Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

ITNB 4 2 9 4 Cryptography and Network SecurityThe objective of this assignment is to implement a cryptographic algorithm in a networking context. The assignment

ITNB4294 Cryptography and Network SecurityThe objective of this assignment is to implement a cryptographic algorithm in a networking context. The assignment will allow students to gain hands-onexperience in cryptography, networking protocols, and programming skills. Students will develop a program that incorporates a selected cryptographicalgorithm to secure data transmission over a network.Learning Outcomnes1. CLO1: Explain the cryptographic algorithm and protocol underlying the network security application. (C2),(PLO2)2. CLO2: Discuss security protocol implemented at various TCP/IP layers. (C2),(PLO2)Task Description1. Choose a Cryptographic AlgorithmSelect a cryptographic algorithm of your choice, such as ChaCha20 Diffie-Hellman Key Exchange, Secure Hash Algorithm 3(SHA) orBlowFish. Research and understand the working principles and security features of the algorithm.2. Programming ImplementationImplement the program using a suitable programming language (e.g., Python, Java, C++, etc.). Ensure that the program utilizes the selectedcryptographic algorithm for encryption and decryption.3. Testing and DemonstrationTest the program by simulating the networking scenario. Demonstrate how the program successfully encrypts and decrypts the data, ensuringsecure communication between the client and server.4. Documentation and AnalysisPrepare a report documenting the implementation process, including the algorithm used, program design, code snippets, and screenshots of theprogram in action. Analyze the effectiveness and security aspects of the implemented cryptographic algorithm in the given networking context. Submit the complete source code and output of the programSUBMISSION DETAILSSource Code: Submit the complete source code of your program.Report: A PDF report (3-5 pages) that includes:Introduction: Briefly describe the chosen algorithm and its significance.Implementation Details: Explain how you implemented the algorithm, including keymanagement.Usage Instructions: How to run your program and use the encryption/decryption functionality.Testing and Results: Document the test cases and results.Conclusion: Summarize your experience and any challenges you faced during theimplementation.RUBRICSCriteriaProgrammingImplementation(CLO1, CLO2)Algorithm Thoroughly explains theSelection and cryptographic algorntmExplanation and its principles; shows(CLO1) deep understanding.Testing andDemonstration(CLO2)Excellent(10 Marks)Output ofProgramnImplements the programflawlessly; code isefficient andveUovganizeddemonstrates securedata transimissioneffectively.Documentation Detailed report withand Amalvsis thorough documentationOutput is corect andmeets all requirementsGoodTests comprehensively: Tests adequately:demonstrates securedata transmissionwith minor issuesperfectly.(8-9 Marks)Explains thecryptographicalgorithm and itsprinciples withminor gaps.Implements the Implements theprogram with minor program with someissues: code is1Ssues; code imostly eficient and somewhat efficientGood report withadequatedomnenta tion andsound analysis.Output is correctwith minordeviations fromSatisfactory (6-7 Marks)requirements.Provides a basicexplanation of thecryptographicalgorithm withsome inaccuracies.Tests minimally:demonstrates datatransmSS10n withsome 1ssues.Basic report withsufficientdocumentation andanalyss.Output is mostlycorrect with somedeviations fromrequirements.NeedsImprovement(3-5 Marks)Inadequateexplanation of thecryptographicalgorithm; many1naccuracies.Implements theprogram withsignificant issues;code is inefficientand disorganized.Inadequate testing:|demonstrates datatransmission withsignificant issues.Incomplete reportwith poordocumentation andsuperficial analysis.Output is incorectwith significantdeviations fromrequirements.Poor (1-2Mark)Very poorexplanation; fails tounderstand thecryptographicalgorithm.Very poorimplementation; codeis highly inefficientand disorganized.Very poor testing:fails to demonstratesecure datatransm1ssiOn.Very poor report;lacks documentationand analysis.Output is completelyincorrect and fails tomeet requirements.MARKS/10/10/10I10I10(CLO1, CLO2) and insightful analysis.organizedand organized.
image text in transcribed

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Students also viewed these Databases questions

Question

What is job rotation ?

Answered: 1 week ago

Question

7. What decisions would you make as the city manager?

Answered: 1 week ago

Question

8. How would you explain your decisions to the city council?

Answered: 1 week ago