ITC595 Research Project - Designing Cryptographic system Information Security Assessment and Tutor Proposal

gif-final

Order Now mail

Charles Sturt University


ITC595 Research Project - Designing Cryptographic system Information Security

Assessment No: 3

ITC595|Information Security

Our Real
uni-icon
Student’s Score cards


ITC595 Research Project - Designing Cryptographic system Information Security

Research Project - Designing Cryptographic system


Task

You have been asked to develop a data transfer system from Port Macquarie to Wagga Wagga Campus. In this task, your job is to ensure that stream data is protected. In order to ensure that your system operates in a secure manner, you need to develop a prototype of your system in CryptoTool 2. CrypTool 2 (CT2) is an open-source program offering an innovative visual programming GUI to experiment with cryptographic procedures and to animate their cascades. You can download CT2 at https://www.cryptool.org/en/cryptool2 . You can also watch Short Introduction to CrypTool 2 at https://www.youtube.com/channel/UC8_FqvQWJfZYxcSoEJ5ob-Q.

Task 1:

In this task, you are required to: (5 Marks)

  • Search RSA (Rivest – Shamir – Adleman) and AES (Advanced Encryption Standard) algorithms suitable for the above scenario, keep in mind that you can expand your system to more than one user,
  • Select a cryptographic algorithm and discuss why you think your selected algorithm is appropriate for the above scenario,
  • Design and develop a cryptographic system to encrypt live webcam data from Port Maquarie to Wagga Wagga using your chosen algorithm,
  • Discuss the strengths and weaknesses of your system,
  • You must document your approach with a description of the screenshots.

Task 2:

In this task, you are required to: (15 Marks)

  • Search HMAC,
    • Part 1: Design and develop a message-based system to encrypt and decrypt messages using an RSA algorithm,
    • Part 2: On the basis of Part 1 system, you should integrate the HMAC algorithm into your system,
      • The HMAC has to check message received from Port Macquarie,
      • If the integrity of the message approved, then decrypt the message,
      • Else, a message, or false Boolean output.
    • Discuss the strengths and weaknesses of your system,
    • You must document your approach with a description of the screenshots.

Why invest in our services?

Only High Quality
Optimum quality

Our assignment help team is trained to provide you high quality writing services.

Reasonable Price of Each
High scores

High scores achieved by our students is a portrayal of our high quality online assignment help

Privacy and Security
Multiple reach

You can place your assignment order through 4 easy modes of communication

Order Now