6
Term Papers for CSE403T Sr. No Topic Description RKE061A04 RKE061A59 (i)2^n binary numbers are possible using n bits (ii) Left shift and right shift operation Create an animation showing using 2 bits, how the number is 4, i.e. show 00,01,10,11 and using 3 bits the number is 8 , 000,001,010..and so on Do the same for the left and right shift operation RKE061A07 RKE061A62 Security services X.800 With the help of animation show (i) Authentication (ii) Access control (iii) Data Confidentiality (iii) Data integrity (iv) Non repudiation RKE061A08 RKE061B01 A study of key cryptographic terms An animation to explain Plaintext, ciphertext, cryptography, cryptanalysis, block cipher, stream cipher. Show example of each RKE061A09 RKE061B02 Brute force attack Show number of alternative keys possible for a given key size. Take small key size eg key size =2 for explanation. Also explain table 2.2 from text book. Explanation should be very clear using an animation RKE061A10 RKE061B03 Encryption techniques Substitution and transposition technique(explain clearly the meaning of substitution and transposition using proper diagrams no need to enter into types) Just show using animation how substitution takes place, do the same for transposition, the

12376_CSE403T Term Paper Topics (1)

Embed Size (px)

Citation preview

Page 1: 12376_CSE403T Term Paper Topics (1)

Term Papers for CSE403T

Sr. No Topic DescriptionRKE061A04RKE061A59

(i)2^n binary numbers are possible using n bits

(ii) Left shift and right shift operation

Create an animation showing using 2 bits, how the number is 4, i.e. show 00,01,10,11 and using 3 bits the number is 8 , 000,001,010..and so on Do the same for the left and right shift operation

RKE061A07RKE061A62

Security services X.800 With the help of animation show (i) Authentication (ii) Access control (iii) Data Confidentiality (iii) Data integrity (iv) Non repudiation

RKE061A08RKE061B01

A study of key cryptographic terms

An animation to explain Plaintext, ciphertext, cryptography, cryptanalysis, block cipher, stream cipher. Show example of each

RKE061A09RKE061B02

Brute force attack Show number of alternative keys possible for a given key size. Take small key size eg key size =2 for explanation. Also explain table 2.2 from text book. Explanation should be very clear using an animation

RKE061A10RKE061B03

Encryption techniques Substitution and transposition technique(explain clearly the meaning of substitution and transposition using proper diagrams no need to enter into types)

Just show using animation how substitution takes place, do the same for transposition, the animation should be such, where it asks for cipher to be used for each alphabet and then when the input string inserted, must be able to give the decrypted data, example at the start of the program one fills A as ‘#’ and B as “!” , now once input taken, whatever is typed on screen gets converted into the cipher

RKE061A12RKE061B05

Ceasar cipher Clear explanation, Take a plaintext and use proper key show the encryption process step by step using animation, clearly explain brute force attack on the same taking example(refer text book) i.e. create an animation to show the Ceaser Cipher at work ( user input must be taken)

Page 2: 12376_CSE403T Term Paper Topics (1)

, the show using animation how a brute force attack can crack it open

RKE061A13RKE061B06

Monoalphabetic cipher Clear explanation, Take a plaintext and use proper key show the encryption process step by step using animation, clearly explain brute force attack on the same taking example(refer text book) i.e. create an animation to show the Monoalphabetic Cipher at work ( user input must be taken) , the show using animation how a brute force/ cryptanalysis attack can crack it open

RKE061A15RKE061B11

Poly alphabetic cipher Explanation, advantage over mono alphabetic cipher should be illustrated using the animation, user input taken for both poly and mono and it should be demonstrated that poly is safer than mono

RKE061A18RKE061B14

Playfair cipher Clear explanation, use proper animation to explain the same with text, user input must be taken

RKE061A22RKE061B16

Hill cipher Clear explanation(refer book),use animation, Take a plaintext and use proper key show the encryption process step by step using animation

Discuss all the three cases

(i) Plain text and key known, find cipher

(ii) Plain text ad cipher known , find key

(iii) Cipher and key known , find plain text

RKE061A24RKE061B17

Matrix inverse Demonstrate how to find inverse of a matrix, take user input, 2X2 matrix as well as 3X3 matrix. Show how to get an identity matrix

RKE061A25RKE061B19

Vigenere cipher Refer text book, autokey system, take a plaintext and use proper key show the encryption process step by step using animation

RKE061A26 One time pad Refer text book, Take a plaintext and use proper

Page 3: 12376_CSE403T Term Paper Topics (1)

RKE061B20 key show the encryption process step by step using animation

RKE061A28RKE061B21

(i) Diffusion and confusion

(ii) Expansion and contraction permutation in DES

(i) Explain with proper example

(ii) Explain the exact mechanism for the same, using animation.

(iii) User Input must be taken

RKE061A29RKE061B23

Fiestal cipher Take a plaintext and use proper key show the encryption process step by step using animation

RKE061A30RKE061B27

Double DES Explanation, meet in the middle attack(with proper proof), use a plain text , encrypted using a suitable algo, show how can it be attacked using Double DES

RKE061A34RKE061B31RKE061B61

Triple DES with two and three keys

Compare both, draft an animation on the same, choose same data set and test what cipher comes out

RKE061A35RKE061B32

(i) Stream cipher

(ii)Initialization of state vector in RC4

(i)Clear explanation, pseudorandom byte generator

(ii) Refer text book(two pseudo codes are given explain them with proper animation.)

RKE061A37RKE061B39

Random number generation

Demonstrate the concept, properties of random number, linear congruential generator with example, animation of the same is expected

RKE061A38RKE061B41

RSA algorithm Animation needs to be prepared, where real time values can be filled and answers sought

RKE061A40RKE061B46

Man in the middle attack in deffie hellman key exchange

Refer text book, read and implement, create and animation, user inputs must be allowed for inputs to the key exchange algo and then demonstrate the attack

Page 4: 12376_CSE403T Term Paper Topics (1)

RKE061A42RKE061B47

Public key, Private key, Create and animation showing the use of both, choose algorithms, show how data is exchanged using both form of keys.

RKE061A43RKE061B49RKE061B60

Kerberos version 4 Authentication server, ticket granting server, ticket, ticket granting ticket, session key, service granting ticket, Kerberos relms, demonstrate all

RKE061A44RKE061B53

Modules’ Calculation How to find modules’ of a fraction number / negative / positive number – take user inputs and perform

RKE061A45RKE061B54

IP spoofing, Demonstrate the attack using animation and ways to protect against it

RKE061A48RKE061B55

MAC address spoofing,

Traffic padding

Demonstrate the attack using animation and ways to protect against it

RKE061A50RKE061B56

Phishing attack Demonstrate the attack using animation and ways to protect against it

RKE061A51RKE061B57

Digital signature Demonstrate the working using an animation and show how are they used to guard against the attacker

RKE061A52RKE061B58

Virus, worm Refer text book, demonstrate how virus attacks a file/ system, what are the issues and remedial solution for the same.