15812_cse403t term paper topic11

Upload: anish-shah

Post on 04-Apr-2018

216 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/30/2019 15812_CSE403T Term Paper Topic11

    1/5

    Term Papers for CSE403T

    Roll

    Number

    Topic Description

    RK2R20A01,RK2R20A31

    (i)2^n binary numbers are

    possible using n bits

    (ii) Left shift and right shift

    operation

    Create an animation showing using 2bits, how the number is 4, i.e. show00,01,10,11 and using 3 bits the numberis 8 , 000,001,010..and so onDo the same for the left and right shiftoperation

    RK2R20A02,RK2R20A32

    Security services X.800 With the help of animation show(i) Authentication (ii) Access control (iii)

    Data Confidentiality (iii) Data integrity

    (iv) Non repudiation

    RK2R20A03,RK2R20A33

    A study of key cryptographic terms An animation to explainPlaintext,

    ciphertext,

    cryptography,

    cryptanalysis,

    block cipher,

    stream cipher

    show example of each

  • 7/30/2019 15812_CSE403T Term Paper Topic11

    2/5

    RK2R20A04,RK2R20A35

    Brute force attack Show number of alternative keys possible

    for a given key size. Take small key size

    eg key size =2 for explanation. Also

    make the table for different different

    key sizes. Explanation should be very

    clear using an animation

    RK2R20A05,RK2R20A36

    Encryption techniques Substitution and transposition

    technique(explain clearly the meaning of

    substitution and transposition using

    proper diagrams no need to enter into

    types)

    Just show using animation howsubstitution takes place, do the same for

    transposition, the animation should besuch, where it asks for cipher to be usedfor each alphabet and then when theinput string inserted, must be able togive the decrypted data, example at thestart of the program one fills A as # andB as ! , now once input taken,whatever is typed on screen getsconverted into the cipher

    RK2R20A06,RK2R20A37

    Ceasar cipher Clear explanation, Take a plaintext and

    use proper key show the encryption

    process step by step using animation,clearly explain brute force attack on the

    same taking example i.e create an

    animation to show the Ceaser Cipher at

    work ( user input must be taken) , the

    show using animation how a brute force

    attack can crack it open

    RK2R20A07,RK2R20A38

    Monoalphabetic cipher Clear explanation, Take a plaintext and

    use proper key show the encryption

    process step by step using animation,

    clearly explain brute force attack on the

    same taking example i.e create an

    animation to show the Monoalphabetic

    Cipher at work ( user input must be

    taken) , the show using animation how a

    brute force/ cryptanalysis attack can

    crack it open

    RK2R20A08,

    Poly alphabetic cipher Explanation, advantage over monoalphabetic cipher should be illustrated

  • 7/30/2019 15812_CSE403T Term Paper Topic11

    3/5

    RK2R20A39

    using the animation, user input taken for

    both poly and mono and it should be

    demonstrated that poly is safer than

    mono

    RK2R20A09,RK2R20A40

    Playfair cipher Clear explanation, use proper animation

    to explain the same with text, user input

    must be taken

    RK2R20A10,RK2R20A4

    1

    Hill cipher Clear explanation(refer book),use

    animation, Take a plaintext and use

    proper key show the encryption process

    step by step using animation

    Discuss all the three cases

    (i) Plain text and key known, find

    cipher

    (ii) Plain text ad cipher known , find

    key

    (iii)Cipher and key known , find plain

    text

    RK2R20A1

    1,

    RK2R20A4

    2

    Matrix inverse Demonstrate how to find inverse of amatrix, take user input, 2X2 martix aswell as 3X3 matrix.Show how to get an identity matrix

    RK2R20A1

    2,

    RK2R20A43

    Vigenere cipher Take a plaintext and use proper key

    show the encryption process step by step

    using animation

    RK2R20A1

    3,

    RK2R20A4

    4

    One time pad Take a plaintext and use proper key

    show the encryption process step by step

    using animation

    RK2R20A1

    4,

    RK2R20A4

    5

    (i) Diffusion and confusion

    (ii) Expansion and contraction

    permutation in DES

    (i) Explain with proper example

    (ii) Explain the exact mechanism for

    the same using animation.

  • 7/30/2019 15812_CSE403T Term Paper Topic11

    4/5

    (iii)User Input must be taken

    RK2R20A1

    5,

    RK2R20A46

    Fiestal cipher Take a plaintext and use proper key

    show the encryption process step by step

    using animation

    RK2R20A1

    6,

    RK2R20A4

    7

    Double DES Explanation, meet in the middle

    attack(with proper proof), use a plain

    text , encrypted using a suitable algo,

    show how can it be attacked using

    Double DES

    RK2R20A1

    7,RK2R20A4

    8

    Triple DES with two and three keys Compare both, draft an animation on the

    same, choose same data set and testwhat cipher comes out

    RK2R20A1

    8,

    RK2R20A5

    0

    (i) Stream cipher

    (ii)Initialization of state vector

    in RC4

    (i)Clear explanation, pseudorandom byte

    generator

    (ii) explain with proper animation.

    RK2R20A1

    9,RK2R20A5

    1

    Stream generation process in RC4 explain it with animation (Phases of RC4

    Algorithm)

    RK2R20A2

    0,

    RK2R20A5

    2

    Random number generation Demonstrate the concept, properties of

    random number, linear congruential

    generator with proper example, an

    animation of the same is expected

    RK2R20A2

    1,RK2R20A5

    3

    RSA algorithm Animation needs to be prepared, where

    real time values can be filled andanswers sought

    RK2R20A2

    2,

    RK2R20A5

    4

    Man in the middle attack in deffie

    hellman key exchange

    create and animation, user inputs mustbe allowed for inputs to the keyexchange algo and then demonstrate theattack

    RK2R20A2

    3,

    RK2R20A55

    Public key,

    Private key,

    Create and animation showing the use ofboth, choose algorithms, show how datais exchanged using both form of keys.

  • 7/30/2019 15812_CSE403T Term Paper Topic11

    5/5

    RK2R20A2

    4,

    RK2R20A5

    6

    Kerberos version 4 Authentication server,

    ticket granting server,ticket,ticket

    granting ticket, session key, service

    granting ticket,Kerberos relms,

    demonstrate all

    RK2R20A2

    5

    Modules Calculation How to find modules of a fraction

    number / negative / positive number

    take user inputs and perform

    RK2R20A2

    6

    IP spoofing, Demonstrate the attack using animationand ways to protect against it

    RK2R20A2

    7

    MAC address spoofing,

    Traffic padding

    Demonstrate the attack using animationand ways to protect against it

    RK2R20A2

    8

    Phishing attack Demonstrate the attack using animationand ways to protect against it

    RK2R20A2

    9

    Digital signature Demonstrate the working using ananimation and show how are they usedto guard against the attacker

    RK2R20A3

    0

    Virus, worm Demonstrate how virus attacks a file/

    system , what are the issues and

    remedial solution for the same.