History and Evolution of Cryptosystem Report

You will be composing a report on the history and evolution through time and cryptanalysis of a particular cryptosystem. What is a cryptosystem? A cryptosystem consists of the following things:

  1. Encryption Algorithm or Algorithms
  2. Encryption Protocols in which it is- or they are used
  3. Encryption Keys and Key Management (keyspace, communication, length of validity, etc.).
  4. Plaintext or Ciphertext formatting (if any)

Your report must be 5 pages single spaced. Your report must have no more than 10% similarity to other resources.

In your report, you should describe:

  1. Reason for development of this cryptosystem
  2. The cryptosystem’s use today (if any)
  3. Describe in detail for which part(s) of the CIA triad the cryptosystem is used (there may be more than 1 – think RSA used in SSL and TLS where hash values are used for “signatures” in RSA certificates for verification of identity).
  4. Describe attack methods that were discovered in its history and the improvements made in the context of the history of the cryptosystem. For example: WEP was found to have the limited number of IVs and with stronger computers, and defined attack methods an attacker could make the WEP encrypted wireless device re-use IVs and then allow the attacker to find patterns in the encryption, or AES’s KRACK attack (https://arstechnica.com/information-technology/2017/10/how-the-krack-attack-destroys-nearly-all-wi-fi-security/), or Google’s recent announcement about quantum supremacy and its implications to encryption previously thought to be unbreakable without an alternate means of attack like compromising the private key (https://www.nytimes.com/2019/10/30/opinion/google-quantum-computer-sycamore.html, https://ai.googleblog.com/2019/10/quantum-supremacy-using-programmable.html, https://www.theverge.com/2019/10/23/20928294/google-quantum-supremacy-sycamore-computer-qubit-milestone)
  5. Describe the currently estimated cryptographic strength

Your report must not contain text from other sources unless it is cited (use the feedback given in labs to guide you)! A source must be cited if:

  1. Small quotations are used (quotations less than 1 full sentence are usually allowed) – but the source must be included in the References section and the source must be cited in the text of the document – refer to the resources linked in report feedback from owl for guidance). Large quotations or entire sections of online resources will earn a grade of 0 for the assignment. I am looking for your understanding of what is going in in the encryption algorithm and how you describe it using terminology covered throughout the semester.
  2. Any specific or highly technical information (see the feedback for labs for more information) MUSTbe cited in the document and the resource that you used to find it listed in your references. (NOTE: nearly everything specific to the algorithm and specific to the algorithm would have to be cited).
  3. When in doubt: cite it! Citation is not only for quotations of the source material. If you use online references to gather information: cite them! Even if you cite them, state the information in your own words!

Found something interesting ?

• On-time delivery guarantee
• PhD-level professional writers
• Free Plagiarism Report

• 100% money-back guarantee
• Absolute Privacy & Confidentiality
• High Quality custom-written papers

Related Model Questions

Feel free to peruse our college and university model questions. If any our our assignment tasks interests you, click to place your order. Every paper is written by our professional essay writers from scratch to avoid plagiarism. We guarantee highest quality of work besides delivering your paper on time.

Grab your Discount!

25% Coupon Code: SAVE25
get 25% !!