Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

You have been exposed to a number of basic concepts in the first two modules. The first module was used to set the stage by

You have been exposed to a number of basic concepts in the first two modules. The first module was used to set the stage by explaining the basic principles of security and how we are all already very familiar with them. The advent of the computer makes us focus on Data, but data security is in fact very similar to personal security. We want similar things.

We then proceeded to discuss threat modeling as a way to systematically analyze threats, vulnerabilities and attack paths. This allowed us to make informed decisions about what kind of mitigation strategies we want to take.

This then led us to talk about cryptography. In this first module, we talked about some of the basis of cryptography basically saying that they are a set of Plaintexts, Ciphertexts, Encryption Functions, Decryption Functions, as well as Encryption Keys and Decryption keys.

  1. (2 points) Write an implementation of the Caeser Cipher in Python and include as a .py attachment

    1. It should take command line arguments to --encrypt or --decrypt (use argparse). Include help text for the commands.

    2. I will run the following commands to evaluate it:

      1. python caeser.py --encrypt somestring

      2. python caeser.py --decrypt somestring

    3. Your script should simply output the encrypted or decrypted string.

  2. (6 points) Write a script that will copy a file from one directory to another, and demonstrate a practical example of using a hash.

    1. Part 1: Write a script to copy a file from one directory to another. Use a SHA256 hash to confirm that the file copied cleanly into it's new location.

    2. Part 2: Expand your script with a command line argument that will scramble a single byte in the copied file. Demonstrate that the hashes are of the two files are now different.

    3. Some detailed requirements:

      1. Please use the attached zip file as the base starting point for the file structure and outline.

      2. Use argparse for argument parsing. Your argument should be named -scramble.

      3. Comment your code for full credit

      4. Your code should have help text and I should be able to understand it easily.

      5. Your code should work with native Python 3 libraries

      6. Do not change the file name when copying it.

      7. Please answer the question in the question.txt text file. (1 point)

Please submit a zip file with your response containing two scripts, clearly labeled. Please include command line help for how the script should be used and comment your code.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Genetic Databases

Authors: Martin J. Bishop

1st Edition

0121016250, 978-0121016258

More Books

Students also viewed these Databases questions