CSE403 TP Topic List
CSE403 TP Topic List
No 1,38,75,112,149 2,39,76,113,150 Topic Cryptanalytic attacks Description With the help animations, differentiate between the various types of cryptanalytic attack. Key Exchange Demonstrate the process of key exchange in a secure way between process two communicating parties. Also show how attack is possible on the key and what remedies are suggested. Security services With the help of animation show (i) Authentication (ii) Access control X.800 (iii) Data Confidentiality (iii) Data integrity (iv) Non repudiation Block Cipher Mode Demonstrate the operation of ECB, CBC, OFB, Counter Mode and CFB of operations using animations. A study of key An animation to explain cryptographic Plaintext, terms ciphertext, cryptography, cryptanalysis, block cipher, stream cipher 6,43,80,117 Brute force attack show example of each Show number of alternative keys possible for a given key size. Take small key size eg key size =2 for explanation. Also explain table 2.2 from text book. Explanation should be very clear using an animation Substitution and transposition technique(explain clearly the meaning of substitution and transposition using proper diagrams no need to enter into types) Just show using animation how substitution takes place, do the same for transposition, the animation should be such, where it asks for cipher to be used for each alphabet
3,40,77,114,151
4,41,78,115,152 5,42,79,116,153
7,44,81,118
Encryption techniques
8,45,82,119
Ceasar cipher
and then when the input string inserted, must be able to give the decrypted data, example at the start of the program one fills A as # and B as ! , now once input taken, what ever is typed on screen gets converted into the cipher Clear explanation, Take a plaintext and use proper key show the encryption process step by step using animation, clearly explain brute force attack on the same taking example(refer text book) i.e create an animation to show the Ceaser Cipher at work ( user input must be taken) , the show using animation how a brute force attack can crack it open Clear explanation, Take a plaintext and use proper key show the encryption process step by step using animation, clearly explain brute force attack on the same taking example(refer text book) i.e create an animation to show the Monoalphabetic Cipher at work ( user input must be taken) , the show using animation how a brute force/ cryptanalysis attack can crack it open Explanation, advantage over mono alphabetic cipher should be illustrated using the animation, user input taken for both poly and mono and it should be demonstrated that poly is safer than mono Explanation, advantage over mono alphabetic cipher should be illustrated using the animation, user input taken for both poly and mono and it should be demonstrated that poly is safer than mono
9,46,83,120
Monoalphabetic cipher
10,47,84,121
Vignere Cipher
11,48,85,122
12,49,86,123
Playfair cipher
Clear
explanation,
use
proper
animation to explain the same with text, user input must be taken 13,50,87,124 Hill cipher Clear explanation(refer book),use animation, Take a plaintext and use proper key show the encryption process step by step using animation Discuss all the three cases (i) (ii) (iii) Plain text and key known, find cipher Plain text ad cipher known , find key Cipher and key known , find plain text
14,51,88,125
Demonstrate the process of finding the Multiplicative Inverse of a number. Also use the same for polynomial equations. Refer text book, autokey system,Take a plaintext and use proper key show the encryption process step by step using animation Refer text book, Take a plaintext and use proper key show the encryption process step by step using animation (i) (ii) Explain with proper example Explain the exact mechanism for the same using animation. User Input must be taken
15,52,89,126
16,53,90,127
17,54,91,128
(i)
(iii)
18,55,92,129
Fiestal cipher
Take a plaintext and use proper key show the encryption process step by step using animation Explanation, meet in the middle attack(with proper proof), use a plain text , encrypted using a suitable algo, show how can it be attacked using Double DES Demonstrate the generation of HMAC and CMAC using animations.
19,56,93,130
Double DES
20,57,94,131 21,58,95,132
HMAC, CMAC
Triple DES with Compare both, draft an animation on two and three the same, choose same data set and keys test what cipher comes out (i) Stream cipher (i)Clear explanation, byte generator pseudorandom
22,59,96,133
(ii)Initialization (ii) Refer text book(two pseudo codes of state vector are given explain them with proper in RC4 animation.) 23,60,97,134 Stream generation Refer text book (one pseudo code is process in RC4 given explain it with animation) Random number Demonstrate the concept, properties generation of random number, linear congruential generator with proper example, an animation of the same is expected RSA algorithm Animation needs to be prepared, where real time values can be filled and answers sought
24,61,98,135
25,62,99,136
26,63,100,137
Man in the middle Refer text book, read and implement, attack in deffie create and animation, user inputs hellman key must be allowed for inputs to the key exchange algo and then demonstrate exchange the attack
27,64,101,138
Create and animation showing the use of both, choose algorithms, show how data is exchanged using both form of keys.
28,65,102,139
Algebraic Mathematics
Demonstrate using animations the algebraic structures- Groups, Rings and Fields. How to find modules of a fraction number / negative / positive number take user inputs and perform
29,66,103,140
Modulus Calculation
30,67,104,141
IP spoofing,
31,68,105,142
MAC address Demonstrate the attack using animation and ways to protect against spoofing, it Traffic padding
32,69,106,143 33,70,107,144
Demonstrate the attack using animation and ways to protect against it Demonstrate the working using an animation and show how are they used to guard against the attacker Refer text book, demonstrate how virus attacks a file/ system , what are the issues and remedial solution for the same.
34,71,108,145
Virus,worm
35,72,109,146
Hash functions
36,73,110,147 37,74,111,148
Demonstrate using animations the Requirements for a cryptographic Hash function. Also show how a Birthday attack is possible on a hash value. Elgamal Digital Generate digital signature using Signature Scheme Elgamal scheme. Distribution of Demonstrate using animations all the Public Keys methods of distributing the public keys in public key cryptography.