0% found this document useful (0 votes)
55 views

CSE403T Term Paper Topic11

Term Papers for CSE403T Roll Number Topic Description are create an animation showing using 2 bits, how the number is 4. Using 3 bits the number shift is 8, 000,001,010 and so on. Show using animation how a brute force attack can crack it open.

Uploaded by

Anish Shah
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
55 views

CSE403T Term Paper Topic11

Term Papers for CSE403T Roll Number Topic Description are create an animation showing using 2 bits, how the number is 4. Using 3 bits the number shift is 8, 000,001,010 and so on. Show using animation how a brute force attack can crack it open.

Uploaded by

Anish Shah
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 5

Term Papers for CSE403T Roll Number Topic Description are Create an animation showing using 2 bits, how

the number is 4, i.e. show 00,01,10,11 and using 3 bits the number shift is 8 , 000,001,010..and so on Do the same for the left and right shift operation

RK2R20A01, (i)2^n binary numbers RK2R20A31 possible using n bits (ii) Left shift operation and right

RK2R20A0 2, RK2R20A3 2

Security services X.800

With the help of animation show (i) Authentication (ii) Access control (iii) Data Confidentiality (iii) Data integrity (iv) Non repudiation

A study of key cryptographic terms

An animation to explain Plaintext, ciphertext, cryptography,

RK2R20A0 3, RK2R20A3 3

cryptanalysis, block cipher, stream cipher show example of each

Brute force attack RK2R20A0 4, RK2R20A3 5

Show number of alternative keys possible for a given key size. Take small key size eg key size =2 for explanation. Also make the table for different different key sizes. Explanation should be very clear using an animation Substitution and transposition technique(explain clearly the meaning of substitution and transposition using proper diagrams no need to enter into types) Just show using animation how substitution takes place, do the same for transposition, the animation should be such, where it asks for cipher to be used for each alphabet and then when the input string inserted, must be able to give the decrypted data, example at the start of the program one fills A as # and B as ! , now once input taken, whatever is typed on screen gets converted into the cipher Clear explanation, Take a plaintext and use proper key show the encryption process step by step using animation, clearly explain brute force attack on the same taking example i.e create an animation to show the Ceaser Cipher at work ( user input must be taken) , the show using animation how a brute force attack can crack it open Clear explanation, Take a plaintext and use proper key show the encryption process step by step using animation, clearly explain brute force attack on the same taking example i.e create an animation to show the Monoalphabetic Cipher at work ( user input must be taken) , the show using animation how a brute force/ cryptanalysis attack can crack it open Explanation, advantage over mono alphabetic cipher should be illustrated

Encryption techniques

RK2R20A0 5, RK2R20A3 6

Ceasar cipher

RK2R20A0 6, RK2R20A3 7

Monoalphabetic cipher

RK2R20A0 7, RK2R20A3 8

RK2R20A0 8,

Poly alphabetic cipher

RK2R20A3 9

using the animation, user input taken for both poly and mono and it should be demonstrated that poly is safer than mono Playfair cipher Clear explanation, use proper animation to explain the same with text, user input must be taken

RK2R20A0 9, RK2R20A4 0

Hill cipher

Clear explanation(refer book),use animation, Take a plaintext and use proper key show the encryption process step by step using animation Discuss all the three cases (i) Plain text and key known, find cipher (ii) Plain text ad cipher known , find key

RK2R20A1 0, RK2R20A4 1

(iii)Cipher and key known , find plain text

RK2R20A1 1, RK2R20A4 2 RK2R20A1 2, RK2R20A4 3 RK2R20A1 3, RK2R20A4 4 RK2R20A1 4, RK2R20A4 5

Matrix inverse

Demonstrate how to find inverse of a matrix, take user input, 2X2 martix as well as 3X3 matrix. Show how to get an identity matrix Take a plaintext and use proper key show the encryption process step by step using animation Take a plaintext and use proper key show the encryption process step by step using animation (i) Explain with proper example (ii) Explain the exact mechanism for the same using animation.

Vigenere cipher

One time pad

(i) Diffusion and confusion (ii) Expansion and contraction permutation in DES

(iii)User Input must be taken RK2R20A1 5, RK2R20A4 6 Fiestal cipher Take a plaintext and use proper key show the encryption process step by step using animation Explanation, meet in the middle attack(with proper proof), use a plain text , encrypted using a suitable algo, show how can it be attacked using Double DES Compare both, draft an animation on the same, choose same data set and test what cipher comes out (i)Clear explanation, pseudorandom byte generator

Double DES RK2R20A1 6, RK2R20A4 7 RK2R20A1 7, RK2R20A4 8 RK2R20A1 8, RK2R20A5 0 RK2R20A1 9, RK2R20A5 1 RK2R20A2 0, RK2R20A5 2 RK2R20A2 1, RK2R20A5 3 RK2R20A2 2, RK2R20A5 4 RK2R20A2 3, RK2R20A5 5 RSA algorithm Triple DES with two and three keys

(i) Stream cipher

(ii)Initialization of state vector in RC4 (ii) explain with proper animation. Stream generation process in RC4

explain it with animation (Phases of RC4 Algorithm)

Random number generation

Demonstrate the concept, properties of random number, linear congruential generator with proper example, an animation of the same is expected Animation needs to be prepared, where real time values can be filled and answers sought

Man in the middle attack in deffie create and animation, user inputs must be allowed for inputs to the key hellman key exchange exchange algo and then demonstrate the attack Public key, Private key, Create and animation showing the use of both, choose algorithms, show how data is exchanged using both form of keys.

Kerberos version 4 RK2R20A2 4, RK2R20A5 6 Modules Calculation RK2R20A2 5 RK2R20A2 6 IP spoofing,

Authentication server, ticket granting server,ticket,ticket granting ticket, session key, service granting ticket,Kerberos relms, demonstrate all How to find modules of a fraction number / negative / positive number take user inputs and perform Demonstrate the attack using animation and ways to protect against it Demonstrate the attack using animation and ways to protect against it

MAC address spoofing, RK2R20A2 7 RK2R20A2 8 RK2R20A2 9 RK2R20A3 0 Traffic padding Phishing attack Digital signature Virus, worm

Demonstrate the attack using animation and ways to protect against it Demonstrate the working using an animation and show how are they used to guard against the attacker Demonstrate how virus attacks a file/ system , what are the issues and remedial solution for the same.

You might also like