0% found this document useful (0 votes)
19 views

How To Use The Data Security Pakage

The document outlines the requirements for a data security course package. It lists 13 encryption and cryptanalysis algorithms that students must implement, including Caesar cipher, Vigenère cipher, Playfair cipher, Hill cipher, DES, AES, RC4, RSA, and Diffie-Hellman key exchange. It provides instructions and a template for implementing the algorithms as a class library and testing them.

Uploaded by

kokomicheal57
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views

How To Use The Data Security Pakage

The document outlines the requirements for a data security course package. It lists 13 encryption and cryptanalysis algorithms that students must implement, including Caesar cipher, Vigenère cipher, Playfair cipher, Hill cipher, DES, AES, RC4, RSA, and Diffie-Hellman key exchange. It provides instructions and a template for implementing the algorithms as a class library and testing them.

Uploaded by

kokomicheal57
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Data Security Course 2021-2022 ‫جامعة عين شمس‬

Third Year Students [IS] ‫كلية الحاسبات و المعلومات‬

Security Package
1- Required Algorithms in Security Package 2021/2022

Input
Requirement Serial Algorithm
Plaintext Key
1 General Ceaser. Text integer
2 Monoalphabetic. Text Text
3 Auto key Vigenère. Text Text
Mandatory
4 Repeating key Vigenère. Text Text
- Encryption
5 PlayFair. Text Text
- Decryption
Text OR Numbers
- Cryptanalysis 6 Hill Cipher. Text OR Numbers
2X2 OR 3X3
7 Rail Fence of depth Level n. Text Integer (n)
8 Columnar Text Integers
Choose one 9 DES. And 3-DES Text OR HEX Text OR HEX
- Encryption Integers (No., Base)
- Decryption Multiplicative Inverse using Extended Euclid’s.
10
AES. Text OR HEX Text OR HEX

Mandatory 11 RC4. Text OR HEX Text OR HEX


- Encryption 12 RSA. Integers (p, q, M, e)
- Decryption
- Get Keys (for Diffe-Hel) 13 Diffie-Hellman key exchange. Integers (q, α, Xa, Xb)

[Bonus] 15 MD5 TEXT

2- Logistics:
- This Package is a team work task.
- Final Delivery will be scheduled on practical exams week.

Dr. Tamer Mostafa


TA. Mohamed Ashraf – TA. Shamia Magdy
Data Security Course 2021-2022 ‫جامعة عين شمس‬
Third Year Students [IS] ‫كلية الحاسبات و المعلومات‬

-
o Registration Form (here ).
- Registration deadline 12 March 2022.

3- How to use the template code:


o You can get the package from here
o The solution you have consist of 2 projects:
1- “SecurityLibrary”: a dll project in which you’ll write all your code.
2- “SecurityPackageTest”: a unit test project that you’ll use to test your project.

o The “SecurityLibrary” project consists of a class for each algorithm. You have to remove the thrown exception and write
your code in the correct place. Feel free to add the functions you need, you just need to keep the signature of these
functions as they are:
public string Encrypt(string plainText, int key)
public string Decrypt(string cipherText, int key)
public int Analyse(string plainText, string cipherText)

o To test your code:


1- Build the solution.
2- Open test explorer (Test -> Windows -> Test explorer)

Dr. Tamer Mostafa


TA. Mohamed Ashraf – TA. Shamia Magdy
Data Security Course 2021-2022 ‫جامعة عين شمس‬
Third Year Students [IS] ‫كلية الحاسبات و المعلومات‬

Dr. Tamer Mostafa


TA. Mohamed Ashraf – TA. Shamia Magdy
Data Security Course 2021-2022 ‫جامعة عين شمس‬
Third Year Students [IS] ‫كلية الحاسبات و المعلومات‬

3- If you want to run:


a. All tests 🡪 “Run all”
b. A specific test 🡪 right click, Run selected test
c. The tests of a specific algorithm 🡪 open the test class of this algorithm, right click, run tests

4- make sure you’re coding the algorithms correctly.

Dr. Tamer Mostafa


TA. Mohamed Ashraf – TA. Shamia Magdy

You might also like