Differences between revisions 1 and 2
Revision 1 as of 2010-01-17 17:51:53
Size: 830
Editor: 24-183-238-75
Comment:
Revision 2 as of 2010-02-07 20:45:17
Size: 1351
Editor: 24-183-238-75
Comment:
Deletions are marked like this. Additions are marked like this.
Line 2: Line 2:

== DES programming Assignment ==

You must implement the following interface that I will use to grade your DES implementation: IDesGradeable.

General Requirements:

 * Use unsigned long integers for your data and key.
 * You may NOT use any cryptographic functions built by someone else - this must be all your code.
 * You may use standard data structures such as arrays, lists etc as needed. However you may not use the BitArray or any other similar device.
 * The program must use a GUI interface in C#.

Cptr427Winter2010

DES programming Assignment

You must implement the following interface that I will use to grade your DES implementation: IDesGradeable.

General Requirements:

  • Use unsigned long integers for your data and key.
  • You may NOT use any cryptographic functions built by someone else - this must be all your code.
  • You may use standard data structures such as arrays, lists etc as needed. However you may not use the BitArray or any other similar device.

  • The program must use a GUI interface in C#.

Secure Computing Chapter Summaries

  1. SecureComputingChapter01

  2. SecureComputingChapter02

  3. SecureComputingChapter12

  4. SecureComputingChapter02

  5. SecureComputingChapter03

  6. SecureComputingChapter05

  7. SecureComputingChapter07

  8. SecureComputingChapter08

  9. SecureComputingChapter10

  10. SecureComputingChapter11

Hacking Exposed Chapters

Make sure to include your quiz with answers here after you have given it!

  1. HackingExposedChapter01

  2. HackingExposedChapter02

  3. HackingExposedChapter03

  4. HackingExposedChapter04

  5. HackingExposedChapter05

  6. HackingExposedChapter06

  7. HackingExposedChapter07

  8. HackingExposedChapter08

  9. HackingExposedChapter09

  10. HackingExposedChapter10

  11. HackingExposedChapter11

  12. HackingExposedChapter12

NetworkSecurity/Cptr427Winter2010 (last edited 2011-03-27 21:24:13 by 24-151-193-255)