King Abdulaziz University
College of Computing and Information Technology Information Systems Department
SYSTEM COURSE: CPIT425 TITLE: INFORMATION SECURITY
INSTRUCTOR: Dr.Nahla Aljojo CPIT 425 Course Project
DATE: Term 2/2014 SUBMISSION DATE: 6/4/2014
Presentation Date: 8/4/2014
The course project is intended to evaluate your understanding of the topic of information security in general and the course itself in specific. This is a group project where each group may consist of three to four students.
Project Ideas
A list of course projects for is available below. Your group can choose any one of them. Alternatively, you can choose a topic on your own. In the latter case, you need to discuss it with me first.
Authentication Protocol
Design and implement a simple authentication protocol using the cryptographic techniques covered in the course. Your project should address the following:
Abstract
The implementation should include a sender and a receiver module.
What are the limitations of the protocol
Propose attacks against the protocol
Conclusion
References( Harvard style) DES-CBC
Implement DES in CBC mode.
Abstract
The implementation should include a sender and a receiver module.
What are the limitations of the DES-CBC
Propose attacks against the DES-CBC
Conclusion
References( Harvard style)
Diffie-Hellman Key Exchange for Additive Cipher
Implement a simple additive cipher where the key is initially distributed using the Diffie-Hellman Key Exchange algorithm.
Triple DES
Study the Triple DES problem and prepare a report. Your report should address the following:
Abstract
Introduction to Triple DES
King Abdulaziz University
College of Computing and Information Technology Information Systems Department
SYSTEM COURSE: CPIT425 TITLE: INFORMATION SECURITY
INSTRUCTOR: Dr.Nahla Aljojo CPIT 425 Course Project
DATE: Term 2/2014 SUBMISSION DATE: 6/4/2014
Presentation Date: 8/4/2014
State of the art literature review: Discuss the latest techniques used in Triple DES
Proposed solution: The proposed solution may be very simple but it should reflect your clear understanding of the problem.
Explain the algorithm of Triple DES by drawing diagram?
Conclusion
References( Harvard style) Hash Algorithms
Study the Hash Algorithms and types problem and prepare a report. Your report should address the following:
Abstract
Introduction to Hash Algorithms
State of the art literature review: Discuss the latest techniques used in Hash Algorithms and types
Proposed solution: The proposed solution may be very simple but it should reflect your clear understanding of the problem.
Conclusion
References( Harvard style) Computer Security Incident Response
Study what is incident response and prepare a report. Your report should address the following:
Abstract
Introduction to incident response
State of the art literature review: Discuss the latest techniques/plans used in incident response
Proposed plan: The proposed plan may be very simple but it should reflect your clear understanding of the problem.
Conclusion
References( Harvard style) X.509 & Public Key Infrastructure
Study the X.509 & Public Key Infrastructure problem and prepare a report. Your report should address the following:
Abstract
Introduction to X.509 & Public Key Infrastructure
King Abdulaziz University
College of Computing and Information Technology Information Systems Department
SYSTEM COURSE: CPIT425 TITLE: INFORMATION SECURITY
INSTRUCTOR: Dr.Nahla Aljojo CPIT 425 Course Project
DATE: Term 2/2014 SUBMISSION DATE: 6/4/2014
Presentation Date: 8/4/2014
State of the art literature review: Discuss the latest techniques used X.509 & Public Key Infrastructure
Attacks against X.509 & Public Key Infrastructure.
Conclusion
References( Harvard style)
Report Requirements
Your report should address the points listed for the topic you chose. The report must not be a
copy/paste of the Wikipedia article on that topic. This does not mean that you cannot use the Internet for your research. Include proper references.
Each group should consist of 3-5 student members. Select your own group member. The instructor will not be responsible for those who do not have a group.
Each group must submit a report contain of:
Softcopy of report. Name your file as <group_Name> E.g. ABC. send me it to this email
The format of report :
Cover page with the members’ names, ID and group number (according to the list of names)
Text times roman font 12 or equivalent
Line spacing 1.5 and must include page numbering
Properly bound (Do not submit loose pages in folders. The instructor will not be responsible if any of the pages are missing).
Indent the first line of all paragraphs
Justify all paragraphs
The References styles according to Harvard styles
Submission paper length: 6 pages minimum, 8 pages maximum.
Presentation
Limit your presentation to five slides only excluding any references. Each group will be assigned a 10 minutes slot where half of this time will be spend on the presentation and half on question/answers.
Grading
King Abdulaziz University
College of Computing and Information Technology Information Systems Department
SYSTEM COURSE: CPIT425 TITLE: INFORMATION SECURITY
INSTRUCTOR: Dr.Nahla Aljojo CPIT 425 Course Project
DATE: Term 2/2014 SUBMISSION DATE: 6/4/2014
Presentation Date: 8/4/2014
Grading will be based upon the following in the decreasing order of priority
Question/Answer
Report
Presentation
Each student will be individually graded of his/her contribution to the project. The project is 15% of your grade and I am looking forward to a considerable effort on your part. If a student is not able to answer any of the questions asked, he/she will receive a zero in the project so be prepared for what you present and what you include in your report.