Answered step by step
Verified Expert Solution
Question
1 Approved Answer
ITNB 4 2 9 4 Cryptography and Network SecurityThe objective of this assignment is to implement a cryptographic algorithm in a networking context. The assignment
ITNB Cryptography and Network SecurityThe objective of this assignment is to implement a cryptographic algorithm in a networking context. The assignment will allow students to gain handsonexperience in cryptography, networking protocols, and programming skills. Students will develop a program that incorporates a selected cryptographicalgorithm to secure data transmission over a network.Learning Outcomnes CLO: Explain the cryptographic algorithm and protocol underlying the network security application. CPLO CLO: Discuss security protocol implemented at various TCPIP layers. CPLOTask Description Choose a Cryptographic AlgorithmSelect a cryptographic algorithm of your choice, such as ChaCha DiffieHellman Key Exchange, Secure Hash Algorithm SHA orBlowFish. Research and understand the working principles and security features of the algorithm Programming ImplementationImplement the program using a suitable programming language eg Python, Java, C etc. Ensure that the program utilizes the selectedcryptographic algorithm for encryption and decryption Testing and DemonstrationTest the program by simulating the networking scenario. Demonstrate how the program successfully encrypts and decrypts the data, ensuringsecure communication between the client and server Documentation and AnalysisPrepare a report documenting the implementation process, including the algorithm used, program design, code snippets, and screenshots of theprogram in action. Analyze the effectiveness and security aspects of the implemented cryptographic algorithm in the given networking context. Submit the complete source code and output of the programSUBMISSION DETAILSSource Code: Submit the complete source code of your program.Report: A PDF report pages that includes:Introduction: Briefly describe the chosen algorithm and its significance.Implementation Details: Explain how you implemented the algorithm, including keymanagement.Usage Instructions: How to run your program and use the encryptiondecryption functionality.Testing and Results: Document the test cases and results.Conclusion: Summarize your experience and any challenges you faced during theimplementation.RUBRICSCriteriaProgrammingImplementationCLO CLOAlgorithm Thoroughly explains theSelection and cryptographic algorntmExplanation and its principles; showsCLO deep understanding.Testing andDemonstrationCLOExcellent MarksOutput ofProgramnImplements the programflawlessly; code isefficient andveUovganizeddemonstrates securedata transimissioneffectively.Documentation Detailed report withand Amalvsis thorough documentationOutput is corect andmeets all requirementsGoodTests comprehensively: Tests adequately:demonstrates securedata transmissionwith minor issuesperfectly. MarksExplains thecryptographicalgorithm and itsprinciples withminor gaps.Implements the Implements theprogram with minor program with someissues: code isSsues; code imostly eficient and somewhat efficientGood report withadequatedomnenta tion andsound analysis.Output is correctwith minordeviations fromSatisfactory MarksrequirementsProvides a basicexplanation of thecryptographicalgorithm withsome inaccuracies.Tests minimally:demonstrates datatransmSSn withsome ssues.Basic report withsufficientdocumentation andanalyssOutput is mostlycorrect with somedeviations fromrequirements.NeedsImprovement MarksInadequateexplanation of thecryptographicalgorithm; manynaccuracies.Implements theprogram withsignificant issues;code is inefficientand disorganized.Inadequate testing:demonstrates datatransmission withsignificant issues.Incomplete reportwith poordocumentation andsuperficial analysis.Output is incorectwith significantdeviations fromrequirements.Poor MarkVery poorexplanation; fails tounderstand thecryptographicalgorithm.Very poorimplementation; codeis highly inefficientand disorganized.Very poor testing:fails to demonstratesecure datatransmssiOn.Very poor report;lacks documentationand analysis.Output is completelyincorrect and fails tomeet requirements.MARKSIICLO CLO and insightful analysis.organizedand organized.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started