Explain fundamental concepts of cryptographic algorithms


Assignment Task: This assessment task will assess the following learning outcomes:

1. Be able to justify security goals and the importance of maintaining the secure computing environment against digital threats.

2. Be able to explain the fundamental concepts of cryptographic algorithms.

TASK - You have been asked to develop a data transfer system from Port Macquarie to Wagga Wagga Campus. In this task, your job is to ensure that stream data is protected. In order to ensure that your system operates in a secure manner, you need to develop a prototype of your system in CryptoTool 2. CrypTool 2 (CT2) is an open-source program offering an innovative visual programming GUI to experiment with cryptographic procedures and to animate their cascades.

Task 1: In this task, you are required to:

1. Search RSA (Rivest - Shamir - Adleman) and AES (Advanced Encryption Standard) algorithms suitable for the above scenario, keep in mind that you can expand your system to more than one user,

2. Select a cryptographic algorithm and discuss why you think your selected algorithm is appropriate for the above scenario,

3. Design and develop a cryptographic system to encrypt live webcam data from Port Macquarie to Wagga Wagga using your chosen algorithm,

4. Discuss the strengths and weaknesses of your system,

5. You must document your approach with a description of the screenshots.

Task 2: In this task, you are required to:

1. Search HMAC,

1. Part 1: Design and develop a message-based system to encrypt and decrypt messages using an RSA algorithm,

2. Part 2: On the basis of Part 1 system, you should integrate the HMAC algorithm into your system,

1. The HMAC has to check message received from Port Macquarie,

2. If the integrity of the message approved, then decrypt the message,

3. Else, a message, or false Boolean output.

3. Discuss the strengths and weaknesses of your system,

4. You must document your approach with a description of the screenshots.

You should submit your assessment in a single word document which contains all components of your assignment. Use screenshots to provide evidence and details of the work you have done to complement your written answers.

All the tutors of our Information Security Assignment Help service work with the motto to reduce the academic stress of the students by providing them the best quality work at the most viable prices.

Tags: Information Security Assignment Help, Information Security Homework Help, Information Security Coursework, Information Security Solved Assignments 

Attachment:- Information Security.rar

Request for Solution File

Ask an Expert for Answer!!
Computer Network Security: Explain fundamental concepts of cryptographic algorithms
Reference No:- TGS03057099

Expected delivery within 24 Hours