Welcome to the Most Reliable Essay writing Service Online

You have been asked to develop a data transfer system from Port Macquarie to Wagga Wagga Campus. In this task, your job is to ensure that stream data is protected. In order to ensure that your system operates in a secure manner, you need to develop a prototype of your system in CryptoTool 2. CrypTool 2 (CT2) is an open-source program offering an innovative visual programming GUI to experiment with cryptographic procedures and to animate their cascades. You can download CT2 at https://www.cryptool.org/en/cryptool2 . You can also watch Short Introduction to CrypTool 2 at https://www.youtube.com/channel/UC8_FqvQWJfZYxcSoEJ5ob-Q.

by | May 20

Length: 15-20 pages
Submission method options: Alternative submission method
TASK
back to top
You have been asked to develop a data transfer system from Port Macquarie to Wagga Wagga Campus. In this task, your job is to ensure that stream data is protected. In order to ensure that your system operates in a secure manner, you need to develop a prototype of your system in CryptoTool 2.  CrypTool 2 (CT2) is an open-source program offering an innovative visual programming GUI to experiment with cryptographic procedures and to animate their cascades. You can download CT2 at https://www.cryptool.org/en/cryptool2 . You can also watch Short Introduction to CrypTool 2 at https://www.youtube.com/channel/UC8_FqvQWJfZYxcSoEJ5ob-Q.
 
Task 1: 
In this task, you are required to:                                      (5 Marks)

Search RSA (Rivest – Shamir – Adleman) and AES (Advanced Encryption Standard) algorithms suitable for the above scenario, keep in mind that you can expand your system to more than one user,                                                                                                                                                                                                                                                                          

Select a cryptographic algorithm and discuss why you think your selected algorithm is appropriate for the above scenario,                                                        

Design and develop a cryptographic system to encrypt live webcam data from Port Macquarie to Wagga Wagga using your chosen algorithm,                   

Discuss the strengths and weaknesses of your system,                                                                                                                                                                                                    

You must document your approach with a description of the screenshots.                                                                                                                                                              

 
Task 2:  
In this task, you are required to:                                           (15 Marks)

Search HMAC,                                                                                   

Part 1: Design and develop a message-based system to encrypt and decrypt messages using an RSA algorithm,                   

Part 2: On the basis of Part 1 system, you should integrate the HMAC algorithm into your system,                                                 

The HMAC has to check message received from Port Macquarie,

If the integrity of the message approved, then decrypt the message, 

Else, a message, or false Boolean output. 

Discuss the strengths and weaknesses of your system,                                                                                                                                        

You must document your approach with a description of the screenshots.                                                                                                

RATIONALE
back to top
This assessment task will assess the following learning outcome/s:

be able to justify security goals and the importance of maintaining the secure computing environment against digital threats.

be able to explain the fundamental concepts of cryptographic algorithms.

MARKING CRITERIA AND STANDARDS
back to top
 

Criteria

High Distinction (100% – 85% )

Distinction (84% – 75%)

Credit (74% – 65%)

Pass (64% – 50%)

Fail (49% – 0%)

Max Grade

PART 1 Select a cryptographic algorithm (5 Marks)

Select a cryptographic algorithm and discuss why the selected algorithm is appropriate for the above scenario.

A highly suitable and efficient algorithm is selected and clear arguments are strongly supported with well-reasoned and concise discussion of logical and compelling evidence of why the algorithm was selected.

A suitable and generally efficient algorithm is selected and clear arguments are supported with well-reasoned discussion of logical and strong evidence of why the algorithm was selected.

A suitable algorithm is selected and mostly clear arguments are supported with reasoned discussion of generally logical evidence of why the algorithm was selected.

A generally suitable algorithm is selected and most arguments are supported though some connections are tenuous, with discussion or explanation of evidence of why the algorithm was selected.

A unsuitable algorithm is selected and most arguments are not supported with discussion or explanation of evidence of why the algorithm was selected.

1

Design and develop a cryptographic system to encrypt live webcam data from Port Macquarie to Wagga Wagga using the chosen algorithm

Designed and developed an efficient and smoothly working cryptographic system. The system shows some originality in thought.
The design  is logically organised and easy to follow

Designed and developed a smoothing working cryptographic system.
The design is generally logically organised and easy to follow.

Designed and developed a working cryptographic system with some minor flaws that detract from its efficient or smooth operation.
The design is organised and fairly easy to follow.

Designed and developed a cryptographic system that mostly works and has some minor flaws that detract from its smooth and efficient running.
The design is mostly organised and in sections fairly easy to follow.

The cryptographic system designed and developed does not work and has major flaws.
The code is poorly organised and very difficult to follow.

2

Discuss the strengths and weaknesses of the system

In the discussion thoroughly evaluates the strengths and weaknesses of the system showing insight and the ability to accurately, clearly and concisely articulate and apply the theory.

In the discussion generally thoroughly evaluates the strengths and weaknesses of the system showing the ability to accurately and clearly articulate and apply theory.

In the discussion explains many of the strengths and weaknesses of the system showing the ability, in general, to clearly articulate and apply theory. There may be minor errors and/or omissions in content or application.

In the discussion describes many of the strengths and weaknesses of the system showing the ability, in general, to clearly articulate and apply some theory. There are minor errors and omissions in content and application.

In the discussion may only superficially describe or outline some of the strengths and weaknesses of the system. There are major errors and omissions in the content and/or application and articulation is generally unclear.

1

Document the approach with a description and screenshots.

Documented all of the approaches with concise and highly meaningful descriptions of the screenshots.

Documented all of the approach with suitably meaningful descriptions of the screenshots.

Documented most of the approach with suitable descriptions of the screenshots.

Documented most of the approach with generally suitable descriptions of the screenshots.

Did not document most of the approach with generally suitable descriptions of the screenshots.

1

PART 2 Design and develop a message-based system (15 Marks)

Search HMAC and
 Design and develop a message-based system to encrypt and decrypt messages using an RSA algorithm

Designed and developed an efficient and smoothly working message-based system. The system shows some originality or innovation in thought.
The design is logically organised and easy to follow.

Designed and developed a smoothing working message-based system.

Designed and developed a working message-based system with some minor flaws that detract from its efficient or smooth operation.

Designed and developed a message-based system that mostly works and has some minor flaws that detract from its smooth and efficient running.

Message-based system does not work and has major flaws.

6

Part 2: On the basis of Part 1 system, you should integrate the HMAC algorithm into your system,                                                 

The HMAC has to check message received from Port Macquarie,

If the integrity of the message approved, then decrypt the message, 

Else, a message, or false Boolean output. 

Successful and thoughtful integration of the HMAC algorithm that does not detract from the smooth and efficient working of the system and achieves all the requirements listed.

Successful integration of the HMAC algorithm that does not detract from the working of the system and achieves all the requirements listed.

Integration of the HMAC algorithm that does not detract from the working of the system and achieves most of the requirements listed.

Partially successful integration of the HMAC algorithm that generally achieves most of the requirements listed.

Unsuccessful integration of the HMAC algorithm that generally does not achieve most of the requirements listed.

7

Discuss the strengths and weaknesses of system

In the discussion thoroughly evaluates the strengths and weaknesses of the system showing insight and the ability to accurately, clearly and concisely articulate and apply theory.

In the discussion generally thoroughly evaluates the strengths and weaknesses of the system showing the ability to nearly always accurately and clearly articulate and apply theory.

In the discussion explains many of the strengths and weaknesses of the system showing the ability in general to clearly articulate and apply theory. There may be minor errors and/or omissions in content or application.

In the discussion describes many of the strengths and weaknesses of the system showing the ability in general to clearly articulate and apply some theory. There are minor errors and omissions in content and application.

In the discussion may only superficially describe or outline some of the strengths and weaknesses of the system. There are major errors and omissions in content and/or application and articulation is generally unclear.

1

Document the approach with a description and screenshots.

Documented all of the approach with concise and highly meaningful descriptions of the screenshots.

Documented all of the approach with suitably meaningful descriptions of the screenshots.

Documented most of the approach with suitable descriptions of the screenshots.

Documented most of the approach with generally suitable descriptions of the screenshots.

Did not document most of the approach with generally suitable descriptions of the screenshots.

1

The document must be submitted within an acceptable format (cover page, full name, student ID, lecturer name, session time, etc.).  

The document is submitted within an acceptable format (cover page, full name, student ID, lecturer name, session time, etc.).  

The document is not submitted within an acceptable format (cover page, full name, student ID, lecturer name, session time, etc.).  
A penalty of up to -3 marks can be applied.

0

References using APA style

Referencing is comprehensive, demonstrates academic integrity, and conforms exactly to APA style conventions.

Referencing is comprehensive and conforms to the conventions of APA style with a minor error or omission in style and formatting choices that have no impact on the academic integrity of the work.

Referencing is comprehensive and mostly accurate according to the conventions of APA style. Two minor errors or omissions in style and formatting choices that have no impact on the academic integrity of the work.

Referencing is comprehensive and mostly accurate according to the conventions of APA style. Between three and five minor errors or omissions in style and formatting choices that have no impact on the academic integrity of the work.

Does not meet the standards required for a Pass

0

 
PRESENTATION
back to top
You should submit your assessment in a single word document which contains all components of your assignment. Use screenshots to provide evidence and details of the work you have done to complement your written answers. You should reference where appropriate using an approve referencing style to support your work. 
The document must be submitted within an acceptable format (cover page, full name, student ID, lecturer name, session time, etc.).  
 

  

CLIENT TESTIMONIALS

The Service Is Okay. I won’t Complain

The writers on the website are courteous and the customer service responds quickly. My paper was handled well; They promised...

Writers here are very professional and are native British

Thanks a lot for helping me out with my PhD Thesis, Writers here are very professional and are native British!!

Jack, The United Kingdom

Very Very Helpful, and On time.

Very Very Helpful, and On time.

Adelio M, Spain

I scored complete A’s in 3 out of four courses

I scored complete A’s in 3 out of four courses

Anonymous, Illinoi Chicago

CLICK HERE  To order your paper

About Essaysmiths Assignment writing service

We are a professional paper writing website. If you have searched a question and bumped into our website just know you are in the right place to get help in your coursework. We offer HIGH QUALITY & PLAGIARISM FREE Papers.

How It Works

To make an Order you only need to click on “Order Now” and we will direct you to our Order Page. Fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

Are there Discounts?

All new clients are eligible for upto 20% off in their first Order. Our payment method is safe and secure.

 CLICK HERE to Order Your Assignment

 

Recently Posted Questions.

Order your Assignment today and save 15% with the discount code ESSAYHELP

X