Sunteți pe pagina 1din 5

Term Papers for CSE403T Sr.

No RKE061A04 RKE061A59 Topic (i)2^n binary numbers are possible using n bits Description Create an animation showing using 2 bits, how the number is 4, i.e. show 00,01,10,11 and using 3 bits the number is 8 , 000,001,010..and so on Do the same for the left and right shift (ii) Left shift and operation right shift operation Security X.800 services With the help of animation show (i) Authentication (ii) Access control (iii) Data Confidentiality (iii) Data integrity (iv) Non repudiation

RKE061A07 RKE061A62

RKE061A08 RKE061B01

A study of cryptographic terms

key An animation to explain Plaintext, ciphertext, cryptography, cryptanalysis, block cipher, stream cipher. Show example of each Show number of alternative keys possible for a given key size. Take small key size eg key size =2 for explanation. Also explain table 2.2 from text book. Explanation should be very clear using an animation Substitution and transposition technique(explain clearly the meaning of substitution and transposition using proper diagrams no need to enter into types) Just show using animation how substitution takes place, do the same for transposition, the animation should be such, where it asks for cipher to be used for each alphabet and then when the input string inserted, must be able to give the decrypted data, example at the start of the program one fills A as # and B as ! , now once input taken, whatever is typed on screen gets converted into the cipher

RKE061A09 RKE061B02

Brute force attack

RKE061A10 RKE061B03

Encryption techniques

RKE061A12 RKE061B05

Ceasar cipher

Clear explanation, Take a plaintext and use proper key show the encryption process step by step using animation,

clearly explain brute force attack on the same taking example(refer text book) i.e. create an animation to show the Ceaser Cipher at work ( user input must be taken) , the show using animation how a brute force attack can crack it open RKE061A13 RKE061B06 Monoalphabetic cipher Clear explanation, Take a plaintext and use proper key show the encryption process step by step using animation, clearly explain brute force attack on the same taking example(refer text book) i.e. create an animation to show the Monoalphabetic Cipher at work ( user input must be taken) , the show using animation how a brute force/ cryptanalysis attack can crack it open

RKE061A15 RKE061B11

Poly cipher

alphabetic Explanation, advantage over mono alphabetic cipher should be illustrated using the animation, user input taken for both poly and mono and it should be demonstrated that poly is safer than mono Clear explanation, use proper animation to explain the same with text, user input must be taken Clear explanation(refer book),use animation, Take a plaintext and use proper key show the encryption process step by step using animation Discuss all the three cases (i) Plain text and key known, find cipher (ii) Plain text ad cipher known , find key (iii)Cipher and key known , find plain text

RKE061A18 RKE061B14

Playfair cipher

RKE061A22 RKE061B16

Hill cipher

RKE061A24 RKE061B17 RKE061A25 RKE061B19

Matrix inverse

Vigenere cipher

Demonstrate how to find inverse of a matrix, take user input, 2X2 matrix as well as 3X3 matrix. Show how to get an identity matrix Refer text book, autokey system, take a plaintext and use proper key show the encryption process step by step using animation

RKE061A26 RKE061B20

One time pad

Refer text book, Take a plaintext and use proper key show the encryption process step by step using animation

RKE061A28 RKE061B21

(i) Diffusion and confusion (ii) Expansion and contraction permutation in DES

(i) Explain with proper example (ii) Explain the exact mechanism for the same, using animation. (iii)User Input must be taken

RKE061A29 RKE061B23

Fiestal cipher

Take a plaintext and use proper key show the encryption process step by step using animation Explanation, meet in the middle attack(with proper proof), use a plain text , encrypted using a suitable algo, show how can it be attacked using Double DES

RKE061A30 RKE061B27

Double DES

RKE061A34 RKE061B31 RKE061B61

Triple DES with two Compare both, draft an animation on the and three keys same, choose same data set and test what cipher comes out (i) Stream cipher (i)Clear explanation, pseudorandom byte generator

RKE061A35 RKE061B32

(ii)Initialization (ii) Refer text book(two pseudo codes of state vector are given explain them with proper in RC4 animation.)

RKE061A37 RKE061B39

Random number Demonstrate the concept, properties of generation random number, linear congruential generator with example, animation of the same is expected RSA algorithm Animation needs to be prepared, where real time values can be filled and answers sought

RKE061A38 RKE061B41

RKE061A40 RKE061B46

Man in the middle Refer text book, read and implement, attack in deffie create and animation, user inputs must hellman key be allowed for inputs to the key exchange algo and then demonstrate exchange the attack

RKE061A42 RKE061B47

Public key, Private Create and animation showing the use of both, choose algorithms, show how key, data is exchanged using both form of keys.

RKE061A43 RKE061B49 RKE061B60

Kerberos version 4

Authentication server, ticket granting server, ticket, ticket granting ticket, session key, service granting ticket, Kerberos relms, demonstrate all How to find modules of a fraction number / negative / positive number take user inputs and perform Demonstrate the attack using animation and ways to protect against it

RKE061A44 RKE061B53

Modules Calculation

RKE061A45 RKE061B54 RKE061A48 RKE061B55

IP spoofing,

MAC spoofing,

address Demonstrate the attack using animation and ways to protect against it

Traffic padding RKE061A50 RKE061B56 Phishing attack Demonstrate the attack using animation and ways to protect against it

RKE061A51 RKE061B57

Digital signature

Demonstrate the working using an animation and show how are they used

RKE061A52 RKE061B58

Virus, worm

to guard against the attacker Refer text book, demonstrate how virus attacks a file/ system, what are the issues and remedial solution for the same.

S-ar putea să vă placă și