Upload
sharma-ankur
View
217
Download
0
Embed Size (px)
Citation preview
8/2/2019 15734_CSE403T Term Paper Topics
1/4
Term Papers for CSE883
Roll No Topic Description1,31 (i)2^n binary
numbers are
possible using nbits
(ii) Left shift and
right shift
operation
Create an animation showing using 2 bits, how thenumber is 4, i.e. show 00,01,10,11 and using 3 bits
the number is 8 , 000,001,010..and so onDo the same for the left and right shift operation
2,32 Security services
X.800
With the help of animation show(i) Authentication (ii) Access control (iii) Data
Confidentiality (iii) Data integrity (iv) Non
repudiation
3,33 A study of keycryptographicterms
An animation to explainPlaintext,
ciphertext,
cryptography,
cryptanalysis,
block cipher,
stream cipher
show example of each4,34 Brute force attack Show number of alternative keys possible for a
given key size. Take small key size eg key size =2
for explanation. Also explain table 2.2 from text
book. Explanation should be very clear using an
animation
5,35 Encryption
techniques
Substitution and transposition technique(explain
clearly the meaning of substitution and
transposition using proper diagrams no need to
enter into types)
Just show using animation how substitution takesplace, do the same for transposition, the animationshould be such, where it asks for cipher to be usedfor each alphabet and then when the input stringinserted, must be able to give the decrypted data,
example at the start of the program one fills A as# and B as ! , now once input taken, what everis typed on screen gets converted into the cipher
8/2/2019 15734_CSE403T Term Paper Topics
2/4
6,36 Ceasar cipher Clear explanation, Take a plaintext and use proper
key show the encryption process step by step using
animation, clearly explain brute force attack on the
same taking example(refer text book) i.e create an
animation to show the Ceaser Cipher at work ( user
input must be taken) , the show using animation
how a brute force attack can crack it open
7,37 Monoalphabetic
cipher
Clear explanation, Take a plaintext and use proper
key show the encryption process step by step using
animation, clearly explain brute force attack on the
same taking example(refer text book) i.e create an
animation to show the Monoalphabetic Cipher at
work ( user input must be taken) , the show using
animation how a brute force/ cryptanalysis attackcan crack it open
8,38 Poly alphabetic
cipher
Explanation, advantage over mono alphabetic
cipher should be illustrated using the animation,
user input taken for both poly and mono and it
should be demonstrated that poly is safer than
mono
9,39 Playfair cipher Clear explanation, use proper animation to explainthe same with text, user input must be taken
10,40 Hill cipher Clear explanation(refer book),use animation, Take a
plaintext and use proper key show the encryption
process step by step using animation
Discuss all the three cases
(i) Plain text and key known, find cipher
(ii) Plain text ad cipher known , find key
(iii)Cipher and key known , find plain text
11,41 Matrix inverse Demonstrate how to find inverse of a matrix, takeuser input, 2X2 martix as well as 3X3 matrix.Show how to get an identity matrix
12,42 Vigenere cipher Refer text book, autokey system,Take a plaintext
and use proper key show the encryption process
8/2/2019 15734_CSE403T Term Paper Topics
3/4
step by step using animation
13,43 One time pad Refer text book, Take a plaintext and use proper
key show the encryption process step by step using
animation
14,44 (i) Diffusion
and
confusio
n
(ii) Expansion
and
contraction
permutation inDES
(i) Explain with proper example
(ii) Explain the exact mechanism for the same
using animation.
(iii)User Input must be taken
15,45 Fiestal cipher Take a plaintext and use proper key show the
encryption process step by step using animation
16,46 Double DES Explanation, meet in the middle attack(with proper
proof), use a plain text , encrypted using a suitable
algo, show how can it be attacked using Double
DES
17,47 Triple DES with
two and three
keys
Compare both, draft an animation on the same,
choose same data set and test what cipher comes
out
18,48 (i) Stream
cipher
(ii)Initializationof state vector
in RC4
(i)Clear explanation, pseudorandom byte generator
(ii) Refer text book(two pseudo codes are given
explain them with proper animation.)
19,49 Stream generation
process in RC4
Refer text book (one pseudo code is given explain it
with animation)
20,50 Random number
generation
Demonstrate the concept, properties of random
number, linear congruential generator with proper
example, an animation of the same is expected
8/2/2019 15734_CSE403T Term Paper Topics
4/4
21,51 RSA algorithm Animation needs to be prepared, where real time
values can be filled and answers sought
22,52 Man in the middleattack in deffie
hellman key
exchange
Refer text book, read and implement, create andanimation, user inputs must be allowed for inputs tothe key exchange algo and then demonstrate theattack
23,53 Public key,
Private key,
Create and animation showing the use of both,choose algorithms, show how data is exchangedusing both form of keys.
24,54 Kerberos version 4 Authentication server,
ticket granting server,ticket,ticket granting ticket,
session key, service granting ticket,Kerberos relms,
demonstrate all
25,55 Modules
Calculation
How to find modules of a fraction number /
negative / positive number take user inputs and
perform
26,56 IP spoofing, Demonstrate the attack using animation and waysto protect against it
27,57 MAC address
spoofing,
Traffic padding
Demonstrate the attack using animation and waysto protect against it
28,58 Phishing attack Demonstrate the attack using animation and ways
to protect against it29,59 Digital signature Demonstrate the working using an animation and
show how are they used to guard against theattacker
30,60 Virus,worm Refer text book, demonstrate how virus attacks a
file/ system , what are the issues and remedial
solution for the same.