Cryptography and Applications Assessment
Cryptography and Applications Assessment
Type: Individual
Note: it is your responsibility to make sure that your work is complete and available for marking by the deadline.
Make sure that you have followed the submission instructions carefully, and your work is submitted in the correct
format, using the correct hand-in mechanism (e.g., Moodle upload). If submitting via Moodle, you are advised to
check your work after upload, to make sure it has uploaded properly. If submitting via OneDrive, ensure that your
tutors have access to the work. Do not alter your work after the deadline. You should make at least one full backup
copy of your work.
Page | 1
Assessment Mitigation
If there is a valid reason why you are unable to submit your assessment by the deadline you may apply for
assessment mitigation. There are two types of mitigation you can apply for via the unit area on Moodle (in the
‘Assessments’ block on the right-hand side of the page):
• Self-certification: does not require you to submit evidence. It allows you to add a short extension to a
deadline. This is not available for event-based assessments such as in-class tests, presentations, interviews,
etc. You can apply for this extension during the assessment weeks, and the request must be made before the
submission deadline.
• Evidenced extensions: requires you to provide independent evidence of a situation which has impacted you.
Allows you to apply for a longer extension and is available for event-based assessment such as in-class test,
presentations, interviews, etc. For event-based assessments, the normal outcome is that the assessment will
be deferred to the Summer resit period.
Further information about Assessment Mitigation is available on the dedicated Assessments page:
https://www.mmu.ac.uk/student-life/course/assessments#ai-69991-0
Plagiarism
Plagiarism is the unacknowledged representation of another person’s work, or use of their ideas, as one’s own.
Manchester Metropolitan University takes care to detect plagiarism, employs plagiarism detection software, and
imposes severe penalties, as outlined in the Student Code of Conduct and Regulations for Undergraduate
Programmes. Poor referencing or submitting the wrong assignment may still be treated as plagiarism. If in doubt,
seek advice from your tutor.
As part of a plagiarism check, you may be asked to attend a meeting with the Unit Leader, or another
member of the unit delivery team, where you will be asked to explain your work (e.g., explain the code in a
programming assignment). If you are called to one of these meetings, it is very important that you attend.
Assessment Regulations
For further information see Assessment Regulations for Undergraduate/Postgraduate Programmes of Study on
the Student Life web pages.
Formative feedback will be provided verbally during the assignment
support labs. Formative feedback may also be provided online via
Formative Feedback: MS Teams, at the students request. This formative feedback will
help you to prepare your own version of these tasks for the
summative assignment.
Assignment
The first task is related to exploring the theoretical aspects of modern cryptographic algorithms. You will need to
understand the mathematical underpinning of the algorithms and the considerations that influenced their designs.
You must choose a cryptographic algorithm from several possible topics. You will then need to explain the inner
workings of the algorithm.
Note: You can choose your algorithm from one of two categories:
A choice from the Simple category will limit the possible marks available for the report, as indicated in the marking
scheme below.
Provide specific scenarios in which your chosen algorithm can be used. Support your use-case with existing uses in
real-world applications where possible, for example including authentication protocols and other emerging
applications.
For this task, you will be exploring solutions to the problem of secure storage of data. You will need to implement
data encryption along with a suitable key management (secure way to share key) architecture in software. The task
is to produce the encrypted backup of files and folders. At the very minimum, the implementation must be able to
encrypt/decrypt files using separate keys for two different users.
Note: You can use any algorithm of your choice, its not mandatory to use the same algorithm as in Task 1. You are
required to include suitable comments in the code.
Further marks will be awarded based on how well the submitted implementation expands on this single requirement.
Possible extensions include:
You must record a 10–15-minute video. In this video, apart from the explanations of Task 1 and Task 2, you must:
For the submission of Task 1 and Task 2, the following instructions must be considered.
• Explain the introduction, mathematical computations underpinning cryptographic algorithms and the
applications using the PowerPoint slides.
• Demonstrate the working (perform encryption and decryption) of your implementation by sharing the screen
recording.
• Briefly explain how the cryptographic algorithms are used in your implementation.
• You must make explicitly clear how much and which parts of your source code are original and which are
taken from/derived from other sources.
• You must have extensive comments throughout your source code to explain how it works.
Support
The teaching team is available to support your work on this assignment. Support can be obtained in the timetabled
lab sessions. Outside of timetabled lab sessions, you can also contact the teaching time for additional support (contact
details are available on the unit Moodle page).
Feedback
Formative feedback will be provided verbally during the assignment support labs. This formative feedback will help
you to prepare your own version of these tasks for the summative assignment. Individual summative feedback (incl.
the marks) will be uploaded via a comments/marking sheet on Moodle. General feedback given to all students on
Moodle.
Detailed Marking Scheme
Page | 5
original. sources were in a public
attributed. repository (e.g.,
GitHub).
Video Presentation [20 The video The video The video The video The video
marks] presentation points presentation has presentation meets presentation is presentation
are completely/ some issues with the basic competent, with excels in video
almost ignored. quality, audio requirements for reasonable quality, audio
clarity, time video quality, audio quality, clear clarity, time
management, clarity, time audio, appropriate management,
engagement, or management, time management, engagement, and
explanation clarity, engagement, and decent explanation
affecting the explanation clarity. engagement, and clarity. It
overall clear explanations. effectively
effectiveness and communicates the
professionalism. content and
maintains viewer
interest, providing
a professional and
informative
experience.
: