KEMBAR78
Complex Engg Problem | PDF | Public Key Cryptography | Cryptography
100% found this document useful (1 vote)
235 views2 pages

Complex Engg Problem

The document outlines an assignment for students to design a secure communication infrastructure utilizing both public and private key cryptosystems that selects the appropriate encryption algorithm depending on the communication scenario and user requirements. Students must investigate the performance and encryption needs of different scenarios and design a solution that incorporates both symmetric and asymmetric cryptographic algorithms. The deliverable should include a complete design of the secure communication system with code or a graphical layout.

Uploaded by

aliumer
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
235 views2 pages

Complex Engg Problem

The document outlines an assignment for students to design a secure communication infrastructure utilizing both public and private key cryptosystems that selects the appropriate encryption algorithm depending on the communication scenario and user requirements. Students must investigate the performance and encryption needs of different scenarios and design a solution that incorporates both symmetric and asymmetric cryptographic algorithms. The deliverable should include a complete design of the secure communication system with code or a graphical layout.

Uploaded by

aliumer
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

UNIVERSITY OF ENGINEERING & TECHNOLOGY, MARDAN

Department of Computer Software Engineering

Assignment # 4: Complex Engineering Problem


Subject Name: SE-409 Enterprise Security Architecture
Semester: Spring 2019 (8th) Marks: 10
Assigned on: 18-6-2019 Submission Due Date: 8-7-2019

Target CLO-3, PLO-3

Note:
1) This assignment should be undertaken by the students individually.

Problem Statement:

Often there is confusion on using Symmetric and Asymmetric cryptosystems for different
scenarios as each of these algorithms have their own advantages and disadvantages. Selecting
inappropriate algorithm for a particular scenario may lead to inefficiency of the overall system.
Therefore, there is a need to design an efficient and secure cryptographic system for
communication between two parties depending on various scenario.

Objectives:

Design a secure communication infrastructure utilizing both public and private key
cryptosystems. Depending on the user requirements (scenario), the system should utilize
appropriate algorithm for encryption and key exchange.
The system should be fast and as well as provides enough level of security in different types of
scenario of communication.

Investigation/ Evaluation

Students need to investigate the performance and adequate level of encryption required for a
particular scenario and type of communication between two parties. Various public key
cryptographic algorithms (e.g., RSA) and private key algorithms (DES, RSA) should be investigated
for its application on each scenario.

Design:

Students need to design a solution which achieve the mentioned objectives.

Deliverables:

The deliverable should consist of: (i) Complete design of secure communication system along
with pseudocode/programming code/graphical layout of design.

--End of Assignment--
Complex Engineering Problem

Attributes Conformance

S# Attribute Present in the


Problem
1 Range of conflicting requirements: This Yes
assignment is intended to challenge
students to address a wide range of
conflicting issues.
2 Depth of Analysis required: There is no Yes
obvious solution to this assignment. Creative
thinking in terms of usage of appropriate
technologies to design is central to this
assignment.
3 Depth of knowledge required: Yes
Demonstration of sound engineering design
principles and problem solving is required to
solve this assignment. In-depth knowledge
of Enterprise Security and cryptography is
required to accomplish this task.
4 Familiarity of issues: Students are not Yes
familiar with the issues which may be
encountered as they are doing/experiencing
this task for the first time. Significant
challenges beyond what students have
experienced in previous projects are present
in this assignment.
5 Extent of applicable codes: Is not outside No
the problems encompassed by standards
and codes of practice for professional
engineers.
6 Extent of stakeholder Involved: Diverse Yes
groups of stakeholders (Students, faculty
and allied-staff) with involvement and level
of widely varying needs.
7 Consequences: Have significant Yes
consequences in a range of contexts. For
example, cybercrimes, online frauds,
hacking etc.
8 Interdependence: The system consists of Yes
sub-systems and components. Students
must address the design of each component
separately and in combination with the
other components.

You might also like