论文代写 留学生essay代写✔️各学科 英文论文代写
当前位置:以往案例 > >密码学案例理论题课程编号:SIT 281 essay案例
2019-01-06


ASSESSMENT FOR THE MODULE




There are two assessments for this module



One Individual “blog” of a 1000 words    (20% of the module mark)



One end of module essay of 3,000 words (maximum)   (80% of the module mark)


The details of each assessment follows below




Individual Blog (1000 words maximum)


You will present in class a critical assessment of a pieSIT 281 TRIMESTER 2 2018

project 2



DUE: By 12 NOON (Australian Eastern Standard Time), Monday 1st October 2018.
Submit a single file to the unit Cloud. The cover page is in the project folder on the unit Cloud and also available at

http://www.deakin.edu.au/ data/assets/word_doc/0003/954021/SEBE- project-Coversheet.docx

It should be incorporated at the beginning of your submission. Marks are given for explanations.


NO EXTENSIONS allowed without medical or other certification.


LATE projectS will automatically lose 10% per day up to a maximum of three days, including weekends and holidays. projects submitted 4 or more days late will not be marked and are given zero. NO EXTENSIONS FOR ANY REASONS, INCLUDING THOSE BASED ON DISABILITY PLANS, PAST FRIDAY OCTOBER 5


METHOD OF SUBMISSION: Complete the cover sheet with your unit code, your full name, campus enrolled at (B, G or X) and ID; please underline your family name as recorded with Deakin.


1. Alice and Bob want to establish a common key pair using the Diffie-Hellman key exchange protocol and then use it in to send each other messages using a symmetric cipher. They agree by email on a prime p=877 and a primitive root (generator) a= 453; these are public knowledge). Then Alice chooses secret x=25 while Bob chooses secret y=13.

Alice is in Australia while Bob is in Brazil. Carl, a Canadian friend of Alice, has been tracking the email received and sent by Alice and decides that he wants to listen in on conversations between Alice and Bob. Carl therefore sets up a man-in-the-middle attack as follows.

Carl sees the set-up agreed to by Alice and Bob and he chooses secret z = 17.

Using the primitive root and her secret, Alice computes 45325 (mod 877) and sends it to Bob; however, Carl intercepts this email (which Bob never receives). Similarly, Carl intercepts Bob’s e-mail containing 45313 (mod 877) (which Alice never receives).

Determine what common key Carl sets up with Bob, and his common key with Alice.

4 marks


2. Tony selects the prime p = 2357 and a primitive root g = 2 (mod 2357). Tony also chooses the private key a = 1751 and computes ga mod p which is 21751 (mod 2357) ≡ 1185. Now Tony’s public key is (p = 2357; g = 2; ga = 1185).

To encrypt a message m = 2035 to send to Tony, Bai selects a random integer k = 1520 and computes u = 21520 (mod 2357) ≡ 1430 and v = 2035 * 11851520 (mod 2357) ≡ 697, and sends the pair ( 1430, 697) to Tony. Tony decrypts to retrieve the message 2035.

Bai then sends a second message m’ = 1339 to Tony, using the same value of random integer k: he computes u = 21520 (mod 2357) ≡ 1430 and v = 1339 * 11851520 (mod 2357) ≡ 2145, and send the pair (1430, 2145) to Tony.

Oscar, works with Tony and has seen the pair (1430, 697) and m = 2035. Oscar is now keen to obtain m' without Tony knowing. He sees the second pair (1430, 2145) on Tony’s laptop. Show how he derives m’. 4 marks



3. Use a Maple procedure to find all points on the elliptic curve y2 = x3 + 295x + 2891 over Z3137.

Capture from Maple and copy into your project answer all points with x- coordinate less than 50. 5 marks



4. This is an RSA factoring question. In order to do the question, you need to read and understand the preliminary part.

PRELIMINARY PART: If you know the modulus n, and can steal phi(n), then you can calculate the two primes p and q such that n=pq as follows:

n – phi(n) + 1 = n – (p-1)(q-1) + 1 = n – pq +p + q -1 +1 = p+q. This tells you the sum of p and q.

Suppose p > q (one has to be larger than the other). Then

p – q = √[(p-q)2] = √[p2 +q2+2pq – 4pq] = √[p2 +q2+2pq – 4pq] = √[(p +q)2 -4n].


Since we know p+q, we now obtain p-q from this last equation. This gives us the values of p and q using the following formulas:

p = ½ [(p+q) + (p-q)]   and q = ½ [(p+q) – (p-q)].

(a) Verify that using these formulas p*q = n. 4 marks


(b) You bribe someone in the lab to give you the phi value for the current RSA scheme being used. You now know that n = 7863043 and phi(n) = 7855120. Compute the values of the factors of n using the formulas above. Show your work. 3 marks




TOTAL: 20 marksce of contemporary analysis

which you will then write up as a 1000 word “blog type” post. This will be the form of

a Word document.


There has been an explosion of blogging in recent years and there is a wide variety

of web sites that host these blogs. Individuals have these as well as organisations

and newspapers.



You will choose a topic related to the module to follow and research about. You can

get ideas for topics by looking at relevant blog sites as detailed in the web site

section above.


Examples might be as follows


· The rise of the middle class in China


· The Chinese Dream?


· One Belt One Road


· Challenges for the World Economy


· What are the prospects for the BRICS bank?


· Reforming the World trade system


· Growth and Inequality


· Trade Openness, Growth and Development


· The impact of the change in world oil prices


· Chinese Economic Reform and the “New Normal”


· What is the agenda for the G20?


· Is Country X’s growth sustainable?


· Is the Global Trade system disintegrating?


· Are the MINT economies the next generation of BRICS?


· Will the BRICS take over the World?


· What progress has been made in creating effective Global Governance?


· The future of the European Union


· BREXIT


· The rise of Protectionism in the USA


· Why is there a rising backlash against Globalisation?



You can discuss your ideas with your tutor. Once you chose your topic then you will

need to do a lot of research finding out the background to this and then thinking

about what it is that you want to write about in relation to this. The best way to

approach this is to look at as many relevant blog sites and see what the main issues

that are being addressed and pick a topic area in which you are interested.




The marking criteria for the Blog is as follows



Choice of Topic– How relevant is this to the content of the module   (5 marks)


Research– How much background research has gone into the preparation of the

blog. This will be evidenced by the references to other authors, sources

of information contained in the text of the blog and each blog must be supported with

bibliography (5 marks)


Focus– To what extent does the blog make it clear the issues that it is addressing

and the questions that it is setting out to answer? (5 marks)


Style/Structure– To what extent is the blog written in a way as to be accessible to

well-educated but generalist audience and how well has the blog been structured so

that it flows logically.? (5 marks)



You will have the opportunity to present your idea for the Blog in class and give a

short  (no more than 10 minutes) presentation of your idea and the key points that

you will want to make to your fellow students and the tutor The presentation is

informal but you can use a hand-out/power-point presentation if you like. This will

give you the opportunity to get formative feedback from your tutor and class mates.


1513067809116994.png

在线提交订单