You are on page 1of 3

IFN642 Assessment 2 Specification

Due on 9 June 2016, 14:00PM
Weighting: 50%
Type: Individual

This assessment is worth 50% of the total assessment for the unit. It is an
individual assessment. While you can discuss the assessment with others, each
student should submit his/her own work.

On successful completion of this assessment you should be able to:
1. Perform a critical analysis of cryptographic algorithms and protocols;
2. Describe a variety of current topics and research issues in modern
cryptology; and
3. Apply cryptographic protocols to achieve a variety of security goals for a
given online system.

This assessment is a collection of reports documenting your experience
completing the practical exercises related to cryptography and network security.
A component of this assessment will require research of an individually selected
topic in network security.

Following the weekly lectures and tutorials, you will be assigned challenges
which will be in the form of numerical exercises on cryptographic mechanisms,
or CrypTool exercise on cryptographic services or protocols. While numerical
exercises will help you to develop deeper understanding on the cryptographic
mechanisms; CrypTool exercises will help you build capabilities to solve security
problems by using these mechanisms.

Last challenge of the semester will be a research challenge addressing one aspect
of the ransomware developed in Assessment 1. Each student will pick one of the
following ransomware payload, review literature and design his/her own
solution:
1- Ransomware Command and Control Communication
2- Ransomware Payment

Deliverables

Each challenge will specify its own deliverables such as report or CrypTool
template file. Your final portfolio will be a collection of these deliverables. You
will compress these deliverables and submit your assessment as a single
compressed file via the IFN642 Blackboard web site under the Assessment
section.

Your report provided excellent explanations for all questions. Common forms of plagiarism include: 1. Cryptography Exercises You have completed all of the exercises and they were all correct. or paraphrasing another person's (or persons') work without appropriate acknowledgement of the sources (such acknowledgment must take the form required by the particular discipline) 2. 5 points . Your report provided excellent explanations for most questions. You have also submitted a report. direct copying. Each challenge will be 6 points except the last research challenge. using or developing an idea or hypothesis from another person's (or persons') work without appropriate acknowledgement 3. 6 points You have submitted all of the .cwm files.cwm files. audiovisual materials. musical score. It may also include resubmitting one's own work for another assessment item. art work. CrypTool templates functioned fully. 6 points You have completed all of the exercises. Marking Criteria Challenges may come with their own marking criteria. Except couple of mistakes. the following criteria will be used. CrypTool templates functioned with very minor problems. Your final deliverables had a professional look. Your solutions proved a deep level of understanding on the challenge problems and cryptographic mechanisms. representing the work of another person (or persons') as the student's own work 4. You demonstrated an excellent capability to solve security problems using this knowledge. copying non-word based material such as diagrams.3 Academic Integrity . summarising. using another person's (or persons') experimental results as one's own or without appropriate acknowledgment. Your solutions proved a deep level of understanding on the problems and cryptographic primitives. Your solutions proved an adequate level of understanding on the problems and cryptographic primitives. If a challenge does not specify criteria. You demonstrated an excellent capability to solve security problems using this knowledge.Plagiarism Plagiarism involves representing another person's (or persons') ideas or work as one's own. your solutions were all correct. which will be 8 points. Your final deliverables had a professional look.QUT MOPP C/5. 5 points CrypTool Exercises You have submitted all of the . plans etc and presenting them as one's own work 5. You have also submitted a complete report. Your solutions proved a deep level of understanding on the challenge problems and cryptographic mechanisms.

Your solutions proved an adequate level of understanding on the problems and cryptographic primitives. Your solutions were mostly correct. Your final deliverables were of acceptable quality. 4 points You have completed half of the exercises. 1 point No evidence that the group worked on the project and showed a regular progress. 4 points You have submitted all of the . Your report provided adequate explanations for most questions. You have also submitted a report. CrypTool templates functioned with minor problems. Your solutions proved an acceptable level of understanding on the problems and cryptographic primitives. Your solutions proved an adequate level of understanding on the challenge problems and cryptographic mechanisms.You have completed most of the exercises. 2-3 points You have submitted all of the .cwm files. You have also submitted a report. Your solutions proved a shallow understanding on the problems and cryptographic primitives. Your solutions were acceptable. 0 point You have submitted all of the . You demonstrated a good level of capability to solve security problems using this knowledge. You have also submitted a report. You demonstrated an acceptable level of capability to solve security problems using this knowledge. Your report provided acceptable explanations for some questions. CrypTool templates had major problems. CrypTool templates had major problems. 2-3 points You have completed some of the exercises.cwm files. Your final deliverables were of adequate quality. 1 point No evidence that the task was attempted or the delivered code was not functional. Your solutions proved an adequate level of understanding on the challenge problems and cryptographic mechanisms. Your report provided good explanations for most questions. Your solutions proved an acceptable level of understanding on the challenge problems and cryptographic mechanisms. Some of your solutions were correct. 0 point .cwm files. Your final deliverables were of acceptable quality.