CSE403T Term Paper Topic11
CSE403T Term Paper Topic11
the number is 4, i.e. show 00,01,10,11 and using 3 bits the number shift is 8 , 000,001,010..and so on Do the same for the left and right shift operation
RK2R20A01, (i)2^n binary numbers RK2R20A31 possible using n bits (ii) Left shift operation and right
RK2R20A0 2, RK2R20A3 2
With the help of animation show (i) Authentication (ii) Access control (iii) Data Confidentiality (iii) Data integrity (iv) Non repudiation
RK2R20A0 3, RK2R20A3 3
Show number of alternative keys possible for a given key size. Take small key size eg key size =2 for explanation. Also make the table for different different key sizes. Explanation should be very clear using an animation Substitution and transposition technique(explain clearly the meaning of substitution and transposition using proper diagrams no need to enter into types) Just show using animation how substitution takes place, do the same for transposition, the animation should be such, where it asks for cipher to be used for each alphabet and then when the input string inserted, must be able to give the decrypted data, example at the start of the program one fills A as # and B as ! , now once input taken, whatever is typed on screen gets converted into the cipher Clear explanation, Take a plaintext and use proper key show the encryption process step by step using animation, clearly explain brute force attack on the same taking example i.e create an animation to show the Ceaser Cipher at work ( user input must be taken) , the show using animation how a brute force attack can crack it open Clear explanation, Take a plaintext and use proper key show the encryption process step by step using animation, clearly explain brute force attack on the same taking example i.e create an animation to show the Monoalphabetic Cipher at work ( user input must be taken) , the show using animation how a brute force/ cryptanalysis attack can crack it open Explanation, advantage over mono alphabetic cipher should be illustrated
Encryption techniques
RK2R20A0 5, RK2R20A3 6
Ceasar cipher
RK2R20A0 6, RK2R20A3 7
Monoalphabetic cipher
RK2R20A0 7, RK2R20A3 8
RK2R20A0 8,
RK2R20A3 9
using the animation, user input taken for both poly and mono and it should be demonstrated that poly is safer than mono Playfair cipher Clear explanation, use proper animation to explain the same with text, user input must be taken
RK2R20A0 9, RK2R20A4 0
Hill cipher
Clear explanation(refer book),use animation, Take a plaintext and use proper key show the encryption process step by step using animation Discuss all the three cases (i) Plain text and key known, find cipher (ii) Plain text ad cipher known , find key
RK2R20A1 0, RK2R20A4 1
Matrix inverse
Demonstrate how to find inverse of a matrix, take user input, 2X2 martix as well as 3X3 matrix. Show how to get an identity matrix Take a plaintext and use proper key show the encryption process step by step using animation Take a plaintext and use proper key show the encryption process step by step using animation (i) Explain with proper example (ii) Explain the exact mechanism for the same using animation.
Vigenere cipher
(i) Diffusion and confusion (ii) Expansion and contraction permutation in DES
(iii)User Input must be taken RK2R20A1 5, RK2R20A4 6 Fiestal cipher Take a plaintext and use proper key show the encryption process step by step using animation Explanation, meet in the middle attack(with proper proof), use a plain text , encrypted using a suitable algo, show how can it be attacked using Double DES Compare both, draft an animation on the same, choose same data set and test what cipher comes out (i)Clear explanation, pseudorandom byte generator
Double DES RK2R20A1 6, RK2R20A4 7 RK2R20A1 7, RK2R20A4 8 RK2R20A1 8, RK2R20A5 0 RK2R20A1 9, RK2R20A5 1 RK2R20A2 0, RK2R20A5 2 RK2R20A2 1, RK2R20A5 3 RK2R20A2 2, RK2R20A5 4 RK2R20A2 3, RK2R20A5 5 RSA algorithm Triple DES with two and three keys
(ii)Initialization of state vector in RC4 (ii) explain with proper animation. Stream generation process in RC4
Demonstrate the concept, properties of random number, linear congruential generator with proper example, an animation of the same is expected Animation needs to be prepared, where real time values can be filled and answers sought
Man in the middle attack in deffie create and animation, user inputs must be allowed for inputs to the key hellman key exchange exchange algo and then demonstrate the attack Public key, Private key, Create and animation showing the use of both, choose algorithms, show how data is exchanged using both form of keys.
Authentication server, ticket granting server,ticket,ticket granting ticket, session key, service granting ticket,Kerberos relms, demonstrate all How to find modules of a fraction number / negative / positive number take user inputs and perform Demonstrate the attack using animation and ways to protect against it Demonstrate the attack using animation and ways to protect against it
MAC address spoofing, RK2R20A2 7 RK2R20A2 8 RK2R20A2 9 RK2R20A3 0 Traffic padding Phishing attack Digital signature Virus, worm
Demonstrate the attack using animation and ways to protect against it Demonstrate the working using an animation and show how are they used to guard against the attacker Demonstrate how virus attacks a file/ system , what are the issues and remedial solution for the same.