This document outlines an assignment for an introduction to information security course. It includes 3 tasks: 1) compiling the Crypto++ library on Windows, Linux, or MacOS, 2) coding various hash functions and block ciphers using the Crypto++ library, and 3) testing the coded functions on input strings of varying lengths and recording average running times. Students are to submit a report with their hardware information, source codes, test results in table and graph form, and conclusions about how running time relates to input size.
This document outlines an assignment for an introduction to information security course. It includes 3 tasks: 1) compiling the Crypto++ library on Windows, Linux, or MacOS, 2) coding various hash functions and block ciphers using the Crypto++ library, and 3) testing the coded functions on input strings of varying lengths and recording average running times. Students are to submit a report with their hardware information, source codes, test results in table and graph form, and conclusions about how running time relates to input size.
This document outlines an assignment for an introduction to information security course. It includes 3 tasks: 1) compiling the Crypto++ library on Windows, Linux, or MacOS, 2) coding various hash functions and block ciphers using the Crypto++ library, and 3) testing the coded functions on input strings of varying lengths and recording average running times. Students are to submit a report with their hardware information, source codes, test results in table and graph form, and conclusions about how running time relates to input size.
1. TASK 1 - Compile Crypto++ on windows [or core linux (ubuntu or redhat), or
MacOS] (LINK download below). 2. TASK 2 - Coding for following functions: - Hash Functions: SHA-1, SHA-2 (SHA-256 or SHA-512), SHA-3; - Block ciphers: AES (Mode: ECB, CBC, CFB, OFB, CTR); - Public Key Signature Schemes: DSA2, ECDSA. 3. TASK 3 - Test the functions in TASK-2 on windows (or core linux OS); - Input string length: 256 bits, 512 bits, 1024 bits; 2048 bits; 4096 bits - Running times: Count on the average of 1000 running times;
What to Submit: Report the results
- Information of your hardware platform (RAM, CPU, Operating system,...) - The compiler version of the functions in Task 2 (including the source codes) - The results of the tests in Task 3; - Draw the results of test and report your conclusion: Running times vs input sizes Time: 4 weeks
Kali Linux - An Ethical Hacker's Cookbook - Second Edition: Practical recipes that combine strategies, attacks, and tools for advanced penetration testing, 2nd Edition
Mastering Linux Security and Hardening - Second Edition: Protect your Linux systems from intruders, malware attacks, and other cyber threats, 2nd Edition
React.js for A Beginners Guide : From Basics to Advanced - A Comprehensive Guide to Effortless Web Development for Beginners, Intermediates, and Experts