Subject Outline ITC595 - Information Security Assessment item 3 - Research Project - Designing Cryptographic system Value: 20% Due Date: 18-May-2020 Return Date: 10-Jun- 2020 Length: 15-20 pages...

Can you make it for me?


Subject Outline ITC595 - Information Security Assessment item 3 - Research Project - Designing Cryptographic system Value: 20% Due Date: 18-May-2020 Return Date: 10-Jun- 2020 Length: 15-20 pages Submission method options: Alternative submission method TASK You have been asked to develop a data transfer system from Port Macquarie to Wagga Wagga Campus. In this task, your job is to ensure that stream data is protected. In order to ensure that your system operates in a secure manner, you need to develop a prototype of your system in CryptoTool 2. CrypTool 2 (CT2) is an open-source program offering an innovative visual programming GUI to experiment with cryptographic procedures and to animate their cascades. You can download CT2 at https://www.cryptool.org/en/cryptool2 . You can also watch Short Introduction to CrypTool 2 at https://www.youtube.com/channel/ UC8_FqvQWJfZYxcSoEJ5ob-Q. Task 1: In this task, you are required to: (5 Marks) 1. Search RSA (Rivest – Shamir – Adleman) and AES (Advanced Encryption Standard) algorithms suitable for the above scenario, keep in mind that you can expand your system to more than one user, 2. Select a cryptographic algorithm and discuss why you think your selected algorithm is appropriate for the above scenario, 3. Design and develop a cryptographic system to encrypt live webcam data from Port Macquarie to Wagga Wagga using your chosen algorithm, 4. Discuss the strengths and weaknesses of your system, 5. You must document your approach with a description of the screenshots. Task 2: In this task, you are required to: (15 Marks) https://www.cryptool.org/en/cryptool2 https://www.cryptool.org/en/cryptool2 https://www.youtube.com/channel/UC8_FqvQWJfZYxcSoEJ5ob-Q https://www.youtube.com/channel/UC8_FqvQWJfZYxcSoEJ5ob-Q 1. Search HMAC, 1. Part 1: Design and develop a message-based system to encrypt and decrypt messages using an RSA algorithm, 2. Part 2: On the basis of Part 1 system, you should integrate the HMAC algorithm into your system, 1. The HMAC has to check message received from Port Macquarie, 2. If the integrity of the message approved, then decrypt the message, 3. Else, a message, or false Boolean output. 3. Discuss the strengths and weaknesses of your system, 4. You must document your approach with a description of the screenshots. RATIONALE This assessment task will assess the following learning outcome/s: • be able to justify security goals and the importance of maintaining the secure computing environment against digital threats. • be able to explain the fundamental concepts of cryptographic algorithms. MARKING CRITERIA AND STANDARDS Criteria High Distinction (100% - 85% ) Distinction (84% - 75%) Credit (74% - 65%) Pass (64% - 50%) Fail (49% - 0%) Max Grad e PART 1 Select a cryptographic algorithm (5 Marks) Select a cryptographic algorithm and discuss why the selected algorithm is appropriate for the above scenario. A highly suitable and efficient algorithm is selected and clear arguments are strongly supported with well- reasoned and concise discussion of logical and compelling evidence of why the algorithm was selected. A suitable and generally efficient algorithm is selected and clear arguments are supported with well- reasoned discussion of logical and strong evidence of why the algorithm was selected. A suitable algorithm is selected and mostly clear arguments are supported with reasoned discussion of generally logical evidence of why the algorithm was selected. A generally suitable algorithm is selected and most arguments are supported though some connections are tenuous, with discussion or explanation of evidence of why the algorithm was selected. unsuitable algorithm is selected and most arguments are not supported with discussion or explanation of evidence of why the algorithm was selected. 1 Criteria High Distinction (100% - 85% ) Distinction (84% - 75%) Credit (74% - 65%) Pass (64% - 50%) Fail (49% - 0%) Max Grad e Design and develop a cryptographic system to encrypt live webcam data from Port Macquarie to Wagga Wagga using the chosen algorithm Designed and developed an efficient and smoothly working cryptographic system. The system shows some originality in thought. The design is logically organised and easy to follow Designed and developed a smoothing working cryptograp hic system. The design is generally logically organised and easy to follow. Designed and developed a working cryptographi c system with some minor flaws that detract from its efficient or smooth operation. The design is organised and fairly easy to follow. Designed and developed a cryptographic system that mostly works and has some minor flaws that detract from its smooth and efficient running. The design is mostly organised and in sections fairly easy to follow. cryptograph ic system designed and developed does not work and has major flaws. The code is poorly organised and very difficult to follow. 2 Discuss the strengths and weaknesses of the system In the discussion thoroughly evaluates the strengths and weaknesses of the system showing insight and the ability to accurately, clearly and concisely articulate and apply the theory. In the discussion generally thoroughly evaluates the strengths and weaknesses of the system showing the ability to accurately and In the discussion explains many of the strengths and weaknesses of the system showing the ability, in general, to clearly In the discussion describes many of the strengths and weaknesses of the system showing the ability, in general, to clearly articulate and apply some discussion may only superficially describe or outline some of the strengths and weaknesses of the system. 1 Criteria High Distinction (100% - 85% ) Distinction (84% - 75%) Credit (74% - 65%) Pass (64% - 50%) Fail (49% - 0%) Max Grad e clearly articulate and apply theory. articulate and apply theory. There may be minor errors and/or omissions in content or application. theory. There are minor errors and omissions in content and application. major errors and omissions in the content and/or application and articulation is generally unclear. Document the approach with a description and screenshots. Documented all of the approaches with concise and highly meaningful descriptions of the screenshots. Documented all of the approach with suitably meaningful descriptions of the screenshots. Documented most of the approach with suitable descriptions of the screenshots. Documented most of the approach with generally suitable descriptions of the screenshots. document most of the approach with generally suitable description s of the screenshot s. 1 PART 2 Design and develop a message-based system (15 Marks) Criteria High Distinction (100% - 85% ) Distinction (84% - 75%) Credit (74% - 65%) Pass (64% - 50%) Fail (49% - 0%) Max Grad e Search HMAC and Design and develop a message-based system to encrypt and decrypt messages using an RSA algorithm Designed and developed an efficient and smoothly working message-based system. The system shows some originality or innovation in thought. The design is logically organised and easy to follow. Designed and developed a smoothing working message- based system. Designed and developed a working message- based system with some minor flaws that detract from its efficient or smooth operation. Designed and developed a message- based system that mostly works and has some minor flaws that detract from its smooth and efficient running. based system does not work and has major flaws. 6 Part 2: On the basis of Part 1 system, you should integrate the HMAC algorithm into your system, 1. The HMAC has to check message received from Port Macquarie, 2. If the integrity of the message approved, then decrypt the message, Successful and thoughtful integration of the HMAC algorithm that does not detract from the smooth and efficient working of the system and achieves all the requirements listed. Successful integration of the HMAC algorithm that does not detract from the working of the system and achieves all the requirements listed. Integration of the HMAC algorithm that does not detract from the working of the system and achieves most of the requirements listed. Partially successful integration of the HMAC algorithm that generally achieves most of the requirements listed. ul integration of the HMAC algorithm that generally does not achieve most of the requiremen ts listed. 7 Criteria High
May 10, 2021ITC595Charles Sturt University
SOLUTION.PDF

Get Answer To This Question

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here