Goals of the Project For Students

  • Will get an introduction to both symmetric and asymmetric cryptographic systems
  • Will gain an understanding of how these systems are implemented through examples
  • Will exploit systems that have certain vulnerabilities
  • Will have the opportunity to engage in discussion about advanced topics in cryptography

Information

There is no required VM for this project. All that is required is a Python development environment. Make certain that you are using Python 3. To check your version of Python, open a command prompt and run the command:

python --version (You may need to use the python3 command instead.)

For the established algorithms that you may find it necessary to use, you are allowed to reference and implement pseudocode with citation (a comment in your code will suffice). What is Pseudocode? https://en.wikipedia.org/wiki/Pseudocode

UNDER NO CIRCUMSTANCES should you copy/paste code into the project. Doing so is an honor code violation (not to mention a real world security concern) and will result in a zero (refer to the syllabus for more information).

The Final Deliverables

You will complete the provided Python file project_cryptography.py and submit it to the autograder in Gradescope.

Open Discussions

For each task we have provided prompts for further discussions. There will be threads created in Ed where students can discuss these topics. Participation is optional and will not be graded.

Good luck!



Table of contents