Recent Question/Assignment

ITNE2002
Network & Information Security
Assignment 1
June 2019
Scenario:
Alice and Bob are two data scientists based in two countries. They are working on sensitive government data sets to track terrorist activities. They do not want to use existing chat applications or email services to share their data sets and analysis reports. Instead of the existing solutions, they want to implement a secure communication tool to share their contents.
Task 1: Using your expert knowledge in encryptiondecryption algorithms, suggest a framework for them to achieve their goal.
i. Using a diagram Illustrate how they could implement the secure communication tool. You should consider the prevailing secure key exchange and symmetric encryption methods when designing this tool.
(3 Marks)
ii. Discuss the challenges that would be encountered in key exchange process. Suggest methods to overcome challenges in such environments by employing a Certificate Authority (CA)
(2 Marks)
Task 2: To demonstrate the practical implementation of the publicprivate encryption, you have been asked to compete the following task.
(5 Marks)
i. Type the following message in a .txt file:
“My student ID is : Your Student ID ” ii. Download the public key given in this assignment folder and encrypt your message with the same key using openssl.
iii. Using openssl, generate RSA key pair (2048bits) in your computer.
Copyright © 2015-2019 VIT, All Rights Reserved. 2
Submission:
1. Write down your answers for the Task 1 in a MS word file. The file should include a cover page for this assignment with your name, ID and lecturer’s name.
2. Include your .txt file and your public key in a folder named “Task 2”
3. Create a folder with your student ID and include your MS word file and “Task 2” folder in the folder. Compress the folder and create .zip or .rar file
4. Submit the compressed folder in the Moodle for Assignment 1
Copyright © 2015-2019 VIT, All Rights Reserved. 3

Looking for answers ?


Recent Questions

Analyse the case for constitutional law. Case name: Australian Communication and Media Authority v Today FM (Sydney) Pty Ltd (2015) 255 CLR 352. Area of constructional law is seperation of powers. (Commonwealth)....Assessment task 3 – Case study analysisAssignment ContentOverviewType: Case study analysis (Individual task)Due date: Due 2359h AEST, Monday, 04 October 2021, Week 6Weighting: 50%Length: 1500 words (excluding...Attached is the January month-end report for Moogle, the premier search engine for meat and deli products. Moogle just raised a $100,000,000 Series D round of funding in December 2017, and the CEO is very...IT SA 2006Working with Virutal MachinesLAB 7WEEK - 6CONTENTS1. Unregister a Virtual Machine from the vCenter Server Appliance Inventory2. Register a Virtual Machine in the vCenter Server Appliance Inventory3....Essay response to one question from a set list.Friday of Week 10 (5pm on the 24th of September. 1500 words. Essay. 40%Essay Questions:1) Love and romance are often considered individual and private experiences....Assessment 2 - Using Evidence to Support Nursing PracticeNURS12165Evidence to Inform Nursing PracticeAssessment 2 – Using Evidence to Support Nursing PracticeType: Written AssessmentDue date: Week 10 Friday...Assignment 2Format: Calculations and essay questionsValue: 20%Due date: 11 OctoberWord guide: 3000 word maximum for Q1Purpose:To assess your ability to:• demonstrate a detailed understanding of the principles...Show All Questions