Differences between revisions 2 and 20 (spanning 18 versions)
Revision 2 as of 2010-02-07 20:45:17
Size: 1351
Editor: 24-183-238-75
Comment:
Revision 20 as of 2010-04-21 00:06:41
Size: 943
Editor: 24-183-238-75
Comment:
Deletions are marked like this. Additions are marked like this.
Line 3: Line 3:
== DES programming Assignment == During this year we used Security In Computing 4th edition, Hacking Exposed 6th edition and the Code Book.
Line 5: Line 5:
You must implement the following interface that I will use to grade your DES implementation: IDesGradeable. == Exam Reviews ==
Line 7: Line 7:
General Requirements:  * Cptr427MidtermExam
Line 9: Line 9:
 * Use unsigned long integers for your data and key.
 * You may NOT use any cryptographic functions built by someone else - this must be all your code.
 * You may use standard data structures such as arrays, lists etc as needed. However you may not use the BitArray or any other similar device.
 * The program must use a GUI interface in C#.

== Secure Computing Chapter Summaries ==
== Secure Computing Chapters ==
Line 17: Line 12:
 1. SecureComputingChapter02
 1. SecureComputi
ngChapter12
 1. SecureComputingChapter02
 1. SecureComputingChapter02and12
Line 24: Line 17:
 1. SecureComputingChapter10
 1. SecureComputi
ngChapter11
 1. SecureComputingChapter10and11
Line 43: Line 35:

== Lab Project ==

 1. [[SpamLab|Spam]]

NetworkSecurity/Cptr427Winter2010 (last edited 2011-03-27 21:24:13 by 24-151-193-255)