Differences between revisions 2 and 19 (spanning 17 versions)
Revision 2 as of 2010-02-07 20:45:17
Size: 1351
Editor: 24-183-238-75
Comment:
Revision 19 as of 2010-04-19 00:54:50
Size: 833
Editor: 24-183-238-75
Comment:
Deletions are marked like this. Additions are marked like this.
Line 3: Line 3:
== DES programming Assignment == == Exam Reviews ==
Line 5: Line 5:
You must implement the following interface that I will use to grade your DES implementation: IDesGradeable.  * Cptr427MidtermExam
Line 7: Line 7:
General Requirements:

 * Use unsigned long integers for your data and key.
 * You may NOT use any cryptographic functions built by someone else - this must be all your code.
 * You may use standard data structures such as arrays, lists etc as needed. However you may not use the BitArray or any other similar device.
 * The program must use a GUI interface in C#.

== Secure Computing Chapter Summaries ==
== Secure Computing Chapters ==
Line 17: Line 10:
 1. SecureComputingChapter02
 1. SecureComputi
ngChapter12
 1. SecureComputingChapter02
 1. SecureComputingChapter02and12
Line 24: Line 15:
 1. SecureComputingChapter10
 1. SecureComputi
ngChapter11
 1. SecureComputingChapter10and11
Line 43: Line 33:

== Lab Project ==

 1. [[SpamLab|Spam]]

NetworkSecurity/Cptr427Winter2010 (last edited 2011-03-27 21:24:13 by 24-151-193-255)