Applied Cryptography

Our academic experts are ready and waiting to assist with any writing project you may have. From simple essay plans, through to full dissertations, you can guarantee we have a service perfectly matched to your needs.

GET A 40% DISCOUNT ON YOU FIRST ORDER

ORDER NOW DISCOUNT CODE >>>> WELCOME40

Application design.
Please the concept of the work is creating application. Kindly look at this YouTube video is a similar concept.
https:/17LLP115 – Applied Cryptography Coursework Weighting 30% of the module marks Hand in Date 15:01 Tuesday 03 April 2018 Post Date 15:01 Wednesday 9 May 2018 For this coursework you are asked to propose and implement A Document Tracking System that tracks and records who reads the document. Requirements: • Application scenario – Assuming a manager wants a piece of important document in txt format to be read by all employees one by one. The manager has to be absolutely sure that everyone has declared explicitly that he/she has read that document. The manager should be able to see (read) all the names who declared that they have read that document in clear text. The manager should also be able to list the declared names without any doubt that the person has declared by himself. No employees will be able to deny they have read that document once they declared they have read it. • Implement your proposal by programming in Java with the given security/cryptography software development packages for lectures which are Java BouncyCastle cryptographic package. Demonstrate your application working and behaving as above described. • Write a report that is no more than 2000 words to describe your propose. As most reports, it should include sections/parts such as introduction, objectives, explanations and reasoning, security and/or performance analysis, results, further improvement, and conclusion/summary. Please note that not all sections are necessary and applicable to your report. To convey your idea clearly, you can use suitable images, diagrams, tables, narratives, codes, etc. in moderation. When you use external resources, you should quote and reference them properly. Hints on your proposal: • You may consider using one or any combinations of techniques such as hash function, public key encryption, digital signature, public key certificate, and/or other techniques as you see fit. Note: • Fill in the Cover Sheet for Coursework and attach it as the first page of your report. Any report without the cover sheet attached will not be marked. • Plagiarism of codes and reports are strictly forbidden, and will be penalised severely in marking. An academic misconduct case may also be filed should plagiarism be found. • Late submission is not allowed. Cover Sheet for Coursework Participants must complete this cover sheet to accompany each piece of coursework submitted. No work will be marked without completion of this sheet. Participant Name: Submission Date: Programme Title: Module Title: Assignment Title: If this coursework is part of a group activity, list the names of the other group members: Declaration By making this submission I confirm that the attached coursework is my own work and that anything taken from or based upon the work of others – or previous work of mine – has its source clearly and explicitly cited; I understand that failure to do so may constitute Academic Misconduct. Coursework Marking Scheme 17LLP115 Applied Cryptography Marking criteria (Not equally weighted) No adequate attempt (0) Very poor (15, 25, 35) Weaker than required (42, 45, 48) Average (52, 55, 58) Good (62, 65, 68) Excellent (75, 85, 100) 5% Layout and presentation, including the use of references and citations 5% Quality, clarity and coherence of written English 10% Analysis of requirements, functionalities, problems and objectives – Have the requirements and functionalities been analysed with reasons? Have the problems and objectives described clearly? 30% Proposed solutions – Is the proposal reasonable and feasible? Have the proposal addressed all or the critical issues in the problem given? Are there major security flaws and weaknesses in the solutions? 30% Implementation of the proposed system – Has the system implemented in Java code correctly? Does it function and behave as expected? Are the relevant Java cryptographic functions/APIs used properly? Is the code compiled and run with correct outputs? Is the code structured well and documented and commented properly? 10% Discussion – Has the student clearly communicated his/her own thoughts, identified issues and challenges for further improving the system? Are there any reasonable analysis and discussions of security strength and potential weakness? Presentation of Applied Cryptography Project Important information about your presentation submission Weighting 10% of the module marks Hand in Date 3:01pm, Thursday 05 April 2018 Return 3:01pm, Friday 11 May 2018 Your presentation should be based on your proposal and work of the coursework for a document reading tracking system. Your presentation time is limited to 6 minutes. You should submit your presentation in PPT or PDF format.

Our academic experts are ready and waiting to assist with any writing project you may have. From simple essay plans, through to full dissertations, you can guarantee we have a service perfectly matched to your needs.

GET A 40% DISCOUNT ON YOU FIRST ORDER

ORDER NOW DISCOUNT CODE >>>> WELCOME40

 

 

Posted in Uncategorized

Applied Cryptography

Our academic experts are ready and waiting to assist with any writing project you may have. From simple essay plans, through to full dissertations, you can guarantee we have a service perfectly matched to your needs.

GET A 40% DISCOUNT ON YOU FIRST ORDER

ORDER NOW DISCOUNT CODE >>>> WELCOME40

Application design.
Please the concept of the work is creating application. Kindly look at this YouTube video is a similar concept.
https://www17LLP115 – Applied Cryptography
Coursework
Weighting 30% of the module marks
Hand in Date 15:01 Tuesday 03 April 2018
Post Date 15:01 Wednesday 9 May 2018
For this coursework you are asked to propose and implement A Document Tracking System that tracks
and records who reads the document.
Requirements:
• Application scenario – Assuming a manager wants a piece of important document in txt format to
be read by all employees one by one. The manager has to be absolutely sure that everyone has
declared explicitly that he/she has read that document. The manager should be able to see (read)
all the names who declared that they have read that document in clear text. The manager should
also be able to list the declared names without any doubt that the person has declared by
himself. No employees will be able to deny they have read that document once they declared
they have read it.
• Implement your proposal by programming in Java with the given security/cryptography software
development packages for lectures which are Java BouncyCastle cryptographic package. Demonstrate
your application working and behaving as above described.
• Write a report that is no more than 2000 words to describe your propose. As most reports, it
should include sections/parts such as introduction, objectives, explanations and reasoning,
security and/or performance analysis, results, further improvement, and conclusion/summary.
Please note that not all sections are necessary and applicable to your report. To convey your idea
clearly, you can use suitable images, diagrams, tables, narratives, codes, etc. in moderation.
When you use external resources, you should quote and reference them properly.
Hints on your proposal:
• You may consider using one or any combinations of techniques such as hash function, public key
encryption, digital signature, public key certificate, and/or other techniques as you see fit.
Note:
• Fill in the Cover Sheet for Coursework and attach it as the first page of your report. Any report
without the cover sheet attached will not be marked.
• Plagiarism of codes and reports are strictly forbidden, and will be penalised severely in marking.
An academic misconduct case may also be filed should plagiarism be found.
• Late submission is not allowed.
Cover Sheet for Coursework
Participants must complete this cover sheet to accompany each piece of coursework
submitted. No work will be marked without completion of this sheet.
Participant Name: Submission
Date:
Programme Title:
Module Title:
Assignment Title:
If this coursework is part of a group activity, list the names of the other group
members:
Declaration
By making this submission I confirm that the attached coursework is my own work
and that anything taken from or based upon the work of others – or previous work of
mine – has its source clearly and explicitly cited; I understand that failure to do so
may constitute Academic Misconduct.
Coursework Marking Scheme
17LLP115
Applied Cryptography
Marking criteria
(Not equally weighted)
No adequate attempt (0)
Very poor (15, 25, 35)
Weaker than required
(42, 45, 48)
Average (52, 55, 58)
Good (62, 65, 68)
Excellent (75, 85, 100)
5% Layout and presentation, including the use of
references and citations
5% Quality, clarity and coherence of written
English
10%
Analysis of requirements, functionalities,
problems and objectives – Have the
requirements and functionalities been analysed
with reasons? Have the problems and
objectives described clearly?
30%
Proposed solutions – Is the proposal
reasonable and feasible? Have the proposal
addressed all or the critical issues in the
problem given? Are there major security flaws
and weaknesses in the solutions?
30%
Implementation of the proposed system –
Has the system implemented in Java code
correctly? Does it function and behave as
expected? Are the relevant Java cryptographic
functions/APIs used properly? Is the code
compiled and run with correct outputs? Is the
code structured well and documented and
commented properly?
10%
Discussion – Has the student clearly
communicated his/her own thoughts, identified
issues and challenges for further improving the
system? Are there any reasonable analysis
and discussions of security strength and
potential weakness?
Presentation of Applied Cryptography Project
Important information about your presentation submission
Weighting 10% of the module marks
Hand in Date 3:01pm, Thursday 05 April 2018
Return 3:01pm, Friday 11 May 2018
Your presentation should be based on your proposal and work of the coursework for a document
reading tracking system. Your presentation time is limited to 6 minutes.
You should submit your presentation in PPT or PDF format.

Our academic experts are ready and waiting to assist with any writing project you may have. From simple essay plans, through to full dissertations, you can guarantee we have a service perfectly matched to your needs.

GET A 40% DISCOUNT ON YOU FIRST ORDER

ORDER NOW DISCOUNT CODE >>>> WELCOME40

 

 

Posted in Uncategorized