Computer Security coursework 3 (part 1) Dr Alexei Vernitski.

Slides:



Advertisements
Similar presentations
60% Tests & Quizzes 30% Homework 10% Participation & Preparation.
Advertisements

Hash Function. What are hash functions? Just a method of compressing strings – E.g., H : {0,1}*  {0,1} 160 – Input is called “message”, output is “digest”
Computer Security coursework 3 (part 2) Dr Alexei Vernitski.
COM621 Interactive Web Development Dr. Jose Santos MS 017A.
Computer Security Set of slides 5 Dr Alexei Vernitski.
Chapter 4  Hash Functions 1 Overview  Cryptographic hash functions are functions that: o Map an arbitrary-length (but finite) input to a fixed-size output.
Mark Dixon, SoCCE SOFT 131Page 1 13 – Coursework 2 Debrief: Numbers Game.
Revisions If you received the grade: “R” If you received the grade: “R” You must do a revision to receive a grade for lab 2. You must do a revision to.
School of Computing Science – CMT1000 Slide 1 Ed Currie Introduction to Programming CMT1000 Lecture 1A.
Software Development, Programming, Testing & Implementation.
COMPSCI 101 S Principles of Programming Lecture 1 – Introduction.
Python programs How can I run a program? Input and output.
Fruitful functions. Return values The built-in functions we have used, such as abs, pow, int, max, and range, have produced results. Calling each of these.
CSC 386 – Computer Security Scott Heggen. Database Security How can we minimize the probability of success by attacks like the one shown in the comic?
CS 1150 – Lab #3 – Representing Numbers TA – Sanjaya Wijeratne – Web Page -
Computer Security coursework 2 Dr Alexei Vernitski.
CSCI 51 Introduction to Computer Science Dr. Joshua Stough January 20, 2009.
Welcome to CS 115! Introduction to Programming. Class URL Write this down!
1 Principles of Computer Science I Note Set 1 CSE 1341.
BSc Final Year Projects in Computing Computer Science, Creative Computing, Games Programming, Business Computing Dr Rodger Kibble.
LAB.  Name : Maram ALdakheel   Web page:  O.H : --  My schedule:
Confidentiality Confidentiality is maintained so long as private keys are secure. Authenticity is possible via public-key encryption by encrypting messages.
Principles of Computer Science I Honors Section Note Set 1 CSE 1341 – H 1.
CS 1150 – Lab #3 – Representing Numbers TA – Sanjaya Wijeratne – Web Page -
1 Computer Science of Graphics and Games MONT 105S, Spring 2009 Session 1 Simple Python Programs Using Print, Variables, Input.
CS 1150 – Lab #8 – Using Algorithms for Painting TA – Sanjaya Wijeratne – Web Page -
Computer Security coursework 1 Dr Alexei Vernitski.
Homework #2: Functions and Arrays By J. H. Wang Mar. 20, 2012.
Connect. Learn. Succeed. © The McGraw-Hill Companies FALL 2011 What is McGraw-Hill Connect? McGraw-Hill Connect® is a web- based assignment and assessment.
1 Project 3 The Kumquat Society Conference. 2 Conference Registration In this project you will write a program to handle a conference registration. The.
Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley STARTING OUT WITH Python Python First Edition by Tony Gaddis Chapter 5 Repetition.
Computer Information Technology. I need you to submit your project electronically to the Hancock website. Before you can submit your project you will.
MTH221 November 6, /6/ DISCRETE MATHEMATICS FOR IT PROFESSIONALS Pair the class Set dates See students progress Assignments Final Exam Quizzes.
DAY 4: EXCEL CHAPTER 1 Sravanthi Lakkimsetty Aug 26,2015.
COMP1927 Course Introduction 16x1
1 Project 2: Using Variables and Expressions. 222 Project 2 Overview For this project you will work with three programs Circle Paint Ideal_Weight What.
1 Project 1: Tickets. 2 Class Ticket Write a definition for class Ticket. A Ticket object corresponds to a physical ticket for a stage show. Attributes.
Computer Security coursework 3 Dr Alexei Vernitski.
0 SAT Online - Student Registration What You Will Need In order to register, you must have: –A working account –Several possible user names* –A unique.
1 Project 3: Farey Sequences. 2 Farey Sequences Further details about Farey sequences, and more examples, can be found in the Wikipedia article:
For Loop GCSE Computer Science – Python. For Loop The for loop iterates over the items in a sequence, which can be a string or a list (we will discuss.
PROBLEM SOLVING AND PROGRAMMING ISMAIL ABUMUHFOUZ | CS 170.
Homework Drop Box on eChalk.  Step 1 – Create Homework Assignment  Step 2 - Students Submit Homework Assignments  Step 3 - Teacher Reviews Homework.
3.1 Fundamentals of algorithms
Lab Introduction Installing Python
A Helpful Guide to CSCE 145 or How I Learned to Love the Machines
CS 1150 – Lab #8 – Using Algorithms for Painting
CHU HAI COLLEGE OF HIGHER EDUCATION DEPARTMENT OF COMPUTER SCIENCE Preparation of Mid-Term Progress Report Bachelor of Science in Computer Science.
CSIS 1117A Computer Programming (C++)
Affinity Program | Client Approved Copy| Native App Landing Page
Welcome to CS 1010! Algorithmic Problem Solving.
Welcome to CS 1010! Algorithmic Problem Solving.
Welcome to CS 1010! Algorithmic Problem Solving.
Overview Basic Information Lecture Labs Lab Reports Homework Exams
Recap.
CSC227: Operating Systems
Can you think of 2 purposes of the operating system?
Academic Advising Assessment Session
Errors.
CSCE 206 Lab Structured Programming in C
Dividing into a Ratio – Four in a Row
CMPT 120 Lecture 15 – Unit 3 – Graphics and Animation
Fractions, Percentages & Ratios of Quantities – Four in a Row
Lecture 17 – Practice Exercises 3
Repeated Percentage Change – Decrease – Four in a Row
Repeated Percentage Change – Increase – Four in a Row
Simple Interest – Calculator – Four in a Row
Lecture 17 – Practice Exercise 3 SOLUTIONS
Time – Converting – Four in a Row
Repeated Percentage Change – Increase & Decrease – Four in a Row
Presentation transcript:

Computer Security coursework 3 (part 1) Dr Alexei Vernitski

Aims of the coursework Learn more about: – Checksums – Luhn checksum as an example of an error detection algorithm – Birthday attacks

Assignment (slide 1) Implement Luhn checksum in Python. Do not write your own code; find a working code on the web. Luhn checksum was not intended to be a cryptographic checksum; this is why it will be a convenient object for us to use as a target of an attack.

Assignment (slide 2) Use a birthday attack to find one even number and one odd number having the same Luhn checksum, as follows – Produce 4 random even numbers in the range between 10 and 99 – Produce 4 random odd two-digit numbers in the range between 10 and 99 – Calculate Luhn checksums of these 8 numbers – With a high probability, you will have one even number and one odd number which have the same checksum. Find these two numbers and print these numbers and their checksum – If you have not found a checksum match, repeat the experiment

What to submit? Submit a ZIP file containing two files: 1.A Python file for Part 1 of Coursework 3 2.A Python file for Part 2 of Coursework 3 Please submit one file, and please submit a ZIP file, it makes opening your assignment easier for me Please include your name and registration number as a comment in your Python code, it makes entering marks easier for me

How shall I mark your code? Your code should do the following: – Generate four random even numbers (in the range between 10 and 99) – Generate four random odd numbers (in the range between 10 and 99) – Find their Luhn checksums and compare them – Print one pair (or all pairs) of an even number and an odd number having the same value of Luhn checksum. Also print the value of the checksum. – You should have a loop in your code to repeat the experiment if a matching pair has not been found.

Programming I attempted the coursework and wrote my solution in Python – My complete code (in addition to the implementation of Luhn checksum, which I took from the web) contains 9 lines – It took me approximately 20 minutes to write it – You may need up to 1 hour to complete the assignment if you need to learn how to generate random numbers in Python, how to work with lists in Python, etc.

Labs Before the submission date of each piece of coursework, we shall have a lab on Monday The purpose of the lab is: – to help you to write your code, in case you have any difficulties – to give you an opportunity to demonstrate your code to me

No collaboration This is an individual assignment I shall look for signs of collaboration and plagiarism