Prepared by: Dr Nandini Sidnal XXXXXXXXXXModerated by: Dr Ghassan Kbar Oct, 2018 Assessment Details and Submission Guidelines Unit Code MN404 – T1 2020 Unit Title Fundamentals of Operating Systems and...

need to explain everything in brief with references and screen shot as mentioned in word file I provided in a managed manner So i can submit it


Prepared by: Dr Nandini Sidnal Moderated by: Dr Ghassan Kbar Oct, 2018 Assessment Details and Submission Guidelines Unit Code MN404 – T1 2020 Unit Title Fundamentals of Operating Systems and Programming Assessment Type Individual Assignment Assessment Title End to End Encryption – What’s App Purpose of the assessment (with ULO Mapping) This assignment assesses the following Unit Learning Outcomes; students should be able to demonstrate their achievements in them: a. Describe the role of Operating Systems (OS) and its different subsystems in controlling computer hardware b. Demonstrate competency in the use of a command line interface to operate and perform simple OS administration c. Apply principles of abstraction and problem solving in an object-oriented programming language d. Apply knowledge of programming constructs in developing computer programs e. Create programs based on incremental development processes of designing, coding, testing and debugging. Weight 30% of the total assessments Total Marks 60 marks Due Date Week 10 laboratory class – To submit the video presentation of the algorithm. Week 11 laboratory class – To submit video of the program Demonstration along with the document Submission Guidelines • All work must be submitted on Moodle by the due date along with a title Page. • The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2.54 cm margins on all four sides of your page with appropriate section headings. • Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style. Extension • If an extension of time to submit work is required, a Special Consideration Application must be submitted directly through AMS. You must submit this application within three working days of the assessment due date. Further information is available at: http://www.mit.edu.au/about-mit/institute-publications/policies-procedures- and-guidelines/specialconsiderationdeferment Academic Misconduct • Academic Misconduct is a serious offence. Depending on the seriousness of the case, penalties can vary from a written warning or zero marks to exclusion from the course or rescinding the degree. Students should make themselves familiar with the full policy and procedure available at: http://www.mit.edu.au/about- mit/institute-publications/policies-procedures-and-guidelines/Plagiarism- Academic-Misconduct-Policy-Procedure. For further information, please refer to the Academic Integrity Section in your Unit Description. http://www.mit.edu.au/about http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure MN404 Fundamentals of Operating Systems and Programming Page 2 of 6 Prepared by: Dr Nandini Sidnal Moderated by: Dr Ajay Sharma May, 2020 Academic Integrity: For assignments, students are encouraged to consult each other, the lecturer, tutor or anyone else for that matter. However, the assistance offered or accepted should not go beyond a discussion of the problem and a sketch of a solution. But in your assignment, do not use any written material from the discussion/website/book. If you can reconstruct the discussion and complete the solution on your own, then you have learned the material (and that is the objective of this course!). Assignment 2 Specification With the development of this application and the course, it gives the students a help to understand the value of encryption and decryption in the technical elements. Actually, it gives learning to, how web application uses encryption and their need to implement it. The assignment enables the student not only to learn the concept and importance of End to End encryption but also to implement it for real-time communications. It enables the students to apply principles of abstraction and problem solving in an object-oriented programming language Further it empowers the students to apply knowledge of programming constructs in developing end to end encryption and decryption for real time communications. Assignment description: End-to-end encryption is a system of communication where the only people who can read the messages are the people communicating. No eavesdropper can access the cryptographic keys needed to decrypt the conversation—not even a company that runs the messaging service. End-to-end encryption transforms messages into unintelligible chunks of data as soon as a user presses send. From there, the message isn't reconstituted into something understandable until it reaches the receiver's device. For example, the chats using WhatsApp communications are not stored in plaintext on WhatsApp’s servers. Nor is the company able to decrypt users’ messages to access them since it does not hold the encryption keys. So, WhatsApp will be unable to be compelled to hand over messaging data — even if served with a warrant by authorities demanding access. Thus, providing safe communications. In this assignment the students shall code programs for encryption and decryption based on incremental development processes of designing, coding, testing and debugging. This assignment involves the following tasks: 1) To Design and develop an algorithm or a detailed flow chart to encrypt and decrypt the messages that are being communicated. a) The message shall constitute all the printable characters on the keyboard. b) Any encryption algorithm such as substitution, reverse cipher etc. may be used by the students. 2) To convert the algorithm to a python program and test for various cases. 3) Analyse and report the performance of the code written in terms of time taken to encrypt and decrypt and for the accuracy of the message communicated. 4) A GUI (optional) may be designed to feed in and display the encrypted and decrypted messages. MN404 Fundamentals of Operating Systems and Programming Page 3 of 6 Prepared by: Dr Nandini Sidnal Moderated by: Dr Ajay Sharma May, 2020 5) The program has to display the encrypted messages along with the time to encrypt and decrypt the messages. 6) The program should show the successful encryption and decryption for at least ten (10) messages being communicated. The assignment report has to include the following sections: • User Requirements: o Include all the user (assignment) requirements here. o For example: the input message, key to encrypt, encryption method, time required for encryption and decryption, encrypted msg to be displayed etc. • Analysis Analysis often requires the programmer to learn some things about the problem domain and that information the user will have to provide. Also, it should specify what the program is going to do. In this case the problem domain would be the logic used to encrypt and decrypt as per the algorithm. The user shall provide the messages to be communicated. • Design: The design phase has to describe how the program is going to do the desired task. This usually involves writing an algorithm or a flow chart in fact, algorithms are more often written in a somewhat stylized version of English called pseudocode. Although there are no precise rules governing the syntax of pseudocode, in your pseudocode you should strive to describe the essential elements of the program in a clear and concise manner. Note that this pseudocode closely resembles Python code, so the transition to the coding step should be straightforward. This phase has to be completed and recorded in a form of 4-5 min video explaining the logic of the algorithm and has to be uploaded by week 10. • Implementation Phase: In this phase the complete code in python without any syntax and semantic errors must be completed. The complete code with proper indentation has to be pasted here along with sample inputs and outputs. • Testing: Only thorough testing can build confidence that a program is working correctly. Testing is a deliberate process that requires some planning and discipline on the programmer’s part. It would be much easier to turn the program in after the first successful run to meet a deadline or to move on to the next assignment. But your grade, your job, or people’s lives might be affected by the slipshod testing of software. Once all the errors are debugged, set of all possible inputs are to be provided. Even though the range of the input numbers on a computer is finite, testing all of the possible combinations of inputs would be impractical. So, the challenge is to find a smaller set of inputs, called a test suite, from which we can conclude that the program will likely be correct for all inputs. The number and type of input samples have to cover all possible cases of validity checks of encryption and decryption. MN404 Fundamentals of Operating Systems and Programming Page 4 of 6 Prepared by: Dr Nandini Sidnal Moderated by: Dr Ajay Sharma May, 2020 In summary: The program has to perform the following: • Read the text to be communicated along with date of birth that could be used as a key to encrypt and decrypt the messages. Add all digits of your date of birth to compute the distance to be used for encryption and decryption. • Display both the encrypted and decrypted text messages. Submission Guidelines: Your assignment should be completed according to the General Guidelines for Presentation of academic work. Your submission should contain the following: The assignment Word file that will be submitted shall include: a) Links to 2 videos to be included in the word document along with following details: i) Video 1 – 3 min explaining the logic used in the algorithm to encrypt and decrypt and key generation. ii) Video 2- 4 min demonstration of the program along with demonstration of various test cases of the program b) Algorithm/flow chart c) Complete program in Python without syntax errors (cut and paste the complete code). d) Must include appropriate and sufficient comments in the source code
May 27, 2021
SOLUTION.PDF

Get Answer To This Question

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here