15734_CSE403T Term Paper Topics

Embed Size (px)

Citation preview

  • 8/2/2019 15734_CSE403T Term Paper Topics

    1/4

    Term Papers for CSE883

    Roll No Topic Description1,31 (i)2^n binary

    numbers are

    possible using nbits

    (ii) Left shift and

    right shift

    operation

    Create an animation showing using 2 bits, how thenumber is 4, i.e. show 00,01,10,11 and using 3 bits

    the number is 8 , 000,001,010..and so onDo the same for the left and right shift operation

    2,32 Security services

    X.800

    With the help of animation show(i) Authentication (ii) Access control (iii) Data

    Confidentiality (iii) Data integrity (iv) Non

    repudiation

    3,33 A study of keycryptographicterms

    An animation to explainPlaintext,

    ciphertext,

    cryptography,

    cryptanalysis,

    block cipher,

    stream cipher

    show example of each4,34 Brute force attack Show number of alternative keys possible for a

    given key size. Take small key size eg key size =2

    for explanation. Also explain table 2.2 from text

    book. Explanation should be very clear using an

    animation

    5,35 Encryption

    techniques

    Substitution and transposition technique(explain

    clearly the meaning of substitution and

    transposition using proper diagrams no need to

    enter into types)

    Just show using animation how substitution takesplace, do the same for transposition, the animationshould be such, where it asks for cipher to be usedfor each alphabet and then when the input stringinserted, must be able to give the decrypted data,

    example at the start of the program one fills A as# and B as ! , now once input taken, what everis typed on screen gets converted into the cipher

  • 8/2/2019 15734_CSE403T Term Paper Topics

    2/4

    6,36 Ceasar cipher Clear explanation, Take a plaintext and use proper

    key show the encryption process step by step using

    animation, clearly explain brute force attack on the

    same taking example(refer text book) i.e create an

    animation to show the Ceaser Cipher at work ( user

    input must be taken) , the show using animation

    how a brute force attack can crack it open

    7,37 Monoalphabetic

    cipher

    Clear explanation, Take a plaintext and use proper

    key show the encryption process step by step using

    animation, clearly explain brute force attack on the

    same taking example(refer text book) i.e create an

    animation to show the Monoalphabetic Cipher at

    work ( user input must be taken) , the show using

    animation how a brute force/ cryptanalysis attackcan crack it open

    8,38 Poly alphabetic

    cipher

    Explanation, advantage over mono alphabetic

    cipher should be illustrated using the animation,

    user input taken for both poly and mono and it

    should be demonstrated that poly is safer than

    mono

    9,39 Playfair cipher Clear explanation, use proper animation to explainthe same with text, user input must be taken

    10,40 Hill cipher Clear explanation(refer book),use animation, Take a

    plaintext and use proper key show the encryption

    process step by step using animation

    Discuss all the three cases

    (i) Plain text and key known, find cipher

    (ii) Plain text ad cipher known , find key

    (iii)Cipher and key known , find plain text

    11,41 Matrix inverse Demonstrate how to find inverse of a matrix, takeuser input, 2X2 martix as well as 3X3 matrix.Show how to get an identity matrix

    12,42 Vigenere cipher Refer text book, autokey system,Take a plaintext

    and use proper key show the encryption process

  • 8/2/2019 15734_CSE403T Term Paper Topics

    3/4

    step by step using animation

    13,43 One time pad Refer text book, Take a plaintext and use proper

    key show the encryption process step by step using

    animation

    14,44 (i) Diffusion

    and

    confusio

    n

    (ii) Expansion

    and

    contraction

    permutation inDES

    (i) Explain with proper example

    (ii) Explain the exact mechanism for the same

    using animation.

    (iii)User Input must be taken

    15,45 Fiestal cipher Take a plaintext and use proper key show the

    encryption process step by step using animation

    16,46 Double DES Explanation, meet in the middle attack(with proper

    proof), use a plain text , encrypted using a suitable

    algo, show how can it be attacked using Double

    DES

    17,47 Triple DES with

    two and three

    keys

    Compare both, draft an animation on the same,

    choose same data set and test what cipher comes

    out

    18,48 (i) Stream

    cipher

    (ii)Initializationof state vector

    in RC4

    (i)Clear explanation, pseudorandom byte generator

    (ii) Refer text book(two pseudo codes are given

    explain them with proper animation.)

    19,49 Stream generation

    process in RC4

    Refer text book (one pseudo code is given explain it

    with animation)

    20,50 Random number

    generation

    Demonstrate the concept, properties of random

    number, linear congruential generator with proper

    example, an animation of the same is expected

  • 8/2/2019 15734_CSE403T Term Paper Topics

    4/4

    21,51 RSA algorithm Animation needs to be prepared, where real time

    values can be filled and answers sought

    22,52 Man in the middleattack in deffie

    hellman key

    exchange

    Refer text book, read and implement, create andanimation, user inputs must be allowed for inputs tothe key exchange algo and then demonstrate theattack

    23,53 Public key,

    Private key,

    Create and animation showing the use of both,choose algorithms, show how data is exchangedusing both form of keys.

    24,54 Kerberos version 4 Authentication server,

    ticket granting server,ticket,ticket granting ticket,

    session key, service granting ticket,Kerberos relms,

    demonstrate all

    25,55 Modules

    Calculation

    How to find modules of a fraction number /

    negative / positive number take user inputs and

    perform

    26,56 IP spoofing, Demonstrate the attack using animation and waysto protect against it

    27,57 MAC address

    spoofing,

    Traffic padding

    Demonstrate the attack using animation and waysto protect against it

    28,58 Phishing attack Demonstrate the attack using animation and ways

    to protect against it29,59 Digital signature Demonstrate the working using an animation and

    show how are they used to guard against theattacker

    30,60 Virus,worm Refer text book, demonstrate how virus attacks a

    file/ system , what are the issues and remedial

    solution for the same.