حلول واجبات الجامعة العربية المفتوحة (لعــspring2017ـــام)

حلول واجبات الجامعة العربية المفتوحة لجميع تخصصات الجامعة ولجميع فروع الجامعة حلول واجبات – مشاريع تخرج – ملخصات هامة Mobile: 00966542495275 حلول واجبات الجامعة ا
 
الرئيسيةاليوميةس .و .جبحـثالأعضاءالمجموعاتالتسجيلدخول

شاطر | 
 

 T215BT215B T215B T215B

اذهب الى الأسفل 
كاتب الموضوعرسالة
whatsapp::00966542495275
Admin


عدد المساهمات : 1489
تاريخ التسجيل : 07/10/2014

مُساهمةموضوع: T215BT215B T215B T215B   الثلاثاء نوفمبر 18, 2014 7:11 pm

Faculty of Computer Studies
T215B
Communication and Information Technologies – Part B
Tutor Marked Assignment

Cut-Off Date: 25th November, 2014 Total Marks: 100

Contents
Part A: Block Cipher and Stream Cipher ………………...….………..……… 2
Part B: Vigenère Cipher and Columnar Transposition Cipher ……..……… 2
Part C: Message-Digest 5 (MD5) ……….……………………………..……… 3

Plagiarism Warning:
As per AOU rules and regulations, all students are required to submit their own TMA work and avoid plagiarism. The AOU has implemented sophisticated techniques for plagiarism detection. You must provide all references in case you use and quote another person's work in your TMA. You will be penalized for any act of plagiarism as per the AOU's rules and regulations.

Declaration of No Plagiarism by Student (to be signed and submitted by student with TMA work):
I hereby declare that this submitted TMA work is a result of my own efforts and I have not plagiarized any other person's work. I have provided all references of information that I have used and quoted in my TMA work.

Name of Student:
Signature:
Date:




Part A: Block Cipher and Stream Cipher (30 marks)
Block Cipher and Stream Cipher are considered as modern encryption systems which you studied during the course of Communication and Information Technologies – Part B, use your own words to answer the following questions:
1. Define Block Cipher and Stream cipher? (6 marks)
2. List two advantages and two disadvantages of them? (8 marks)
3. What are two cases that stream cipher is suitable for? (2 marks)
4. There are the two basic approaches of block encryption:
a) What are they? (2 marks)
b) List and explain one example for each approach providing the two drawbacks for each example? (10 marks)

Note: You should provide proper references and use citation (2 marks)

Part B: Vigenère Cipher and Columnar Transposition Cipher (40 marks)
The manager of X-company located in Kuwait sent a message to his employee who is working in another branch located in Bahrain, the message was important that nobody should know the content of it, the manager decided to use two encryption techniques to encrypt the message at the same time, he used Vigenère Cipher with the keyword ‘bahrain’ as the first step, then he entered the output of Vigenère Cipher algorithm to columnar transposition cipher, they agreed to use the keyword “kuwait” and its anagram ”AIUWKT”,
What massage the employee would receive if the manager sent him the message “deposit three million dollars”.
The following table helps you finding the corresponding code for each letter.

Show your work in details.
Part C: Message-Digest 5 (MD5) (30 marks)
Message-Digest 5 (MD5) [1] [2] is a hash function used for authentication and integrity, which you studied briefly in T215B. This task aims to assist you in learning more about the MD5. Your answer should be as report which satisfies the following points:
- The report should start with introduction and end with conclusion,
- The report should be within 1000 – 1200 words (long report, you should adhere to word count),
- The report should include sections, sub suctions, and at least one figure or table,
- The report must have proper citations and references.
- The body of your report should answer the following questions:
1. Define and describe the MD5? (4 marks)
2. Write briefly about the history of MD5? (3 marks)
3. List two applications of MD5? (3 marks)
4. When applying MD5 algorithm, the message goes through five steps in order to find its message digest, list and explain those steps? (15 marks)
Your answer should be within the range of (1000 – 1200) words count. (2 marks) extra words mean deduction of marks.


REFERENCES:

[1] R. Rivest, “The MD5 Message-Digest Algorithm”, MIT Laboratory for Computer Science and RSA Data Security, Inc. April 1992
[2] Xiaoyun Wang and Hongbo Yu (2005). "How to Break MD5 and Other Hash Functions". Advances in Cryptology – Lecture Notes in Computer Science 3494. pp. 19–35. Retrieved 21 December 2009





NOTES

• Make sure to write your name and ID clearly.
• Answer all questions and do not exceed the word count.
• Always make citations and referencing (provide proper references using any format).
• Use your own words (copy and paste cause deduction of marks even if you provide proper references).

--------------------------------
End of TMA
Good Luck

_________________
لتحميل ملف حل الواجب الحل النموذجي للواجب.doc يجب عليك  التسجيـــل بالمنتدى لتتمكن من تحميل الملف


حل واجب - خدمات مجانية – حلول واجبات الجامعة الجامعة العربية المفتوحة- كل الجامعات - حل واجب - حل واجب TMA- حل واجب TMA01
لجميع تخصصات الجامعة ولجميع فروع الجامعة
حلول واجبات – مشاريع تخرج – ملخصات هامة
Mobile: 00966542495275  or
WhatsApp:00966542495275

smsm.hamdy66@yahoo.com
حلول مضمونة وغير مكررة وغير متشابهة لجميع واجبات الجامعة
متوفرمدرسين ومدرسات لجميع المواد والتخصصات
السعودية-الكويت-لبنان-مصر-البحرين-الأردن-عمان-الرياض-الدمام-جدة-حائل-الاحساء-المدينة المنورة
KSA-Kuwait-Bahrain-Oman-Jordon-Lebanon-Egypt
قسم خاص لواجبات التربية لجميع التخصصات ولجميع المستويات
http://tmas.123.st
الرجوع الى أعلى الصفحة اذهب الى الأسفل
معاينة صفحة البيانات الشخصي للعضو http://learn.123.st
 
T215BT215B T215B T215B
الرجوع الى أعلى الصفحة 
صفحة 1 من اصل 1

صلاحيات هذا المنتدى:لاتستطيع الرد على المواضيع في هذا المنتدى
حلول واجبات الجامعة العربية المفتوحة (لعــspring2017ـــام) :: حل واجب الجامعة العربية المفتوحة 2018 الفصـــ 1 ــل :: حل واجبات ادارة الاعمال2018/2019-
انتقل الى: