Differences between revisions 5 and 6
Revision 5 as of 2010-02-07 21:29:16
Size: 1443
Editor: 24-183-238-75
Comment:
Revision 6 as of 2010-02-07 21:34:29
Size: 1548
Editor: 24-183-238-75
Comment:
Deletions are marked like this. Additions are marked like this.
Line 5: Line 5:
You must implement the following interface that I will use to grade your DES implementation: IdesGradeable. You may also wish to use an abstract class called [[AdesHelpers]], but it is not required. You must implement the following interface that I will use to grade your DES implementation: IdesGradeable. You may also wish to use an abstract class called [[AdesHelpers]], but it is not required. Also the lecture notes that go with this assignment can be found [[attachment:Des_Decryption.pdf | here]]

Cptr427Winter2010

DES programming Assignment

You must implement the following interface that I will use to grade your DES implementation: IdesGradeable. You may also wish to use an abstract class called AdesHelpers, but it is not required. Also the lecture notes that go with this assignment can be found here

General Requirements:

  • Use unsigned long integers for your data and key.
  • You may NOT use any cryptographic functions built by someone else - this must be all your code.
  • You may use standard data structures such as arrays, lists etc as needed. However you may not use the BitArray or any other similar device.

  • The program must use a GUI interface in C#.

Secure Computing Chapter Summaries

  1. SecureComputingChapter01

  2. SecureComputingChapter02

  3. SecureComputingChapter12

  4. SecureComputingChapter02

  5. SecureComputingChapter03

  6. SecureComputingChapter05

  7. SecureComputingChapter07

  8. SecureComputingChapter08

  9. SecureComputingChapter10

  10. SecureComputingChapter11

Hacking Exposed Chapters

Make sure to include your quiz with answers here after you have given it!

  1. HackingExposedChapter01

  2. HackingExposedChapter02

  3. HackingExposedChapter03

  4. HackingExposedChapter04

  5. HackingExposedChapter05

  6. HackingExposedChapter06

  7. HackingExposedChapter07

  8. HackingExposedChapter08

  9. HackingExposedChapter09

  10. HackingExposedChapter10

  11. HackingExposedChapter11

  12. HackingExposedChapter12

NetworkSecurity/Cptr427Winter2010 (last edited 2011-03-27 21:24:13 by 24-151-193-255)