Develop a new reversible data encryption algorithm


Hello, if you have any need, please feel free to consult us, this is my wechat: wx91due

Objective:

  • To provide an opportunity for students to apply computer security application concepts to a real case.
  • To encourage teamwork and cooperation among students in the same group.

Background:

  • Though there are many popular and strong encryption/hash algorithms to protect our data/information against hacker attack, the cracking success is a matter of time. Therefore, this project aims at letting students

Requirements:

  • Students are required to form a group of 5-6 students as a research team to develop this algorithm. The project will be marked based on students’ analytical capability, research skills, computer programming proficiency, report writing skills.
Individual task: Develop a new reversible data encryption algorithm [7%]


Work alone to develop the above algorithm using computer programming.
Suggested programming languages are c++, Java, php, python.
Prepare a 1-min individual video demo of encryption and decryption
Prepare a 5-min individual presentation video with PPT slides explaining the algorithm, show important parts of the program codes, strengths and weaknesses as well as limitations.
Total video length [6 mins] = 1-min demo + 5-min presentation
Group task: Simulation and investigation of brute-force password attack [8%]
Work in group develop a program that can generate a random password of length 1-6 chars from ASCII table and then perform brute-force password attack.
Suggested OO programming languages are c++, Java, python.
The program can tell the time taken to crack a password.
Take the time using your written program for different password lengths, e.g. 1 – 6- character long. Repeat 10 times to find the average time taken to crack different lengths of password.
Record the time for different password length and plot the graph using log scale (turn the curve not straight line) and interpret the graph.
Plot line graphs (with proper axis scaling – Hint: log) using time taken to crack password (y-axis) against the length of password (x-axis)
Interpret the line graphs in terms of the relationship between time taken and length of password
Any observation and interpretation in terms of password length. Do you think bruteforce can attack crack the password easily?
Consult and recommend on the length of password against Brute force password attack.
Multithreading programs may need to speed up the cracking process and students may use multiple computers to run the program to collect the time result.
Prepare ~5-min group video demo of part of password generation and password cracking
Prepare ~5-min group presentation video with PPT slides explaining the program, how to generate random passwords and how to perform Brute force attack as well as strengths and weaknesses of the program and limitations. Observation on the password attack, recommendation and conclusion of the password length against attack should be mentioned.
Total video length = 10 mins = demo + presentation
For example: 10 mins = 4-min demo + 6-min presentation, 10 mins = 5-min demo + 5-min presentation, … etc.

Deliverables:

Submitted by each student


  • Individual written report (pdf) of Task 1 & 2 programs ➔ zipped
  • Fill in the PEER-EVALUATION FORM INDIVIDUALLY
  • YouTube presentation on or before week 12.
    • One individual video of encryption algorithm demo + PPT presentation [6 min].
    • Prepare a YouTube link of the individual video [settings: unlisted, not for kids]
  • The group presentation will be held in the last lesson [week 13] [10 mins per group].
    • One group video of brute-force password cracking demo + PPT presentation
    • Prepare a YouTube link of the group video [settings: unlisted, not for kids]
  • The order of presentation will be announced later.
  • Due date: Week 12
  • Mark is deducted for over run.


Late penalty:

One sub-grade will be deducted for each day the assignment is outstanding. Submissions later than one week from the due date will not be accepted unless supported by compelling circumstances.

Assessment Rubrics

Subject Intended Learning Outcomes
Assessment Criteria
Outstanding to Exceptionally Outstanding (Grade: A to A+)
Good to Very Good (Grade: B to B+)
Satisfactory to Wholly Satisfactory (Grade: C to C+)
Barely Adequate to Barely Satisfactory (Grade: D to D+)
Inadequate (Grade: F)
a. Understand the importance of computer and network security within a firm and in the Internet environment;
b. Identify the requirements in computer security;
c. Appraise the technologies for safeguarding data and the potential threats that can arise from within and outside the firm;
d. Explain the need for disaster recovery in today’s environmentand the trends in computer security.
Overall understanding of concepts and techniquesabout software engineering

Effective solution. 

It shows complete understanding of the problems, thoroughly addresses all points relevant to the solution, shows logical reasoning and valid conclusions, and communicates effectively and clearly through writing and/or diagrams.

Contain minor flaws. 

It shows an understanding of the problem, communicates adequately through writing and/or diagrams, and generally reaches reasonable conclusions.

It shows minor flaws in reasoning and/or neglects to address some aspect of the problem.
Gaps in understanding.

It shows one or some combination of the following flaws: an incomplete understanding of the problem, failure to address someaspects of the problem, faulty reasoning, weak conclusions, unclear communicati on in writing and/or diagrams, or a poor understanding of relevant procedures or concepts.

Some effort beyond restating the problem or copying given information.

It shows some combination of the following flaws: little understanding of the problem, failure to address most aspects of the problem, major flaws  in reasoningthat lead to invalid conclusions, or a lack of understanding of relevant procedures or concepts.
No understanding of the problem or has failed to respond to the item.















发表评论

电子邮件地址不会被公开。 必填项已用*标注