0% found this document useful (0 votes)
134 views

CSE403 TP Topic List

The document provides descriptions for 138 term paper topics on cryptography and cybersecurity. The topics include explaining various cryptographic techniques like cryptanalysis, key exchange, encryption modes, Caesar cipher, monoalphabetic cipher, Vigenere cipher through animations. Other topics involve demonstrating security services, hash functions, digital signatures, attacks like brute force, man-in-the-middle, spoofing and ways to protect against them. The document asks to create clear animations and explanations for the techniques and include user inputs where needed.

Uploaded by

Shubham Uv
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
134 views

CSE403 TP Topic List

The document provides descriptions for 138 term paper topics on cryptography and cybersecurity. The topics include explaining various cryptographic techniques like cryptanalysis, key exchange, encryption modes, Caesar cipher, monoalphabetic cipher, Vigenere cipher through animations. Other topics involve demonstrating security services, hash functions, digital signatures, attacks like brute force, man-in-the-middle, spoofing and ways to protect against them. The document asks to create clear animations and explanations for the techniques and include user inputs where needed.

Uploaded by

Shubham Uv
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 5

Term Papers for CSE506 Sr.

No 1,38,75,112,149 2,39,76,113,150 Topic Cryptanalytic attacks Description With the help animations, differentiate between the various types of cryptanalytic attack. Key Exchange Demonstrate the process of key exchange in a secure way between process two communicating parties. Also show how attack is possible on the key and what remedies are suggested. Security services With the help of animation show (i) Authentication (ii) Access control X.800 (iii) Data Confidentiality (iii) Data integrity (iv) Non repudiation Block Cipher Mode Demonstrate the operation of ECB, CBC, OFB, Counter Mode and CFB of operations using animations. A study of key An animation to explain cryptographic Plaintext, terms ciphertext, cryptography, cryptanalysis, block cipher, stream cipher 6,43,80,117 Brute force attack show example of each Show number of alternative keys possible for a given key size. Take small key size eg key size =2 for explanation. Also explain table 2.2 from text book. Explanation should be very clear using an animation Substitution and transposition technique(explain clearly the meaning of substitution and transposition using proper diagrams no need to enter into types) Just show using animation how substitution takes place, do the same for transposition, the animation should be such, where it asks for cipher to be used for each alphabet

3,40,77,114,151

4,41,78,115,152 5,42,79,116,153

7,44,81,118

Encryption techniques

8,45,82,119

Ceasar cipher

and then when the input string inserted, must be able to give the decrypted data, example at the start of the program one fills A as # and B as ! , now once input taken, what ever is typed on screen gets converted into the cipher Clear explanation, Take a plaintext and use proper key show the encryption process step by step using animation, clearly explain brute force attack on the same taking example(refer text book) i.e create an animation to show the Ceaser Cipher at work ( user input must be taken) , the show using animation how a brute force attack can crack it open Clear explanation, Take a plaintext and use proper key show the encryption process step by step using animation, clearly explain brute force attack on the same taking example(refer text book) i.e create an animation to show the Monoalphabetic Cipher at work ( user input must be taken) , the show using animation how a brute force/ cryptanalysis attack can crack it open Explanation, advantage over mono alphabetic cipher should be illustrated using the animation, user input taken for both poly and mono and it should be demonstrated that poly is safer than mono Explanation, advantage over mono alphabetic cipher should be illustrated using the animation, user input taken for both poly and mono and it should be demonstrated that poly is safer than mono

9,46,83,120

Monoalphabetic cipher

10,47,84,121

Vignere Cipher

11,48,85,122

Auto- Key Cipher

12,49,86,123

Playfair cipher

Clear

explanation,

use

proper

animation to explain the same with text, user input must be taken 13,50,87,124 Hill cipher Clear explanation(refer book),use animation, Take a plaintext and use proper key show the encryption process step by step using animation Discuss all the three cases (i) (ii) (iii) Plain text and key known, find cipher Plain text ad cipher known , find key Cipher and key known , find plain text

14,51,88,125

Extended Euclidean Algorithm Vigenere cipher

Demonstrate the process of finding the Multiplicative Inverse of a number. Also use the same for polynomial equations. Refer text book, autokey system,Take a plaintext and use proper key show the encryption process step by step using animation Refer text book, Take a plaintext and use proper key show the encryption process step by step using animation (i) (ii) Explain with proper example Explain the exact mechanism for the same using animation. User Input must be taken

15,52,89,126

16,53,90,127

One time pad

17,54,91,128

(i)

Diffusion and confusio n

(ii) Expansion and contraction permutation in DES

(iii)

18,55,92,129

Fiestal cipher

Take a plaintext and use proper key show the encryption process step by step using animation Explanation, meet in the middle attack(with proper proof), use a plain text , encrypted using a suitable algo, show how can it be attacked using Double DES Demonstrate the generation of HMAC and CMAC using animations.

19,56,93,130

Double DES

20,57,94,131 21,58,95,132

HMAC, CMAC

Triple DES with Compare both, draft an animation on two and three the same, choose same data set and keys test what cipher comes out (i) Stream cipher (i)Clear explanation, byte generator pseudorandom

22,59,96,133

(ii)Initialization (ii) Refer text book(two pseudo codes of state vector are given explain them with proper in RC4 animation.) 23,60,97,134 Stream generation Refer text book (one pseudo code is process in RC4 given explain it with animation) Random number Demonstrate the concept, properties generation of random number, linear congruential generator with proper example, an animation of the same is expected RSA algorithm Animation needs to be prepared, where real time values can be filled and answers sought

24,61,98,135

25,62,99,136

26,63,100,137

Man in the middle Refer text book, read and implement, attack in deffie create and animation, user inputs hellman key must be allowed for inputs to the key exchange algo and then demonstrate exchange the attack

27,64,101,138

Public key, Private key,

Create and animation showing the use of both, choose algorithms, show how data is exchanged using both form of keys.

28,65,102,139

Algebraic Mathematics

Demonstrate using animations the algebraic structures- Groups, Rings and Fields. How to find modules of a fraction number / negative / positive number take user inputs and perform

29,66,103,140

Modulus Calculation

30,67,104,141

IP spoofing,

Demonstrate the attack using animation and ways to protect against it

31,68,105,142

MAC address Demonstrate the attack using animation and ways to protect against spoofing, it Traffic padding

32,69,106,143 33,70,107,144

Phishing attack Digital signature

Demonstrate the attack using animation and ways to protect against it Demonstrate the working using an animation and show how are they used to guard against the attacker Refer text book, demonstrate how virus attacks a file/ system , what are the issues and remedial solution for the same.

34,71,108,145

Virus,worm

35,72,109,146

Hash functions

36,73,110,147 37,74,111,148

Demonstrate using animations the Requirements for a cryptographic Hash function. Also show how a Birthday attack is possible on a hash value. Elgamal Digital Generate digital signature using Signature Scheme Elgamal scheme. Distribution of Demonstrate using animations all the Public Keys methods of distributing the public keys in public key cryptography.

You might also like