Find Jobs
Hire Freelancers

Cryptography Essay and Calculations

$8-15 USD / hour

In Progress
Posted over 9 years ago

$8-15 USD / hour

Learning Outcomes tested by this assignment: 1. define and explain the meaning of a range of terms in cryptology 2. demonstrate a thorough understanding of, as well as critically analyse, algorithms for private-key and public-key ciphers, digital signatures and authentication; 3. analyse critically the merits of various strategies for key management and key exchange and demonstrate a keen awareness of the additional complexities imposed by the need for effective practical protocols; 4. use appropriate mathematical techniques that underpin cryptology and associated technologies with confidence Scenario (This is a fictitious scenario.) An environmental charity wants to monitor the usage of electricity, gas and water by homes remotely for forecasting and predictive purposes. It has a central HQ in London, and has signed up a number of volunteers throughout the UK. The volunteers will log into a Web-based system at monthly intervals to complete a survey of their usage of utilities and other factors. The web-based service is hosted by a different company and employees of the charity log into the same web-based system as well, in order to extract the recorded data at regular intervals. The charity employs a web developer who maintains the site. Task 1: Password Storage Description (1200 words) (LO 1, 2, 4) Your task is to describe clearly one secure mechanism by which passwords could be stored on the web server, so that a person who is able to get hold of the information stored in the password database stored on the server nevertheless cannot obtain the actual password without considerable effort. You should also try to estimate the length of time this would take an attacker to obtain a password from the file, given reasonable (and researched) assumptions that you make. You should assume that this is for the passwords INITIALLY set by the charity and not for passwords selected by the user later. Ensure you define and describe cryptographic terms you use. Task 2: Password Distribution and Password Security (1200 words) (LO 3) (a) Devise a good mechanism to allow passwords and usernames to be distributed to the volunteer users. Discuss the security implications of your mechanism. (b) Then, assuming that the users can change these initial passwords to ‘something more memorable’ while they are on the web site, describe some computer implementable rules (NB you do not have to produce an implementation) that would help ensure that the new password was a good password. Harvard Referencing Format with Min. of 20 references ( it cannot contain only online sources - will need books and articles ) Budget 20$
Project ID: 6764966

About the project

6 proposals
Remote project
Active 9 yrs ago

Looking to make some money?

Benefits of bidding on Freelancer

Set your budget and timeframe
Get paid for your work
Outline your proposal
It's free to sign up and bid on jobs
6 freelancers are bidding on average $21 USD/hour for this job
User Avatar
I am a professional academic writer and dealing in all types of writings. I have worked at various platforms before. I can assure you A+ work on time.
$13 USD in 2 days
4.6 (115 reviews)
5.7
5.7
User Avatar
I can write it very well I've expertise to write critical analysis and evaluation of a project. This job will be Harvard reference and 20 references will be added. It will take upto 5 to 6 hrs.
$10 USD in 30 days
5.0 (1 review)
0.4
0.4
User Avatar
Iam a amazon review writer and have 50 amazon accounts, all amazon accounts is USA name and purchase verified. So if you need review for your product on amazon contact me. I Can Do: * Amazon Product Review Writing * Amazon Product Review Submission * Article Writings * SEO Articles Writings * Blogs Content Writing * Review Articles * Web Content * Creative Writings Looking forward to work with you. Thanks and Regards, Md Anam Hossain
$66 USD in 3 days
0.0 (0 reviews)
0.0
0.0
User Avatar
A proposal has not yet been provided
$12 USD in 3 days
0.0 (0 reviews)
0.0
0.0
User Avatar
Dear Sir/Madam, I am a new freelancer on this website but I am an avid writer and can write on various niche with utmost ease. I lay special emphasis on delivering high-quality, plagiarism-free work. I am punctual and submit all the work well before time. Looking forward to a reply. Tanveer.
$15 USD in 3 days
0.0 (0 reviews)
0.0
0.0
User Avatar
I have been in IT for over 20+ years, and 15 of those years have been involved in IT security writing. My accomplishments include the following: *Extensive blogging experience with over 1,200 blog postings; *Having being published worldwide, in some of the most leading security journals; *I have just written my first comprehensive book on Biometrics (400 pages); it will be in print and ebook by this November, and just signed my second book deal; *I also have 5 extensive years in e-mail marketing and online lead generation, in which I wrote copy for some of the biggest IT clients, which include: Nimsoft Evault Freescale Semiconductors; Autonomy (a division of HP). *I have extensive copywriting and e-mail marketing experience in Cloud Computing, SaaS, Network Security, Virtualization, Mobile Security, the threats and solutions posed to BYOD, etc. I look forward to hearing back from you and working with you!
$12 USD in 3 days
0.0 (0 reviews)
0.0
0.0

About the client

Flag of PAKISTAN
Faisalabad, Pakistan
5.0
19
Payment method verified
Member since Nov 17, 2012

Client Verification

Thanks! We’ve emailed you a link to claim your free credit.
Something went wrong while sending your email. Please try again.
Registered Users Total Jobs Posted
Freelancer ® is a registered Trademark of Freelancer Technology Pty Limited (ACN 142 189 759)
Copyright © 2024 Freelancer Technology Pty Limited (ACN 142 189 759)
Loading preview
Permission granted for Geolocation.
Your login session has expired and you have been logged out. Please log in again.