5/16/2020 S-ITC595_202030_SM_I @CSU https://interact2.csu.edu.au/webapps/csu-serviceslink-BB5c1c4db3261aa/link?type=msi&course_id=_45745_1&mode=view 1/1 TASK You have been asked to develop a data...

1 answer below »
file attached



5/16/2020 S-ITC595_202030_SM_I @CSU https://interact2.csu.edu.au/webapps/csu-serviceslink-BB5c1c4db3261aa/link?type=msi&course_id=_45745_1&mode=view 1/1 TASK You have been asked to develop a data transfer system from Port Macquarie to Wagga Wagga Campus. In this task, your job is to ensure that stream data is protected. In order to ensure that your system operates in a secure manner, you need to develop a prototype of your system in CryptoTool 2. CrypTool 2 (CT2) is an open-source program offering an innovative visual programming GUI to experiment with cryptographic procedures and to animate their cascades. You can download CT2 at https://www.cryptool.org/en/cryptool2 . You can also watch Short Introduction to CrypTool 2 at https://www.youtube.com/channel/UC8_FqvQWJfZYxcSoEJ5ob- Q. Task 1: In this task, you are required to: (5 Marks) 1. Search RSA (Rivest – Shamir – Adleman) and AES (Advanced Encryption Standard) algorithms suitable for the above scenario, keep in mind that you can expand your system to more than one user, 2. Select a cryptographic algorithm and discuss why you think your selected algorithm is appropriate for the above scenario, 3. Design and develop a cryptographic system to encrypt live webcam data from Port Macquarie to Wagga Wagga using your chosen algorithm, 4. Discuss the strengths and weaknesses of your system, 5. You must document your approach with a description of the screenshots. Task 2: In this task, you are required to: (15 Marks) 1. Search HMAC, 1. Part 1: Design and develop a message-based system to encrypt and decrypt messages using an RSA algorithm, 2. Part 2: On the basis of Part 1 system, you should integrate the HMAC algorithm into your system, 1. The HMAC has to check message received from Port Macquarie, 2. If the integrity of the message approved, then decrypt the message, 3. Else, a message, or false Boolean output. 3. Discuss the strengths and weaknesses of your system, 4. You must document your approach with a description of the screenshots. RATIONALE This assessment task will assess the following learning outcome/s: be able to justify security goals and the importance of maintaining the secure computing environment against digital threats. be able to explain the fundamental concepts of cryptographic algorithms. https://www.cryptool.org/en/cryptool2 https://www.youtube.com/channel/UC8_FqvQWJfZYxcSoEJ5ob-Q
Answered Same DayMay 23, 2021

Answer To: 5/16/2020 S-ITC595_202030_SM_I @CSU...

Kshitij answered on May 24 2021
159 Votes
Task 1
a. For the designing the information system cryptography tool is been used. This system is b
een designed for the transfer of information from Port Macquarie to Wagga campus. While the development of the system camera is been used that is been place on the Wagga campus.
b. AES is been used for the encryption of the information, the cipher standard that is been used is RSA. The AES is been used because it includes the data of 128 to 256 keys. This is the main reason for the selection of AES and RSA standards for the information transfer.
c. This attached below screen shot shows the transfer of information from one campus to another and this is been designed over the crypto tool (Goldreich, 2019).
d. The strength and weakness of the system are as follows:
    Strength
    Weakness
    It is the reliable form to transfer the data.
    The system...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here