Posted: February 4th, 2015
Paper, Order, or Assignment Requirements
In the Internet-era many application need to protect information and/or authenticate users.
This assignment requires you to:
1. Select a type of application that you would like to analyse,
2. Research and evidence the significant/relevance of your target application, citing appropriate literature sources
3. Identify cryptographic requirements for this type of application
4. Analyse the cryptographic approaches used in different software package of the same type, e.g. software used for data encryption
5. To understand the principle properly, implement the basic principles using Crypttool2
6. Discuss advantages and disadvantages, and justify the use of cryptographic mechanisms citing relevant literature. Try to cover all areas relevant for the type of application that you selected (key generation, key management, encryption, decryption, etc.). Please go in depth in at least one of these areas. Specify the area explicitly.
7. Evaluate/compare the different approaches
Place an order in 3 easy steps. Takes less than 5 mins.