Categories
Advanced Net Security Application

Title: Hands-On Project Report and Video Presentation

The requirements of doing your selected hands-on project are as follows:
You need to select one from the Projects List below.
You must use the attached Template in Word (DOCX) format for your selected hands-on project report (Note: Please do not modify the format or font of the template and delete any information from the template, otherwise you will lose some points.) and submit your final hands-on project report to the Assignments page on NCAT’s Blackboard website. In addition, the requirements for Section III of your final report are:
Describe your selected topic (i.e., algorithm, protocol, or scheme).
Draw a diagram, flowchart, or structure of your selected topic in detail.
Provide detailed information for each box or step of your diagram, flowchart, or structure (Note: The detailed information should include necessary formulas, equations, values, etc.). For example, if you have a box or step in your diagram, flowchart, or structure called “Encryption or Encryption Algorithm”, you should provide a detailed mathematical formula or equation for it. 
You also need to produce a video that is at least five minutes long in MP4 formatpresenting the algorithm, protocol, or scheme in detail for your selected project. (Note:  Please use a Zoom screen recording to capture your project presentation demonstration.)
Your five-minute MP4 video should be submitted to the Assignments page on NCAT’s Blackboard website.
Your hands-on project report in DOCX format can be opened and is readable. Your presentation video file in MP4 format should be watchable and clear. That is, you should double check your submitted files after you upload them to Blackboard successfully. 
The due time for your final hands-on project report files is Sunday, May 5, 2024, at 11:59pm (EST). (Note: Please remember that there is no late work and email submission allowed).
Please be aware that any copying, cheating, or plagiarizing action in your hands-on project report files will result in a ‘F’ grade for the course.
The template for the project report is attached.  
Hands-On Project List
1. Playfair Cipher
2. Hill Cipher
3. Polyalphabetic Cipher
4. Vigenere Cipher
5. Vernam Cipher
6. One-Time Pad
7. Rail Fence Cipher
8. Row Transposition Cipher
9. Feistel Cipher
10. DES Encryption Algorithm 
11. DES Decryption Algorithm
12. AES Encryption Process
13. AES Encryption Algorithm
14. AES Decryption Algorithm
15. AES Encryption Round
16. Equivalent Inverse Cipher  
17. Double DES
18. Triple DES with Two Keys
19. Triple DES with Three Keys
20. Electronic Codebook (ECB) Mode
21. Cipher Block Chaining (CBC) Mode
22. s-bit Cipher Feedback (CFB) Mode
23. Output Feedback (OFB) Mode
24. Counter (CTR) Mode
25. Tweakable Block Cipher
26. Feistel Structure for Format Preserving Encryption
27. Feistel Structure for Format Preserving Decryption
28. Generic Structure of a Typical Stream Cipher
29. RSA (Rivest-Shamir-Adleman) Algorithm
30. Diffie-Hellman Key Exchange
31. Man-in-the-Middle Attack
32. Simplified Examples of Digital Signatures
33. Sponge Construction
34. Basic Uses of Message Authentication Code (MAC)
35. HMAC Structure
36. Efficient Implementation of HMAC 
37. RSA Approach to Digital Signature
38. DSA Approach to Digital Signature

Categories
Advanced Net Security Application

Hands-On Project Report: AES Encryption and Decryption Algorithm

The requirements of doing your selected hands-on project are as follows:
You need to select one from the Projects List below.
You must use the attached Template in Word (DOCX) format for your selected hands-on project report (Note: Please do not modify the format or font of the template and delete any information from the template, otherwise you will lose some points.) and submit your final hands-on project report to the Assignments page on NCAT’s Blackboard website. In addition, the requirements for Section III of your final report are:
Describe your selected topic (i.e., algorithm, protocol, or scheme).
Draw a diagram, flowchart, or structure of your selected topic in detail.
Provide detailed information for each box or step of your diagram, flowchart, or structure (Note: The detailed information should include necessary formulas, equations, values, etc.). For example, if you have a box or step in your diagram, flowchart, or structure called “Encryption or Encryption Algorithm”, you should provide a detailed mathematical formula or equation for it. 
You also need to produce a video that is at least five minutes long in MP4 formatpresenting the algorithm, protocol, or scheme in detail for your selected project. (Note:  Please use a Zoom screen recording to capture your project presentation demonstration.)
Your five-minute MP4 video should be submitted to the Assignments page on NCAT’s Blackboard website.
Your hands-on project report in DOCX format can be opened and is readable. Your presentation video file in MP4 format should be watchable and clear. That is, you should double check your submitted files after you upload them to Blackboard successfully. 
The due time for your final hands-on project report files is Sunday, May 5, 2024, at 11:59pm (EST). (Note: Please remember that there is no late work and email submission allowed).
Please be aware that any copying, cheating, or plagiarizing action in your hands-on project report files will result in a ‘F’ grade for the course.
The template for the project report is attached.  
Hands-On Project List
1. Playfair Cipher
2. Hill Cipher
3. Polyalphabetic Cipher
4. Vigenere Cipher
5. Vernam Cipher
6. One-Time Pad
7. Rail Fence Cipher
8. Row Transposition Cipher
9. Feistel Cipher
10. DES Encryption Algorithm 
11. DES Decryption Algorithm
12. AES Encryption Process
13. AES Encryption Algorithm
14. AES Decryption Algorithm
15. AES Encryption Round
16. Equivalent Inverse Cipher  
17. Double DES
18. Triple DES with Two Keys
19. Triple DES with Three Keys
20. Electronic Codebook (ECB) Mode
21. Cipher Block Chaining (CBC) Mode
22. s-bit Cipher Feedback (CFB) Mode
23. Output Feedback (OFB) Mode
24. Counter (CTR) Mode
25. Tweakable Block Cipher
26. Feistel Structure for Format Preserving Encryption
27. Feistel Structure for Format Preserving Decryption
28. Generic Structure of a Typical Stream Cipher
29. RSA (Rivest-Shamir-Adleman) Algorithm
30. Diffie-Hellman Key Exchange
31. Man-in-the-Middle Attack
32. Simplified Examples of Digital Signatures
33. Sponge Construction
34. Basic Uses of Message Authentication Code (MAC)
35. HMAC Structure
36. Efficient Implementation of HMAC 
37. RSA Approach to Digital Signature
38. DSA Approach to Digital Signature