Differences between revisions 9 and 10
Revision 9 as of 2010-02-18 20:23:55
Size: 1823
Editor: host-216-249-123-164
Comment:
Revision 10 as of 2010-02-18 20:24:08
Size: 1812
Editor: host-216-249-123-164
Comment:
Deletions are marked like this. Additions are marked like this.
Line 10: Line 10:
notes. Details on the assignment will come later. MillerRabin notes. Details on the assignment will come later.

Cptr427Winter2010

DES programming Assignment

You must implement the following interface that I will use to grade your DES implementation: IdesGradeable. You may also wish to use an abstract class called AdesHelpers, but it is not required. Also the lecture notes that go with this assignment can be found here. The programming lecture notes can be found here Cptr427DesProgrammingLecture

RSA Lecture

For this section you will need the RSA Notes.pdf and the Miller Rabin Notes.pdf notes. Details on the assignment will come later.

General Requirements:

  • Use unsigned long integers for your data and key.
  • You may NOT use any cryptographic functions built by someone else - this must be all your code.
  • You may use standard data structures such as arrays, lists etc as needed. However you may not use the BitArray or any other similar device.

  • The program must use a GUI interface in C#.

Secure Computing Chapter Summaries

  1. SecureComputingChapter01

  2. SecureComputingChapter02

  3. SecureComputingChapter12

  4. SecureComputingChapter02

  5. SecureComputingChapter03

  6. SecureComputingChapter05

  7. SecureComputingChapter07

  8. SecureComputingChapter08

  9. SecureComputingChapter10

  10. SecureComputingChapter11

Hacking Exposed Chapters

Make sure to include your quiz with answers here after you have given it!

  1. HackingExposedChapter01

  2. HackingExposedChapter02

  3. HackingExposedChapter03

  4. HackingExposedChapter04

  5. HackingExposedChapter05

  6. HackingExposedChapter06

  7. HackingExposedChapter07

  8. HackingExposedChapter08

  9. HackingExposedChapter09

  10. HackingExposedChapter10

  11. HackingExposedChapter11

  12. HackingExposedChapter12

NetworkSecurity/Cptr427Winter2010 (last edited 2011-03-27 21:24:13 by 24-151-193-255)