15812_cse403t term paper topic11
TRANSCRIPT
-
7/30/2019 15812_CSE403T Term Paper Topic11
1/5
Term Papers for CSE403T
Roll
Number
Topic Description
RK2R20A01,RK2R20A31
(i)2^n binary numbers are
possible using n bits
(ii) Left shift and right shift
operation
Create an animation showing using 2bits, how the number is 4, i.e. show00,01,10,11 and using 3 bits the numberis 8 , 000,001,010..and so onDo the same for the left and right shiftoperation
RK2R20A02,RK2R20A32
Security services X.800 With the help of animation show(i) Authentication (ii) Access control (iii)
Data Confidentiality (iii) Data integrity
(iv) Non repudiation
RK2R20A03,RK2R20A33
A study of key cryptographic terms An animation to explainPlaintext,
ciphertext,
cryptography,
cryptanalysis,
block cipher,
stream cipher
show example of each
-
7/30/2019 15812_CSE403T Term Paper Topic11
2/5
RK2R20A04,RK2R20A35
Brute force attack Show number of alternative keys possible
for a given key size. Take small key size
eg key size =2 for explanation. Also
make the table for different different
key sizes. Explanation should be very
clear using an animation
RK2R20A05,RK2R20A36
Encryption techniques Substitution and transposition
technique(explain clearly the meaning of
substitution and transposition using
proper diagrams no need to enter into
types)
Just show using animation howsubstitution takes place, do the same for
transposition, the animation should besuch, where it asks for cipher to be usedfor each alphabet and then when theinput string inserted, must be able togive the decrypted data, example at thestart of the program one fills A as # andB as ! , now once input taken,whatever is typed on screen getsconverted into the cipher
RK2R20A06,RK2R20A37
Ceasar cipher Clear explanation, Take a plaintext and
use proper key show the encryption
process step by step using animation,clearly explain brute force attack on the
same taking example i.e create an
animation to show the Ceaser Cipher at
work ( user input must be taken) , the
show using animation how a brute force
attack can crack it open
RK2R20A07,RK2R20A38
Monoalphabetic cipher Clear explanation, Take a plaintext and
use proper key show the encryption
process step by step using animation,
clearly explain brute force attack on the
same taking example i.e create an
animation to show the Monoalphabetic
Cipher at work ( user input must be
taken) , the show using animation how a
brute force/ cryptanalysis attack can
crack it open
RK2R20A08,
Poly alphabetic cipher Explanation, advantage over monoalphabetic cipher should be illustrated
-
7/30/2019 15812_CSE403T Term Paper Topic11
3/5
RK2R20A39
using the animation, user input taken for
both poly and mono and it should be
demonstrated that poly is safer than
mono
RK2R20A09,RK2R20A40
Playfair cipher Clear explanation, use proper animation
to explain the same with text, user input
must be taken
RK2R20A10,RK2R20A4
1
Hill cipher Clear explanation(refer book),use
animation, Take a plaintext and use
proper key show the encryption process
step by step using animation
Discuss all the three cases
(i) Plain text and key known, find
cipher
(ii) Plain text ad cipher known , find
key
(iii)Cipher and key known , find plain
text
RK2R20A1
1,
RK2R20A4
2
Matrix inverse Demonstrate how to find inverse of amatrix, take user input, 2X2 martix aswell as 3X3 matrix.Show how to get an identity matrix
RK2R20A1
2,
RK2R20A43
Vigenere cipher Take a plaintext and use proper key
show the encryption process step by step
using animation
RK2R20A1
3,
RK2R20A4
4
One time pad Take a plaintext and use proper key
show the encryption process step by step
using animation
RK2R20A1
4,
RK2R20A4
5
(i) Diffusion and confusion
(ii) Expansion and contraction
permutation in DES
(i) Explain with proper example
(ii) Explain the exact mechanism for
the same using animation.
-
7/30/2019 15812_CSE403T Term Paper Topic11
4/5
(iii)User Input must be taken
RK2R20A1
5,
RK2R20A46
Fiestal cipher Take a plaintext and use proper key
show the encryption process step by step
using animation
RK2R20A1
6,
RK2R20A4
7
Double DES Explanation, meet in the middle
attack(with proper proof), use a plain
text , encrypted using a suitable algo,
show how can it be attacked using
Double DES
RK2R20A1
7,RK2R20A4
8
Triple DES with two and three keys Compare both, draft an animation on the
same, choose same data set and testwhat cipher comes out
RK2R20A1
8,
RK2R20A5
0
(i) Stream cipher
(ii)Initialization of state vector
in RC4
(i)Clear explanation, pseudorandom byte
generator
(ii) explain with proper animation.
RK2R20A1
9,RK2R20A5
1
Stream generation process in RC4 explain it with animation (Phases of RC4
Algorithm)
RK2R20A2
0,
RK2R20A5
2
Random number generation Demonstrate the concept, properties of
random number, linear congruential
generator with proper example, an
animation of the same is expected
RK2R20A2
1,RK2R20A5
3
RSA algorithm Animation needs to be prepared, where
real time values can be filled andanswers sought
RK2R20A2
2,
RK2R20A5
4
Man in the middle attack in deffie
hellman key exchange
create and animation, user inputs mustbe allowed for inputs to the keyexchange algo and then demonstrate theattack
RK2R20A2
3,
RK2R20A55
Public key,
Private key,
Create and animation showing the use ofboth, choose algorithms, show how datais exchanged using both form of keys.
-
7/30/2019 15812_CSE403T Term Paper Topic11
5/5
RK2R20A2
4,
RK2R20A5
6
Kerberos version 4 Authentication server,
ticket granting server,ticket,ticket
granting ticket, session key, service
granting ticket,Kerberos relms,
demonstrate all
RK2R20A2
5
Modules Calculation How to find modules of a fraction
number / negative / positive number
take user inputs and perform
RK2R20A2
6
IP spoofing, Demonstrate the attack using animationand ways to protect against it
RK2R20A2
7
MAC address spoofing,
Traffic padding
Demonstrate the attack using animationand ways to protect against it
RK2R20A2
8
Phishing attack Demonstrate the attack using animationand ways to protect against it
RK2R20A2
9
Digital signature Demonstrate the working using ananimation and show how are they usedto guard against the attacker
RK2R20A3
0
Virus, worm Demonstrate how virus attacks a file/
system , what are the issues and
remedial solution for the same.