Sale!

VE475 Introduction to Cryptography Project 2 solved

$35.00 $21.00

Category:

Description

5/5 - (1 vote)

Discuss with your teammate which subjects you desire to investigate. If you all agree on a topic not
listed below please inform us of your choice.
For each topic some references or simple guidelines are provided together with a goal to achieve. Thoroughly investigate the chosen subject from a cryptographic perspective.
This project should take more time than project 1. Therefore do not wait the last minute to start up.
Writing a good project requires several days of work, so make sure you start early enough.
Any source of information can be used (internet, textbooks, OS documentation. . . ). However, in any
case, do not recopy the materials and quote your sources.
When reading new information, understand it, process it, consider how it relates to what you already
know, and how you can reach conclusions beyond the ones offered in your source.
Available topics:
1. Side channel attacks
ˆ Article: http://mostconf.org/2012/papers/21.pdf
ˆ Goal: as much as possible reproduce the experiments and recover a secret key
2. Breaking WEP encryption
ˆ How is WEP encryption working, and how to break it?
ˆ Goal: implement an attack to recover the secret key
Note: the implementation must be yours, the goal is not to learn how to run aircrack-ng,
but to implement the attack yourself
3. Tor, an anonymity network
ˆ Official Tor website: https://www.torproject.org/
ˆ Goal: understand “onion routing”, study the code and present at least two attacks, taken
from research articles, on the Tor network
4. Hash functions
ˆ Website on sponge functions and SHA-3: http://sponge.noekeon.org/
ˆ Goal: understand the sponge construction and implement Keccak
5. TrueCrypt is dead
ˆ Website with much documentation: http://andryou.com/truecrypt/index.php
ˆ Goal: carefully read all the documentation and understand all the possible attacks and how to
prevent them. How secure was TrueCrypt and why is it dead?
Note: the official reason is very unlikely to be the right one. . .
6. OpenSSL
ˆ Website: https://www.openssl.org/news/vulnerabilities.html
ˆ Goal: study the code and understand the many recent security issues
7. GnuPG
ˆ Website: https://www.gnupg.org/
ˆ Goal: study the code and understand the various attacks that lead to the “important security fixes”
mentioned on their website
8. Multiple polynomials quadratic sieve*
ˆ Simple presentation: http://www.cs.virginia.edu/crab/QFS˙Simple.pdf
ˆ Goal: fully understand the mathematics behind the MPQS and implement it
9. Shor algorithm∗
ˆ Article: http://epubs.siam.org/doi/pdf/10.1137/S0036144598347011
ˆ Goal: understand the basics of quantum computing and explain how RSA can be broken using a
quantum computer
10. Bitcoin∗
ˆ Website: https://en.bitcoin.it/
ˆ Goal: understand how the bitcoin currency works and how it makes use of more advanced cryptography and mathematics
*Those slightly more advanced projects will benefit from a softer grading policy.