0% found this document useful (0 votes)
181 views3 pages

COMP522 Assign 1 10

This document outlines the details of Assignment 1 for the COMP522 course. It will contribute 12% to the student's overall grade. For the assignment, students must write a program that implements password-based encryption and decryption. They must then extend the program to include classes that perform a brute-force search attack on the encryption/decryption by iterating through passwords to decrypt a known ciphertext. Students must analyze the time it takes to find passwords of different lengths and investigate how search time is affected by the iteration count. The work must be submitted electronically by November 12, 2010.

Uploaded by

Adie Einstein
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
181 views3 pages

COMP522 Assign 1 10

This document outlines the details of Assignment 1 for the COMP522 course. It will contribute 12% to the student's overall grade. For the assignment, students must write a program that implements password-based encryption and decryption. They must then extend the program to include classes that perform a brute-force search attack on the encryption/decryption by iterating through passwords to decrypt a known ciphertext. Students must analyze the time it takes to find passwords of different lengths and investigate how search time is affected by the iteration count. The work must be submitted electronically by November 12, 2010.

Uploaded by

Adie Einstein
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Department of Computer Science

COMP522 Individual coursework


Assignment 1
Alexei Lisitsa
[email protected]
1 Overall marking scheme
The coursework for COMP522 consists of two assignments, contributing to 25% of the nal
mark. The contribution of the single assignments is as follows:
Assignment 1 12%
Assignment 2 13%
TOTAL 25%
Failure in any assignment may be compensated for by higher marks in other components of
the module.
This document describes Assignment 1. Assignment 1 will be marked according to the
following broad criteria:
correctness of the program;
presence/absence of the report on the experiments;
clarity of the arguments explaining the observed behaviour.
2 Aims of the Assignment 1
to illustrate the practical complexity of brute-force search attacks on the password-
based encryption;
to test the students skills of using symmetric cryptography primitives in Java pro-
grammes;
to test the students skills in the analysis of the experiments.
1
3 Brute-force search attack on the password-based en-
cryption
This exercise asks you to write a program implementing password-based encryption and
decryption, and then to extend it with the class(es) implementing brute-force search attack.
You need to
implement a program which takes an user password as the input and performs en-
cryption of the predened plaintext; then it asks the password again and decrypt the
ciphertext;
extend your program with the class(es) implementing brute-force search attack on your
encryption/decryption procedure;
the attacker knows:
the predened plaintext;
the ciphertext produced;
the salt;
the iteration count;
but no password.
thus an attacker should iterate over all passwords up to the given length n, encrypt
the plaintext and compare the result with the given ciphertext;
nd average time required to nd a correct password for the predened plaintext/ciphertext,
xed value of the salt and small values of n;
investigate how the search time depends on the iteration count value.
4 Useful information
You may nd it useful to have a look on the simple program implementing password-based
encryption:
http://www.csc.liv.ac.uk/~alexei/COMP522/PBEs.java
JCE Reference Guide can be found at
http://java.sun.com/javase/6/docs/technotes/guides/security/crypto/CryptoSpec.html
2
5 Submission
You need to submit:
Java code and compiled classes of your program
short report on experiments
The work must be submitted electronically by going to the Web page at
http://www.csc.liv.ac.uk/teaching/modules/newmscs1/comp522.html
and clicking the link labelled Assignment submission. This must be done by
4.00pm on Friday November 12, 2010
Please be aware that the standard University policies
on plagiarism, collusion and fabricated data
www.liv.ac.uk/tqsd/pol_strat_cop/cop_assess/cop_assess.doc, Section 8
and
on late submission
www.liv.ac.uk/tqsd/pol_strat_cop/cop_assess/cop_assess.doc, Section 6
are applied to this assignment.
3

You might also like