for a quiz or midterm or final your grades will be calculated as
· Grades =Second attempt grades – 50% of the original grades value
· In all Exams and Quizzes Asking for the fourth attempt
Grads= Third attempt grades – 75% of the original grades value
Example
Midterm =20% of the final course grades
Midterm ask for the second attempt
Final Midterm Grades =Second attempt grades – 5 marks
Midterm ask for the third attempt
Final Midterm Grades =Second attempt grades – 10 marks
Midterm ask for forth attempt
Final Midterm Grades =Second attempt grades – 15 marks
ASKING FOR THE SECOND ATTEMPT
Asking for a second attempt or third must be within the due date;
Example:
Midterm star on 05/24/2018 and due date 06/30/2018 @11:59 PM
If you want to ask for the second attempt IT MUST BE before 11:59 PM on 6/30/2018
Any request after the due date will be ignored
[i] Students handbook page 9
Course Email Policy
All email must have the following subject information:
Subject: Course Number; your first name your last name
Any email does not have these subject Information will be ignored
Subject: ITS 631 ; xyz abc
The post Algorithm, Course and research report, Cryptography appeared first on Custom Writing Service.
Post navigation
Testimonials
Get Your Offer NOW
Sample Assignment Questions
Respond to 2 classmates posts for Psychology Course
Respond to 2 classmates posts for Psychology Course 2
Response to four posts (50-100 words)
600-850 word paper on Industrialization and the Modern State – The Creation of the Regulated Economy
Research Final
MODE OF PAYMENTS
WE GUARANTEE
var Tawk_API=Tawk_API||{};
var Tawk_LoadStart=new Date();
(function(){
var s1=document.createElement(“script”),s0=document.getElementsByTagName(“script”)[0];
s1.async=true;
s1.src=’https://embed.tawk.to/5a8d49e3d7591465c707de10/default’;
s1.charset=’UTF-8′;
s1.setAttribute(‘crossorigin’,’*’);
s0.parentNode.insertBefore(s1,s0);
})();
/* */
var tw_100000 = null;
jQuery(document).ready(function() {
tw_100000 = jQuery(‘.testimonials-widget-testimonials100000’).bxSlider({
adaptiveHeight: true,
auto: true,
autoControls: true,
autoHover: true,
controls: false,
mode: ‘fade’,
pager: false,
pause: 4000,
video: false,
slideMargin: 2,
slideWidth: 0
});
});