0% found this document useful (0 votes)
74 views6 pages

Cryptography and Applications Assessment

This document provides details for an individual assessment for a cryptography unit. The assessment consists of 3 tasks: 1) explaining a cryptographic algorithm and its applications, 2) implementing encryption software, and 3) presenting the first two tasks in a 10-15 minute video. The assessment is worth 100% and is due by the deadline on Moodle. Late submissions within 7 days will be capped at 40% and after 7 days will be capped at 0%. Support is available from the teaching team.

Uploaded by

Mayukh Saha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
74 views6 pages

Cryptography and Applications Assessment

This document provides details for an individual assessment for a cryptography unit. The assessment consists of 3 tasks: 1) explaining a cryptographic algorithm and its applications, 2) implementing encryption software, and 3) presenting the first two tasks in a 10-15 minute video. The assessment is worth 100% and is due by the deadline on Moodle. Late submissions within 7 days will be capped at 40% and after 7 days will be capped at 0%. Support is available from the teaching team.

Uploaded by

Mayukh Saha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

Department of Computing and Mathematics

ASSESSMENT COVER SHEET 2023/24

Unit Code and Title: 6G7V0033 Cryptography and Applications

Assessment Set By: Safiullah Khan

Assessment ID: 1CWK100

Assessment Weighting: 100%

Assessment Title: Cryptographic Protocol Analysis and Software Implementation

Type: Individual

Hand-In Deadline: See Moodle

Hand-In Format and Video recording of a PowerPoint Presentation and


Mechanism: implementation demonstration to be uploaded to Moodle

Learning outcomes being assessed:

LO1 Explain the mathematical computations underpinning cryptographic algorithms.


LO2 Critically analyse basic cryptographic algorithms and propose appropriate uses for them.
LO3 Explain use of cryptography in authentication protocols and other emerging applications.
LO4 Code and modify algorithms to perform specific encryption/cryptographic tasks.
LO5 Apply a wide range of transferable skills and attributes applicable to industry and research.

Note: it is your responsibility to make sure that your work is complete and available for marking by the deadline.
Make sure that you have followed the submission instructions carefully, and your work is submitted in the correct
format, using the correct hand-in mechanism (e.g., Moodle upload). If submitting via Moodle, you are advised to
check your work after upload, to make sure it has uploaded properly. If submitting via OneDrive, ensure that your
tutors have access to the work. Do not alter your work after the deadline. You should make at least one full backup
copy of your work.

Penalties for late submission

The timeliness of submissions is strictly monitored and enforced.


All coursework has a late submission window of 7 calendar days, but any work submitted within the late window
will be capped at 40%, unless you have an agreed extension. Work submitted after the 7-day late window will be
capped at zero unless you have an agreed extension. See ‘Assessment Mitigation’ below for further information
on extensions.
Please note that individual tutors are unable to grant extensions to assessments.

Page | 1
Assessment Mitigation

If there is a valid reason why you are unable to submit your assessment by the deadline you may apply for
assessment mitigation. There are two types of mitigation you can apply for via the unit area on Moodle (in the
‘Assessments’ block on the right-hand side of the page):

• Self-certification: does not require you to submit evidence. It allows you to add a short extension to a
deadline. This is not available for event-based assessments such as in-class tests, presentations, interviews,
etc. You can apply for this extension during the assessment weeks, and the request must be made before the
submission deadline.

• Evidenced extensions: requires you to provide independent evidence of a situation which has impacted you.
Allows you to apply for a longer extension and is available for event-based assessment such as in-class test,
presentations, interviews, etc. For event-based assessments, the normal outcome is that the assessment will
be deferred to the Summer resit period.
Further information about Assessment Mitigation is available on the dedicated Assessments page:
https://www.mmu.ac.uk/student-life/course/assessments#ai-69991-0

Plagiarism

Plagiarism is the unacknowledged representation of another person’s work, or use of their ideas, as one’s own.
Manchester Metropolitan University takes care to detect plagiarism, employs plagiarism detection software, and
imposes severe penalties, as outlined in the Student Code of Conduct and Regulations for Undergraduate
Programmes. Poor referencing or submitting the wrong assignment may still be treated as plagiarism. If in doubt,
seek advice from your tutor.
As part of a plagiarism check, you may be asked to attend a meeting with the Unit Leader, or another
member of the unit delivery team, where you will be asked to explain your work (e.g., explain the code in a
programming assignment). If you are called to one of these meetings, it is very important that you attend.

If you are unable to upload your work to Moodle


If you have problems submitting your work through Moodle, you can email it to the Assessment Team’s
Contingency Submission Inbox using the email address [email protected]. You should say in your email which
unit the work is for, and provide the name of the Unit Leader. The Assessment team will then forward your work
to the appropriate person. If you use this submission method, your work must be emailed before the published
deadline, or it will be logged as a late submission. Alternatively, you can save your work into a single zip folder
then upload the zip folder to your university OneDrive and submit a Word document to Moodle which includes a
link to the folder. It is your responsibility to make sure you share the OneDrive folder with the Unit Leader,
or it will not be possible to mark your work.

Assessment Regulations
For further information see Assessment Regulations for Undergraduate/Postgraduate Programmes of Study on
the Student Life web pages.
Formative feedback will be provided verbally during the assignment
support labs. Formative feedback may also be provided online via
Formative Feedback: MS Teams, at the students request. This formative feedback will
help you to prepare your own version of these tasks for the
summative assignment.

Individual summative feedback (incl. the marks) will be uploaded


Summative Feedback: via a comments/marking sheet on Moodle. General feedback given
to all students on Moodle.

Assignment

The assignment consists of the following tasks.

Task 1 - Algorithm Description and Applications [40 marks]

The first task is related to exploring the theoretical aspects of modern cryptographic algorithms. You will need to
understand the mathematical underpinning of the algorithms and the considerations that influenced their designs.
You must choose a cryptographic algorithm from several possible topics. You will then need to explain the inner
workings of the algorithm.
Note: You can choose your algorithm from one of two categories:

1. Simple (algorithms covered completely in the unit)


2. Complex (algorithms briefly/not covered in the unit)

A choice from the Simple category will limit the possible marks available for the report, as indicated in the marking
scheme below.

Provide specific scenarios in which your chosen algorithm can be used. Support your use-case with existing uses in
real-world applications where possible, for example including authentication protocols and other emerging
applications.

Task 2 – Cryptographic Implementation [40 marks]

For this task, you will be exploring solutions to the problem of secure storage of data. You will need to implement
data encryption along with a suitable key management (secure way to share key) architecture in software. The task
is to produce the encrypted backup of files and folders. At the very minimum, the implementation must be able to
encrypt/decrypt files using separate keys for two different users.
Note: You can use any algorithm of your choice, its not mandatory to use the same algorithm as in Task 1. You are
required to include suitable comments in the code.

Further marks will be awarded based on how well the submitted implementation expands on this single requirement.
Possible extensions include:

• Inclusion of mechanisms to protect integrity as well as confidentiality


• Use of asymmetric encryption/digital signatures
• Good key management practices
• Implementation of novel cryptographic algorithms (beyond what was explicitly covered in the unit)
Task 3 – Video Presentation [20 marks]

You must record a 10–15-minute video. In this video, apart from the explanations of Task 1 and Task 2, you must:

• Strictly adhere to the time duration.


• Use a camera with good resolution, with proper lightening and uncluttered background.
• Speak clearly with appropriate volume and record in a quiet environment to minimize background noise.
• Maintain eye contact with camera.
• Make clear explanation of the tasks.

Details for Video Submission

For the submission of Task 1 and Task 2, the following instructions must be considered.

• Explain the introduction, mathematical computations underpinning cryptographic algorithms and the
applications using the PowerPoint slides.
• Demonstrate the working (perform encryption and decryption) of your implementation by sharing the screen
recording.
• Briefly explain how the cryptographic algorithms are used in your implementation.
• You must make explicitly clear how much and which parts of your source code are original and which are
taken from/derived from other sources.
• You must have extensive comments throughout your source code to explain how it works.

Support

The teaching team is available to support your work on this assignment. Support can be obtained in the timetabled
lab sessions. Outside of timetabled lab sessions, you can also contact the teaching time for additional support (contact
details are available on the unit Moodle page).

Feedback

Formative feedback will be provided verbally during the assignment support labs. This formative feedback will help
you to prepare your own version of these tasks for the summative assignment. Individual summative feedback (incl.
the marks) will be uploaded via a comments/marking sheet on Moodle. General feedback given to all students on
Moodle.
Detailed Marking Scheme

Poor Acceptable Good Very Good Excellent


Criteria 0-39% 40-49% 50-59% 60-69% 70-100%
For Task 1 only: A choice of a complex algorithm has no restriction on marks.
For Task 1 only: A choice of a simple algorithm will be restricted to marks in the range Poor to Very Good
Algorithm The algorithm The general A straightforward The algorithm The algorithm
Description and presentation was function of the presentation of a selected was selected was
Applications [40 unclear and/or algorithm was cryptographic simple. The complex, taken
marks] incomplete. presented but with algorithm with some internal operations from the latest
Applications of missing/incorrect brief internal are thoroughly research in the
algorithm are details. Practical operations. A presented. A literature. The
missing or use of the reasonable use of the detailed use-case internal operations
incoherent. algorithm is algorithm was was provided that are thoroughly
presented in a presented. highlights the presented. A
general/vague purpose and detailed use-case
manner without benefits of the was provided that
much context. algorithm. The highlights the
presentation was purpose and
complete and benefits of the
accurate. algorithm. The
presentation was
complete and
accurate.
Cryptographic Implementation is The presentation Implementation Implementation is Original and
Implementation missing or not for implementation performs the basic functionally innovative
[40 marks] working. is incomplete. requirement with complete with implementation
Mandatory some small numerous that satisfies the
features are only additional capabilities and requirements
partially complete. features/capabilities features beyond using several
No additional beyond the the basic ones. complex and
features are mandatory ones. The Comments were appropriate
discussed. code was organised provided cryptographic
Comments in code suitably with throughout that algorithms and
were generally good clearly explained techniques. Code
insufficient/not comments. the code. All is made available

Page | 5
original. sources were in a public
attributed. repository (e.g.,
GitHub).
Video Presentation [20 The video The video The video The video The video
marks] presentation points presentation has presentation meets presentation is presentation
are completely/ some issues with the basic competent, with excels in video
almost ignored. quality, audio requirements for reasonable quality, audio
clarity, time video quality, audio quality, clear clarity, time
management, clarity, time audio, appropriate management,
engagement, or management, time management, engagement, and
explanation clarity, engagement, and decent explanation
affecting the explanation clarity. engagement, and clarity. It
overall clear explanations. effectively
effectiveness and communicates the
professionalism. content and
maintains viewer
interest, providing
a professional and
informative
experience.
:

You might also like