| Category | Assignment | Subject | Computer Science |
|---|---|---|---|
| University | University of Essex (UOE) | Module Title | CE708 Computer Security |
Credit: 10% of the total module mark
Deadline: 14th November 2025
Submission: via FASER
This assignment consists of three advanced exercises to assess your understanding of cryptographic algorithms, cryptanalysis, and data integrity mechanisms. You must implement Python programs, conduct experiments and analyses, and provide a brief critical discussion for each exercise. Your work should demonstrate correct implementation of algorithms, insightful cryptanalysis or attack simulations, and thorough critical reflection on the strengths, weaknesses, and real-world implications.
Objective: To implement and break a classical encryption system, demonstrating an understanding of substitution-based ciphers and cryptanalytic reasoning.
Challenge: Create an automated key recovery algorithm that ranks likely keys and plain texts based on frequency scoring.
Critical Reflection: Discuss why classical ciphers are vulnerable to statistical attacks. How do Shannon's principles of confusion and diffusion address these weaknesses in modern designs? Explain how this exercise contributes to understanding the cryptanalytic reasoning used in breaking early ciphers.
Objective: To implement, evaluate, and compare modern symmetric encryption algorithms in terms of security and performance.
Challenge: Conduct a key sensitivity experiment: encrypt a plaintext using a key, flip one bit in the key, and measure how many bits change in the ciphertext (avalanche effect).
Critical Reflection: Compare the structures, key sizes, and cryptographic strength of AES and DES. Explain why DES is considered deprecated and how AES improves resistance against brute-force and differential attacks. Reflect on the performance-security trade-offs in constrained environments such as IoT or embedded devices.
Objective: To explore cryptographic integrity and authentication mechanisms, emphasizing hash security properties and MAC verification.
Challenge: Simulate a partial hash collision experiment: generate multiple random inputs, identify any two with the same prefix (e.g., first 16 bits), and compare observed vs. theoretical collision probability (birthday paradox).
Critical Reflection: Discuss hash function security properties (preimage, second preimage, and collision resistance). Explain how HMAC mitigates extension attacks and strengthens message integrity. Evaluate the real-world implications of MD5 and SHA-1 vulnerabilities. Reflect on how hashing and MACs support secure systems such as TLS, file verification, and digital authentication.
Submit a single .zip file containing:
Total: 100 Marks
Assessment Notes
Code that does not execute receives zero marks for that component. Submit only as a .zip file; other formats incur a 10% penalty. Later submissions follow University policy.
Buy Custom Answer Of CE708 Assignment 1 & Raise Your Grades
Get A Free QuoteDo you need help on a CE708 Computer Security Assignment 1? Then no need to worry! Our team of experts provides the best assignment help designed for students. We are here to assist you 24/7. We provide the Computer Security Assignment Help And We will deliver your assignment before the deadline with well-researched results. We also provide free assignment samples written by PhD expert writers. Contact us now and boost your academic grades!
Let's Book Your Work with Our Expert and Get High-Quality Content