Our academic experts are ready and waiting to assist with any writing project you may have. From simple essay plans, through to full dissertations, you can guarantee we have a service perfectly matched to your needs.
GET A 40% DISCOUNT ON YOU FIRST ORDER
Please the concept of the work is creating application. Kindly look at this YouTube video is a similar concept.
https://www17LLP115 – Applied Cryptography
Weighting 30% of the module marks
Hand in Date 15:01 Tuesday 03 April 2018
Post Date 15:01 Wednesday 9 May 2018
For this coursework you are asked to propose and implement A Document Tracking System that tracks
and records who reads the document.
• Application scenario – Assuming a manager wants a piece of important document in txt format to
be read by all employees one by one. The manager has to be absolutely sure that everyone has
declared explicitly that he/she has read that document. The manager should be able to see (read)
all the names who declared that they have read that document in clear text. The manager should
also be able to list the declared names without any doubt that the person has declared by
himself. No employees will be able to deny they have read that document once they declared
they have read it.
• Implement your proposal by programming in Java with the given security/cryptography software
development packages for lectures which are Java BouncyCastle cryptographic package. Demonstrate
your application working and behaving as above described.
• Write a report that is no more than 2000 words to describe your propose. As most reports, it
should include sections/parts such as introduction, objectives, explanations and reasoning,
security and/or performance analysis, results, further improvement, and conclusion/summary.
Please note that not all sections are necessary and applicable to your report. To convey your idea
clearly, you can use suitable images, diagrams, tables, narratives, codes, etc. in moderation.
When you use external resources, you should quote and reference them properly.
Hints on your proposal:
• You may consider using one or any combinations of techniques such as hash function, public key
encryption, digital signature, public key certificate, and/or other techniques as you see fit.
• Fill in the Cover Sheet for Coursework and attach it as the first page of your report. Any report
without the cover sheet attached will not be marked.
• Plagiarism of codes and reports are strictly forbidden, and will be penalised severely in marking.
An academic misconduct case may also be filed should plagiarism be found.
• Late submission is not allowed.
Cover Sheet for Coursework
Participants must complete this cover sheet to accompany each piece of coursework
submitted. No work will be marked without completion of this sheet.
Participant Name: Submission
If this coursework is part of a group activity, list the names of the other group
By making this submission I confirm that the attached coursework is my own work
and that anything taken from or based upon the work of others – or previous work of
mine – has its source clearly and explicitly cited; I understand that failure to do so
may constitute Academic Misconduct.
Coursework Marking Scheme
(Not equally weighted)
No adequate attempt (0)
Very poor (15, 25, 35)
Weaker than required
(42, 45, 48)
Average (52, 55, 58)
Good (62, 65, 68)
Excellent (75, 85, 100)
5% Layout and presentation, including the use of
references and citations
5% Quality, clarity and coherence of written
Analysis of requirements, functionalities,
problems and objectives – Have the
requirements and functionalities been analysed
with reasons? Have the problems and
objectives described clearly?
Proposed solutions – Is the proposal
reasonable and feasible? Have the proposal
addressed all or the critical issues in the
problem given? Are there major security flaws
and weaknesses in the solutions?
Implementation of the proposed system –
Has the system implemented in Java code
correctly? Does it function and behave as
expected? Are the relevant Java cryptographic
functions/APIs used properly? Is the code
compiled and run with correct outputs? Is the
code structured well and documented and
Discussion – Has the student clearly
communicated his/her own thoughts, identified
issues and challenges for further improving the
system? Are there any reasonable analysis
and discussions of security strength and
Presentation of Applied Cryptography Project
Important information about your presentation submission
Weighting 10% of the module marks
Hand in Date 3:01pm, Thursday 05 April 2018
Return 3:01pm, Friday 11 May 2018
Your presentation should be based on your proposal and work of the coursework for a document
reading tracking system. Your presentation time is limited to 6 minutes.
You should submit your presentation in PPT or PDF format.