Documente Academic
Documente Profesional
Documente Cultură
No RKE061A04 RKE061A59 Topic (i)2^n binary numbers are possible using n bits Description Create an animation showing using 2 bits, how the number is 4, i.e. show 00,01,10,11 and using 3 bits the number is 8 , 000,001,010..and so on Do the same for the left and right shift (ii) Left shift and operation right shift operation Security X.800 services With the help of animation show (i) Authentication (ii) Access control (iii) Data Confidentiality (iii) Data integrity (iv) Non repudiation
RKE061A07 RKE061A62
RKE061A08 RKE061B01
key An animation to explain Plaintext, ciphertext, cryptography, cryptanalysis, block cipher, stream cipher. Show example of each Show number of alternative keys possible for a given key size. Take small key size eg key size =2 for explanation. Also explain table 2.2 from text book. Explanation should be very clear using an animation Substitution and transposition technique(explain clearly the meaning of substitution and transposition using proper diagrams no need to enter into types) Just show using animation how substitution takes place, do the same for transposition, the animation should be such, where it asks for cipher to be used for each alphabet and then when the input string inserted, must be able to give the decrypted data, example at the start of the program one fills A as # and B as ! , now once input taken, whatever is typed on screen gets converted into the cipher
RKE061A09 RKE061B02
RKE061A10 RKE061B03
Encryption techniques
RKE061A12 RKE061B05
Ceasar cipher
Clear explanation, Take a plaintext and use proper key show the encryption process step by step using animation,
clearly explain brute force attack on the same taking example(refer text book) i.e. create an animation to show the Ceaser Cipher at work ( user input must be taken) , the show using animation how a brute force attack can crack it open RKE061A13 RKE061B06 Monoalphabetic cipher Clear explanation, Take a plaintext and use proper key show the encryption process step by step using animation, clearly explain brute force attack on the same taking example(refer text book) i.e. create an animation to show the Monoalphabetic Cipher at work ( user input must be taken) , the show using animation how a brute force/ cryptanalysis attack can crack it open
RKE061A15 RKE061B11
Poly cipher
alphabetic Explanation, advantage over mono alphabetic cipher should be illustrated using the animation, user input taken for both poly and mono and it should be demonstrated that poly is safer than mono Clear explanation, use proper animation to explain the same with text, user input must be taken Clear explanation(refer book),use animation, Take a plaintext and use proper key show the encryption process step by step using animation Discuss all the three cases (i) Plain text and key known, find cipher (ii) Plain text ad cipher known , find key (iii)Cipher and key known , find plain text
RKE061A18 RKE061B14
Playfair cipher
RKE061A22 RKE061B16
Hill cipher
Matrix inverse
Vigenere cipher
Demonstrate how to find inverse of a matrix, take user input, 2X2 matrix as well as 3X3 matrix. Show how to get an identity matrix Refer text book, autokey system, take a plaintext and use proper key show the encryption process step by step using animation
RKE061A26 RKE061B20
Refer text book, Take a plaintext and use proper key show the encryption process step by step using animation
RKE061A28 RKE061B21
(i) Diffusion and confusion (ii) Expansion and contraction permutation in DES
(i) Explain with proper example (ii) Explain the exact mechanism for the same, using animation. (iii)User Input must be taken
RKE061A29 RKE061B23
Fiestal cipher
Take a plaintext and use proper key show the encryption process step by step using animation Explanation, meet in the middle attack(with proper proof), use a plain text , encrypted using a suitable algo, show how can it be attacked using Double DES
RKE061A30 RKE061B27
Double DES
Triple DES with two Compare both, draft an animation on the and three keys same, choose same data set and test what cipher comes out (i) Stream cipher (i)Clear explanation, pseudorandom byte generator
RKE061A35 RKE061B32
(ii)Initialization (ii) Refer text book(two pseudo codes of state vector are given explain them with proper in RC4 animation.)
RKE061A37 RKE061B39
Random number Demonstrate the concept, properties of generation random number, linear congruential generator with example, animation of the same is expected RSA algorithm Animation needs to be prepared, where real time values can be filled and answers sought
RKE061A38 RKE061B41
RKE061A40 RKE061B46
Man in the middle Refer text book, read and implement, attack in deffie create and animation, user inputs must hellman key be allowed for inputs to the key exchange algo and then demonstrate exchange the attack
RKE061A42 RKE061B47
Public key, Private Create and animation showing the use of both, choose algorithms, show how key, data is exchanged using both form of keys.
Kerberos version 4
Authentication server, ticket granting server, ticket, ticket granting ticket, session key, service granting ticket, Kerberos relms, demonstrate all How to find modules of a fraction number / negative / positive number take user inputs and perform Demonstrate the attack using animation and ways to protect against it
RKE061A44 RKE061B53
Modules Calculation
IP spoofing,
MAC spoofing,
address Demonstrate the attack using animation and ways to protect against it
Traffic padding RKE061A50 RKE061B56 Phishing attack Demonstrate the attack using animation and ways to protect against it
RKE061A51 RKE061B57
Digital signature
Demonstrate the working using an animation and show how are they used
RKE061A52 RKE061B58
Virus, worm
to guard against the attacker Refer text book, demonstrate how virus attacks a file/ system, what are the issues and remedial solution for the same.