Differences between revisions 12 and 21 (spanning 9 versions)
Revision 12 as of 2010-03-10 14:24:48
Size: 1904
Editor: anderson-camtasia
Comment:
Revision 21 as of 2011-03-27 21:24:13
Size: 987
Editor: 24-151-193-255
Comment: Placing it in the hierarchy
Deletions are marked like this. Additions are marked like this.
Line 1: Line 1:
## page was renamed from Cptr427Winter2010
Line 3: Line 4:
== DES programming Assignment ==

You must implement the following interface that I will use to grade your DES implementation: IdesGradeable. You may also wish to use an abstract class called [[AdesHelpers]], but it is not required. Also the lecture notes that go with this assignment can be found [[attachment:Des_Decryption.pdf | here]]. The programming lecture notes can be found here Cptr427DesProgrammingLecture

== RSA Lecture ==

For this section you will need the [[attachment:RSA Notes.pdf]] and the [[attachment:Miller Rabin Notes.pdf]]
notes. Details on the assignment will come later.

General Requirements:

 * Use unsigned long integers for your data and key.
 * You may NOT use any cryptographic functions built by someone else - this must be all your code.
 * You may use standard data structures such as arrays, lists etc as needed. However you may not use the BitArray or any other similar device.
 * The program must use a GUI interface in C#.
During this year we used Security In Computing 4th edition, Hacking Exposed 6th edition and the Code Book.
Line 23: Line 10:
== Secure Computing Chapter Summaries == == Secure Computing Chapters ==
Line 26: Line 13:
 1. SecureComputingChapter02
 1. SecureComputi
ngChapter12
 1. SecureComputingChapter02
 1. SecureComputingChapter02and12
Line 33: Line 18:
 1. SecureComputingChapter10
 1. SecureComputi
ngChapter11
 1. SecureComputingChapter10and11

NetworkSecurity/Cptr427Winter2010 (last edited 2011-03-27 21:24:13 by 24-151-193-255)