1904
Comment:
|
← Revision 21 as of 2011-03-27 21:24:13 ⇥
987
Placing it in the hierarchy
|
Deletions are marked like this. | Additions are marked like this. |
Line 1: | Line 1: |
## page was renamed from Cptr427Winter2010 | |
Line 3: | Line 4: |
== DES programming Assignment == You must implement the following interface that I will use to grade your DES implementation: IdesGradeable. You may also wish to use an abstract class called [[AdesHelpers]], but it is not required. Also the lecture notes that go with this assignment can be found [[attachment:Des_Decryption.pdf | here]]. The programming lecture notes can be found here Cptr427DesProgrammingLecture == RSA Lecture == For this section you will need the [[attachment:RSA Notes.pdf]] and the [[attachment:Miller Rabin Notes.pdf]] notes. Details on the assignment will come later. General Requirements: * Use unsigned long integers for your data and key. * You may NOT use any cryptographic functions built by someone else - this must be all your code. * You may use standard data structures such as arrays, lists etc as needed. However you may not use the BitArray or any other similar device. * The program must use a GUI interface in C#. |
During this year we used Security In Computing 4th edition, Hacking Exposed 6th edition and the Code Book. |
Line 23: | Line 10: |
== Secure Computing Chapter Summaries == | == Secure Computing Chapters == |
Line 26: | Line 13: |
1. SecureComputingChapter02 1. SecureComputingChapter12 1. SecureComputingChapter02 |
1. SecureComputingChapter02and12 |
Line 33: | Line 18: |
1. SecureComputingChapter10 1. SecureComputingChapter11 |
1. SecureComputingChapter10and11 |
Cptr427Winter2010
During this year we used Security In Computing 4th edition, Hacking Exposed 6th edition and the Code Book.
Exam Reviews
Secure Computing Chapters
Hacking Exposed Chapters
Make sure to include your quiz with answers here after you have given it!