Upload
gaganpreet-panesar
View
123
Download
1
Embed Size (px)
Citation preview
Term Papers for CSE403T
Sr. No Topic DescriptionRKE061A04RKE061A59
(i)2^n binary numbers are possible using n bits
(ii) Left shift and right shift operation
Create an animation showing using 2 bits, how the number is 4, i.e. show 00,01,10,11 and using 3 bits the number is 8 , 000,001,010..and so on Do the same for the left and right shift operation
RKE061A07RKE061A62
Security services X.800 With the help of animation show (i) Authentication (ii) Access control (iii) Data Confidentiality (iii) Data integrity (iv) Non repudiation
RKE061A08RKE061B01
A study of key cryptographic terms
An animation to explain Plaintext, ciphertext, cryptography, cryptanalysis, block cipher, stream cipher. Show example of each
RKE061A09RKE061B02
Brute force attack Show number of alternative keys possible for a given key size. Take small key size eg key size =2 for explanation. Also explain table 2.2 from text book. Explanation should be very clear using an animation
RKE061A10RKE061B03
Encryption techniques Substitution and transposition technique(explain clearly the meaning of substitution and transposition using proper diagrams no need to enter into types)
Just show using animation how substitution takes place, do the same for transposition, the animation should be such, where it asks for cipher to be used for each alphabet and then when the input string inserted, must be able to give the decrypted data, example at the start of the program one fills A as ‘#’ and B as “!” , now once input taken, whatever is typed on screen gets converted into the cipher
RKE061A12RKE061B05
Ceasar cipher Clear explanation, Take a plaintext and use proper key show the encryption process step by step using animation, clearly explain brute force attack on the same taking example(refer text book) i.e. create an animation to show the Ceaser Cipher at work ( user input must be taken)
, the show using animation how a brute force attack can crack it open
RKE061A13RKE061B06
Monoalphabetic cipher Clear explanation, Take a plaintext and use proper key show the encryption process step by step using animation, clearly explain brute force attack on the same taking example(refer text book) i.e. create an animation to show the Monoalphabetic Cipher at work ( user input must be taken) , the show using animation how a brute force/ cryptanalysis attack can crack it open
RKE061A15RKE061B11
Poly alphabetic cipher Explanation, advantage over mono alphabetic cipher should be illustrated using the animation, user input taken for both poly and mono and it should be demonstrated that poly is safer than mono
RKE061A18RKE061B14
Playfair cipher Clear explanation, use proper animation to explain the same with text, user input must be taken
RKE061A22RKE061B16
Hill cipher Clear explanation(refer book),use animation, Take a plaintext and use proper key show the encryption process step by step using animation
Discuss all the three cases
(i) Plain text and key known, find cipher
(ii) Plain text ad cipher known , find key
(iii) Cipher and key known , find plain text
RKE061A24RKE061B17
Matrix inverse Demonstrate how to find inverse of a matrix, take user input, 2X2 matrix as well as 3X3 matrix. Show how to get an identity matrix
RKE061A25RKE061B19
Vigenere cipher Refer text book, autokey system, take a plaintext and use proper key show the encryption process step by step using animation
RKE061A26 One time pad Refer text book, Take a plaintext and use proper
RKE061B20 key show the encryption process step by step using animation
RKE061A28RKE061B21
(i) Diffusion and confusion
(ii) Expansion and contraction permutation in DES
(i) Explain with proper example
(ii) Explain the exact mechanism for the same, using animation.
(iii) User Input must be taken
RKE061A29RKE061B23
Fiestal cipher Take a plaintext and use proper key show the encryption process step by step using animation
RKE061A30RKE061B27
Double DES Explanation, meet in the middle attack(with proper proof), use a plain text , encrypted using a suitable algo, show how can it be attacked using Double DES
RKE061A34RKE061B31RKE061B61
Triple DES with two and three keys
Compare both, draft an animation on the same, choose same data set and test what cipher comes out
RKE061A35RKE061B32
(i) Stream cipher
(ii)Initialization of state vector in RC4
(i)Clear explanation, pseudorandom byte generator
(ii) Refer text book(two pseudo codes are given explain them with proper animation.)
RKE061A37RKE061B39
Random number generation
Demonstrate the concept, properties of random number, linear congruential generator with example, animation of the same is expected
RKE061A38RKE061B41
RSA algorithm Animation needs to be prepared, where real time values can be filled and answers sought
RKE061A40RKE061B46
Man in the middle attack in deffie hellman key exchange
Refer text book, read and implement, create and animation, user inputs must be allowed for inputs to the key exchange algo and then demonstrate the attack
RKE061A42RKE061B47
Public key, Private key, Create and animation showing the use of both, choose algorithms, show how data is exchanged using both form of keys.
RKE061A43RKE061B49RKE061B60
Kerberos version 4 Authentication server, ticket granting server, ticket, ticket granting ticket, session key, service granting ticket, Kerberos relms, demonstrate all
RKE061A44RKE061B53
Modules’ Calculation How to find modules’ of a fraction number / negative / positive number – take user inputs and perform
RKE061A45RKE061B54
IP spoofing, Demonstrate the attack using animation and ways to protect against it
RKE061A48RKE061B55
MAC address spoofing,
Traffic padding
Demonstrate the attack using animation and ways to protect against it
RKE061A50RKE061B56
Phishing attack Demonstrate the attack using animation and ways to protect against it
RKE061A51RKE061B57
Digital signature Demonstrate the working using an animation and show how are they used to guard against the attacker
RKE061A52RKE061B58
Virus, worm Refer text book, demonstrate how virus attacks a file/ system, what are the issues and remedial solution for the same.