Subject : C/C++ Comments : I would like parts 3 and 4 of the attached file
done if possible. This assignment requires the use of Linux and the C
language. For part 4, the three user names would be tkclifton, ssiewert,
and guest.
done if possible. This assignment requires the use of Linux and the C
language. For part 4, the three user names would be tkclifton, ssiewert,
and guest.
Document Preview:
Exercise #5 – Basic Encryption and Platform Security DUE: 11/24/2013 on Blackboard (before Midnight) Please thoroughly read Modern Operating Systems Chapter 9 and bring any questions you have to class. Note that the slides for Chapter 9 have also been posted on Blackboard. Please see example code provided for the class at -http://www.cse.uaa.alaska.edu/~ssiewert/a320_code/EXAMPLES/Exercise #5 Requirements: 1) [20 points] Read the following papers and provide a 2 to 3 paragraph summary of main points: a) [10 pts] Read and summarize “Big iron lessons, Part 5: Introduction to cryptography, from Egypt through Enigma”, http://www.cse.uaa.alaska.edu/~ssiewert/a320_doc/papers/big-iron-5.pdf b) [10 pts] Read and summarize “Big iron lessons, Part 6: The right coprocessor can help with encryption”, http://www.cse.uaa.alaska.edu/~ssiewert/a320_doc/papers/big-iron-6.pdf 2) [20 points] Download example simple Enigma encryption code and concepts available on our example code web site (http://www.cse.uaa.alaska.edu/~ssiewert/a320_code/Examples-Crypto/) or from the paper. a) [5 pts] Download, build, and run the example enigma code from pa-bigiron5 on your name and provide plain and cyphertext output. b) [5 pts] Modify the example code to use a substitution only with the ASCII table (disable the transposition) – with this type of cypher, if you have the encryption engine, how can you easily crack the code to decrypt all possible messages? c) [5 pts] What methods might you use to crack the enigma code given that you know the substitution cypher but not the transposition – demonstrate your ideas for cryptanalysis with test messages and sequences (hint consider disabling the transposition, creating a substitution look-up table, and then running known sequences through the rotor-based transposition code). Show your cryptanalysis for a short string like your name or a sequence of letters/numbers in ASCII (10 digits). d) [5 pts] Read the Wikipedia summary of Decyphering Enigma coded...
No comments:
Post a Comment