Differences between revisions 2 and 18 (spanning 16 versions)
Revision 2 as of 2010-02-07 20:45:17
Size: 1351
Editor: 24-183-238-75
Comment:
Revision 18 as of 2010-04-19 00:51:58
Size: 906
Editor: 24-183-238-75
Comment:
Deletions are marked like this. Additions are marked like this.
Line 3: Line 3:
== DES programming Assignment == == Lectures Notes (not in book) ==
Line 5: Line 5:
You must implement the following interface that I will use to grade your DES implementation: IDesGradeable.  * [[DES]]
 * [[RSA]]
Line 7: Line 8:
General Requirements: == Exam Reviews ==
Line 9: Line 10:
 * Use unsigned long integers for your data and key.
 * You may NOT use any cryptographic functions built by someone else - this must be all your code.
 * You may use standard data structures such as arrays, lists etc as needed. However you may not use the BitArray or any other similar device.
 * The program must use a GUI interface in C#.
 * Cptr427MidtermExam
Line 17: Line 15:
 1. SecureComputingChapter02
 1. SecureComputi
ngChapter12
 1. SecureComputingChapter02
 1. SecureComputingChapter02and12
Line 24: Line 20:
 1. SecureComputingChapter10
 1. SecureComputi
ngChapter11
 1. SecureComputingChapter10and11
Line 43: Line 38:

== Lab Project ==

 1. [[SpamLab|Spam]]

NetworkSecurity/Cptr427Winter2010 (last edited 2011-03-27 21:24:13 by 24-151-193-255)