Chat with us, powered by LiveChat algorithm report Research paper | WriteDemy

Question Description

Algorithm Report 10% Due date Due Date 8/11 @11:59 PM

Take a sample of Plain text, encrypt this plaintext step by step using AES, you must show each step how it has been done with all tables and codes, till you generate the Ciphertext. the reverse your work step by step until you generate the Plaintext

Your plaintext is:

Here you can encrypt a block of bytes with a key using the popular Advanced Encryption Standard cipher” . All the internal steps of the computation are shown, which can be helpful for anyone debugging their own AES implementation. In each of the 10/12/14 rounds, the sub-steps of SubBytes, ShiftRows, MixColumns, AddRoundKey, and key schedule are shown

Encryption

5%

Decryption

5%

Course Report 20%

A class report is 20 pages, each page 300 word, single space with Arial font and size of 10

Titles and subtitles are in Arial font and size of 12 (bolds)

A Class report is a report to describe a cryptography algorithm, this report focuses on the algorithms mechanism and an example to explain the mechanism.

The report covers one of the following:

Lattice-Based Cryptography (You need to go through Vector Space first)

Quantum Cryptography

Post-quantum Cryptography

Blowfish

Twofish

MARS

DEAL, a Feistel cipher using DES as the round function

The Tiny Encryption Algorithm, or TEA

LOKI97, one of the LOKI family of ciphers, from Australia

Course Report structure

The report has one section called:

The …… Algorithm

    • Algorithm specification
    • Encryption Procedure: step by step as algorithm (NOT programming Language)
    • Decryption procedure: step by step as algorithm (NOT programming Language)
    • Security analysis
    • Example: Step by Step

Course Report grades:

Report part

Marks

Algorithm specification

2%

Encryption Procedure

5%

Decryption procedure

5%

Security analysis

4%

Example

6%

SUM

20%

Research Paper 20%

Each student will write a research paper, the paper focus on the technical, mathematical and the use of Cryptography application. Each student will be located on a project from the following list. OR you can select your application after you send me a short email describing your interests

  • Cryptography Access control
  • Cryptography key management
  • Cryptography Authentication
  • BB84 Protocol
  • Cryptography Quantum key distribution
  • Cryptography Quantum Coin Flipping
  • Symmetric encryption and message authentication material construction
  • Secured application-level data transport
  • Non-repudiation methods
  • Secret sharing methods
  • Secure multi-party computation
  • Cryptography formal model: Burrows–Abadi–Needham logic
  • Cryptography formal model: Dolev–Yao model
  • Cryptography formal model: π-calculus (or pi-calculus)
  • Cryptography formal model: Protocol composition logic
  • PKI
  • SSL/TLS
  • Secure Shell
  • Network Link encryption
  • VPN
  • Wireless communication
  • Digital signature
  • Content encryption
  • Security Token
  • Identity federations
  • Steganography algorithms
  • Pseudorandom functions
  • Cryptography Protocols
  • Authentication protocols
  • Secure remote passwords
  • Bluetooth pairing
  • Common criteria (cryptography product) certification and accreditation
  • Cryptographic product selection criteria
  • Network Link encryption
  • VPN
  • Wireless communication
  • Device encryption
  • Content encryption
  • Physical Access and contactless Token
  • Identity Federation

Research paper Structure

  • Introduction summary of the work
  • The benefit of the application
  • Application description
  • Application implementation description
  • Implementations issues (if any)
  • Application use (end user use) description
  • References

Research paper Format

Each research papers should not less than 25-30 pages, each page 300 word, single space with Arial font and size of 10

Titles and subtitles are in Arial font and size of 12 (bolds)

Do not use pictures copied from the web, use graphic design through MS Visio

Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteDemy. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.

Do you need an answer to this or any other questions?

About Writedemy

We are a professional paper writing website. If you have searched a question and bumped into our website just know you are in the right place to get help in your coursework. We offer HIGH QUALITY & PLAGIARISM FREE Papers.

How It Works

To make an Order you only need to click on “Place Order” and we will direct you to our Order Page. Fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

Are there Discounts?

All new clients are eligible for 20% off in their first Order. Our payment method is safe and secure.

Hire a tutor today CLICK HERE to make your first order