Category | Assignment | Subject | Computer Science |
---|---|---|---|
University | University of Essex | Module Title | CE708 Computer Security |
Academic Year | 2024-25 |
---|
This assignment comprises the following three exercises.
Exercise 1: Write a Python program that reads a message from the user and generates its SHA-256 hash. Further, generates its MD5 hash and compares both hashes and explains the difference in output size and security properties in your report.
Exercise 2: Write a Python program that generates RSA keys (public and private) and encrypts a plaintext message using the public key. Then, decrypt the ciphertext using the private key and print the keys, ciphertext, and decrypted text.
Exercise 3: Write a Python program that simulates Diffie-Hellman Key Exchange, in which both parties agree on a prime p and base g. Each party selects a private key and computes the public key. Then, exchange public keys and compute the shared secret. Print all values and verify that both parties compute the same shared secret.
Challenge: Create a program that signs a message using the RSA private key (Digital Signature) and verifies the signature using the RSA public key. Then compute an HMAC (SHA-256) for the same message using a secret key. Finally, explain in the report why Digital Signatures and MACs serve different purposes.
You should submit a single zip file containing all the above programs and explanations. If you submit a file in any other format, you will lose 10% of the marks for this assignment.
1. Source code (.py) 2.
2. Minimum 3-minute Video demonstration: using a screen recorder, record a video from your source code and explain how you have written the code. Then, run the code and explain how it works.
3. Lastly, provide a critical analysis of the technique and explain how to improve your code.
40% percent of the marks will go to the video demonstrations and 60% of the marks will go to your code and report. If your code is submitted with compilation errors, you will automatically lose these marks.
Marking Criteria |
Marks |
Video presentation for ex 1 (Exercise 1) and executable file |
20 |
Video presentation for ex 2 (Exercise 2) and executable file |
20 |
Video presentation for ex 3 (Exercise 3) and executable file |
20 |
Video presentation for challenge (challenge) and executable file |
20 |
Report writing regarding the whole assignment |
20 |
Total |
100 |
Submit Your Assignment Questions & Get Plagiarism Free Answers
Order Non-Plagiarized AssignmentIf you are stressed about the assignment on CE708 Computer Security, then there is no need to worry now! Whether you need Computer Security Assignment Help or Marketing Assignment Help, you will get expert guidance and help on report writing services, which will make your concepts strong. We also provide you with free assignment solutions that will help you understand. And the best part? All the content is 100% original, written by PhD expert writers, and is well-researched, so that you get the best quality. So don't delay now, boost your grades with our help!
Let's Book Your Work with Our Expert and Get High-Quality Content