99爱在线视频这里只有精品_窝窝午夜看片成人精品_日韩精品久久久毛片一区二区_亚洲一区二区久久

合肥生活安徽新聞合肥交通合肥房產(chǎn)生活服務合肥教育合肥招聘合肥旅游文化藝術(shù)合肥美食合肥地圖合肥社保合肥醫(yī)院企業(yè)服務合肥法律

代寫SCC.363、代做Java,c++設(shè)計程序

時間:2024-02-11  來源:合肥網(wǎng)hfw.cc  作者:hfw.cc 我要糾錯



202**024 ASSESSMENTS
Undergraduate
Individual Programming
Assessment Weighting [30%]
SCC.363 Security and Risk
Academic Honesty and Integrity
Students at Lancaster University are part of an academic community that values trust,
fairness and respect and actively encourages students to act with honesty and integrity. It is
a University policy that students take responsibility for their work and comply with the
university’s standards and requirements- found in the Manual of Academic Regulations and
Practice. By submitting their answers students will be confirming that the work submitted is
completely their own. By submitting their answers the group of students will be confirming
that the work submitted is that of the group. Academic misconduct regulations are in place
for all forms of assessment and students may familiarise themselves with this via the
university website:
https://www.lancaster.ac.uk/academic-standards-and-quality/regulations-policies-andcommittees/manual-of-academic-regulations-and-procedures/
Plagiarism
Plagiarism involves the unacknowledged use of someone else’s work and passing it off as if it
were one’s own. This covers every form of submitted work, from written essays, video
vignettes, and coding exercises. However, deliberately plagiarism with the intent to deceive
and gain academic benefit is unacceptable. This is a conscious, pre-meditated form of
cheating and is regarded as a serious breach of the core values of the University. More
information may be found via the plagiarism framework website. All coursework is to be
submitted electronically and will be run through our plagiarism detection mechanisms.
Please ensure you are familiar with the University's Plagiarism rules and if you are in any
doubt please contact your module tutor.
https://www.lancaster.ac.uk/academic-standards-and-quality/regulations-policies-andcommittees/principles-policies-and-guidelines/plagiarism-framework/
General Guidance:
This is an individual assessment that will count for 30% of your overall mark for this module.
Learning objectives
• Develop appreciation and understanding of security concepts.
• Formulate troubleshooting methods to identify/solve problems.
• Evaluate information to argue solution choices critically.
• Effectively communicate ideas.
Submission requirements
Prepare and submit your coding solutions on Coderunner. For all coding solutions, you must
use Python3. You can use modules from standard Python3 and cryptography.io. Your code
should include appropriate comments explaining what you do and why. All implementations
must be in Python3, and the cryptography.io library must be used for any cryptographyrelated functions (if needed). If you must consider padding in any task, you should use PKCS7.
Your code should include appropriate comments explaining your solution.
Example of the type of comments you SHOULD AVOID -- the comments don't explain the
solution:
def avalancheCalculator(string1, string2):
 # I hash the strings and generate the hexdigest values
 hexstring1 = hashlib.sha256(string1.encode()).hexdigest()
 hexstring2 = hashlib.sha256(string2.encode()).hexdigest()

 # I convert the hexdigest to integers
 int1 = int(hexstring1, 16)
 int2 = int(hexstring2, 16)
 # I XOR the integers
 intResult = int1 ^ int2

 # I return the 1's in the binary representation.
 return ( bin(intResult).count('1') )
Examples of types of comments that provide adequate information – the comments explain
the solution to the problem:
def avalancheCalculator(string1, string2):
 # A solution to the problem is to xor the integer representation
 # of the two values and count in the resulting int the number of bits
 # having the value of 1.
 hexstring1 = hashlib.sha256(string1.encode()).hexdigest()
 hexstring2 = hashlib.sha256(string2.encode()).hexdigest()

 int1 = int(hexstring1, 16)
 int2 = int(hexstring2, 16)
 intResult = int1 ^ int2

 # The "1"s in the binary representation of the XOR operation
 # represent which bits from int1 and int2 are different.
 # This is due to applying the XOR operation. 0^1 = 1, 1^0 = 1
 # Counting the "1"s will provide how many bits differ
 return ( bin(intResult).count('1') )
You have to upload the implementation of your functions on CodeRunner.
Marking Guidelines:
• You have to answer all three (3) tasks. Marks will be allocated based on the clarity of your
solution, comments in the code, and correctness. More information is provided within the
individual questions.
• The name of functions, type/number of variables, and return values must follow the tasks’
guidelines. Failing to adhere to this may result in not receiving marks.
Deadline for submissions: Friday 16
th February 16:00
TASK 1
--------
You are provided with the ds_hash hash function. The function receives a
finite message as input and produces a non-negative integer, which we
consider to be the hash value of the given message.
The size of input messages is fixed and always equals 64 bytes. Implement an
appropriate attack to check if the hash function ds_hash is strong collision
resistant. Your alphabet should include all lower-case and upper-case letters
of the English alphabet and all numbers from 0 to 9.
# -- START OF YOUR CODERUNNER SUBMISSION CODE
# INCLUDE ALL YOUR IMPORTS HERE
def ds_hash(message: str) -> int:
 hash_value = 0
 for ch in message:
 hash_value = (hash_value * 71) + ord(ch)

 return hash_value & 0x7FFFFFFF
def myAttack() -> bool:
# YOUR IMPLEMENTATION
return # True or False
# -- END OF YOUR CODERUNNER SUBMISSION CODE
#You can test your code in your system (NOT IN YOUR CODERUNNER SUBMISSION)
as follows:
# MAIN
if __name__ == "__main__":
print( myAttack() )
Marking scheme: This task's weight is 35% for providing a valid attack and
commenting on your code.
TASK 2
--------
Implement an HMAC based on the RFC-2104 definition (Section 2). The RFC is
available at the following link: https://www.rfc-editor.org/rfc/rfc2104
Below is the extract from the RFC that describes how the HMAC can be
implemented, and this is what you need to implement. The text is amended to
provide specific information about the selected H cryptographic hash
function, i.e., SHA256.
 The definition of HMAC requires a cryptographic hash function, which
 we denote by H, and a secret key K. In your implementation, assume H
 to be the SHA256 cryptographic hash function.
 We denote by B the byte-length of such blocks (B=64 for SHA256),
 and by L the byte-length of hash outputs (L=** for SHA256).
 The authentication key K can be of any length up to B, the
 block length of the hash function. Applications that use keys longer
 than B bytes will first hash the key using H and then use the
 resultant L byte string as the actual key to HMAC. In any case the
 minimal recommended length for K is L bytes (as the hash output
 length).
 We define two fixed and different strings ipad and opad as follows
 (the 'i' and 'o' are mnemonics for inner and outer):
 ipad = the byte 0x36 repeated B times
opad = the byte 0x5C repeated B times.
 To compute HMAC over the data `text' we perform
 H(K XOR opad, H(K XOR ipad, text))
 Namely,
 (1) append zeros to the end of K to create a B byte string
 (e.g., if K is of length 20 bytes and B=64, then K will be
 appended with 44 zero bytes 0x00)
 (2) XOR (bitwise exclusive-OR) the B byte string computed in step
 (1) with ipad
 (3) append the stream of data 'text' to the B byte string resulting
 from step (2)
 (4) apply H to the stream generated in step (3)
 (5) XOR (bitwise exclusive-OR) the B byte string computed in
 step (1) with opad
 (6) append the H result from step (4) to the B byte string
 resulting from step (5)
 (7) apply H to the stream generated in step (6) and output
 the result
The function's name has to be CustomHMAC and defined as follows.
# -- START OF YOUR CODERUNNER SUBMISSION CODE
# INCLUDE ALL YOUR IMPORTS HERE
def CustomHMAC(key: bytes, text: str) -> str:
# YOUR IMPLEMENTATION
return # YOUR RESULT
# -- END OF YOUR CODERUNNER SUBMISSION CODE
#You can test your code in your system (NOT IN YOUR CODERUNNER SUBMISSION)
as follows:
# MAIN
if __name__ == "__main__":
 k = os.urandom(16) # k is <class 'bytes'>
 txt = "hello world!!!!" # txt is <class 'str'>

 print( CustomHMAC(k, txt) )
 # The output will be a string of hexadecimal values, e.g.: a51b … 35fa

You can debug your code against the result from the following function:
from cryptography.hazmat.primitives import hashes, hmac
def HMAC_from_Cryptography(key: bytes, text: str) -> str:
 h = hmac.HMAC(key, hashes.SHA256())
 h.update(text.encode())
 signature = h.finalize().hex()

 return signature
Marking scheme: This task's weight is 40%, which will be allocated equally
for correctly implementing the steps and commenting on your code.
TASK 3
--------
Using the AES-ECB encryptor from the cryptography.io module, implement the
AES mode in Figure 1. You can instantiate an AES-ECB encryptor as follows:
from cryptography.hazmat.primitives.ciphers import Cipher, algorithms,
modes
key = # SELECT AN APPROPRIATE KEY FOR AES
cipher = Cipher(algorithms.AES(key), modes.ECB())
encryptor = cipher.encryptor()
Figure 1 - The figure describes a mode of AES for encrypting plaintext to ciphertext
The function's name has to be CustomAESmode and defined as follows:
# -- START OF YOUR CODERUNNER SUBMISSION CODE
# INCLUDE ALL YOUR IMPORTS HERE
def CustomAESMode(key: bytes, iv: bytes, plaintext: str) -> str:
# YOUR IMPLEMENTATION
return # THE CIPHERTEXT
# -- END OF YOUR CODERUNNER SUBMISSION CODE
#You can test your code in your system (NOT IN YOUR CODERUNNER SUBMISSION)
as follows:
# MAIN
if __name__ == "__main__":
 key = bytes.fromhex("06a9214036b8a15b512e03d534120006")
 iv = bytes.fromhex("3dafba429d9eb430b422da802c9fac41")
 txt = "This is a text"

 print( CustomAESMode(key, iv, txt) )
 # The result using the above input should be:
1827bfc04f1a455eb101b943c44afc1d
Marking scheme: This task's weight is 25%, which will be allocated equally
for correctly implementing the steps and commenting on your code.
如有需要,請加QQ:99515681 或WX:codehelp

掃一掃在手機打開當前頁
  • 上一篇:代做CA3 Group程序、Java編程設(shè)計代寫
  • 下一篇:CS170程序代做、Python編程設(shè)計代寫
  • 無相關(guān)信息
    合肥生活資訊

    合肥圖文信息
    急尋熱仿真分析?代做熱仿真服務+熱設(shè)計優(yōu)化
    急尋熱仿真分析?代做熱仿真服務+熱設(shè)計優(yōu)化
    出評 開團工具
    出評 開團工具
    挖掘機濾芯提升發(fā)動機性能
    挖掘機濾芯提升發(fā)動機性能
    海信羅馬假日洗衣機亮相AWE  復古美學與現(xiàn)代科技完美結(jié)合
    海信羅馬假日洗衣機亮相AWE 復古美學與現(xiàn)代
    合肥機場巴士4號線
    合肥機場巴士4號線
    合肥機場巴士3號線
    合肥機場巴士3號線
    合肥機場巴士2號線
    合肥機場巴士2號線
    合肥機場巴士1號線
    合肥機場巴士1號線
  • 短信驗證碼 豆包 幣安下載 AI生圖 目錄網(wǎng)

    關(guān)于我們 | 打賞支持 | 廣告服務 | 聯(lián)系我們 | 網(wǎng)站地圖 | 免責聲明 | 幫助中心 | 友情鏈接 |

    Copyright © 2025 hfw.cc Inc. All Rights Reserved. 合肥網(wǎng) 版權(quán)所有
    ICP備06013414號-3 公安備 42010502001045

    99爱在线视频这里只有精品_窝窝午夜看片成人精品_日韩精品久久久毛片一区二区_亚洲一区二区久久

          9000px;">

                美女视频黄a大片欧美| 亚洲欧美综合网| 日韩视频免费直播| 中文字幕av免费专区久久| 成人免费在线视频| 老司机午夜精品| 色综合久久66| 精品无人码麻豆乱码1区2区| 亚洲欧美中日韩| 青娱乐精品视频| 免费观看久久久4p| 99国产麻豆精品| 欧美一级二级三级乱码| 亚洲精品一区二区三区99| 亚洲123区在线观看| 色综合久久久久综合体桃花网| 精品少妇一区二区三区视频免付费 | 综合欧美一区二区三区| 日韩av网站免费在线| 成人性生交大片免费看视频在线 | 一区二区三区在线视频观看58| 精品亚洲欧美一区| www.欧美.com| 久久噜噜亚洲综合| 精品伊人久久久久7777人| 欧美日韩一卡二卡三卡| 国产精品久久久久三级| proumb性欧美在线观看| 日本韩国视频一区二区| 国产精品美女久久福利网站| 精品午夜久久福利影院| 久久精品一区二区| 成人一区二区三区在线观看| 精品1区2区在线观看| 亚洲精品成人精品456| 国产一区二区影院| 日韩一区二区精品| 麻豆一区二区三| 日韩三级精品电影久久久 | 狠狠色丁香婷婷综合久久片| 7777精品伊人久久久大香线蕉经典版下载 | 久久久久国产免费免费| 日本欧美韩国一区三区| 亚洲欧美激情在线| 欧美体内she精高潮| 亚洲国产一区二区视频| 91国在线观看| 亚洲韩国一区二区三区| 91国内精品野花午夜精品| 亚洲va国产天堂va久久en| 欧美肥妇毛茸茸| 看片的网站亚洲| 2021中文字幕一区亚洲| 成人黄动漫网站免费app| 成人欧美一区二区三区小说| 丁香六月久久综合狠狠色| 日韩理论片中文av| 欧美一区二区精品久久911| 国产麻豆精品视频| 亚洲最新在线观看| 懂色中文一区二区在线播放| 国产精品久久久久三级| 欧美天堂一区二区三区| 激情图片小说一区| 中文在线一区二区| av中文字幕不卡| 一区二区三区成人| 日韩一级完整毛片| 国产一区二区三区免费看 | 极品瑜伽女神91| 一区在线中文字幕| 成人免费视频免费观看| 国产精品国产三级国产有无不卡 | 欧美一区二区三区四区视频| 久草精品在线观看| 国产精品的网站| 欧美精品久久天天躁| 免费在线欧美视频| 18欧美亚洲精品| 不卡大黄网站免费看| 一区2区3区在线看| 精品国产一区二区三区不卡| 成人精品小蝌蚪| 日韩av中文字幕一区二区| 国产精品二三区| 久久综合九色综合欧美就去吻 | 一本在线高清不卡dvd| 奇米影视在线99精品| 中文字幕一区av| 2020国产精品自拍| 91麻豆精品国产91久久久久久久久 | 国产91综合一区在线观看| 久久综合九色综合97婷婷女人 | 日韩福利电影在线| 久久久亚洲精品石原莉奈| 美女看a上一区| 在线观看91精品国产入口| 日韩亚洲欧美在线观看| 欧美色网一区二区| 欧美在线一二三| 777亚洲妇女| 国产女同性恋一区二区| 欧美精品一级二级| 日韩一级二级三级| 久久久久久日产精品| 国产精品剧情在线亚洲| 成人欧美一区二区三区黑人麻豆 | 久久久精品免费免费| 一区在线观看视频| 天堂资源在线中文精品| 精品一区二区三区影院在线午夜 | 一区二区三区国产精华| 日本美女一区二区三区视频| 高清在线不卡av| 色欧美乱欧美15图片| 在线不卡a资源高清| 国产精品三级久久久久三级| 亚洲综合色在线| 国产成人免费视| 91精品福利视频| 久久久久99精品国产片| 香蕉影视欧美成人| 国产乱码精品一品二品| 色视频一区二区| 欧日韩精品视频| 亚洲国产成人私人影院tom| 日韩av高清在线观看| 91网站黄www| 久久先锋影音av| 午夜精品影院在线观看| 91激情五月电影| 日韩免费看的电影| 中文字幕在线观看不卡视频| 免费xxxx性欧美18vr| 91在线看国产| 国产精品区一区二区三| 乱一区二区av| 91久久精品日日躁夜夜躁欧美| 国产亚洲欧洲997久久综合| 麻豆精品在线视频| 7777精品伊人久久久大香线蕉经典版下载| 欧美成人国产一区二区| 亚洲三级在线免费| 成人精品电影在线观看| 精品乱人伦一区二区三区| 免费成人在线观看| 欧美电影在哪看比较好| 亚洲国产成人精品视频| 91久久精品一区二区三区| 久久九九久久九九| 国产精品一卡二卡在线观看| 日韩精品专区在线| 精品第一国产综合精品aⅴ| 国产电影精品久久禁18| 精品国产一区二区三区不卡| 婷婷开心激情综合| 91精品国产综合久久久久久久 | 欧美一区二区三区视频免费| 久久久精品免费网站| 国产真实乱对白精彩久久| 久久综合九色综合97_久久久| 视频一区二区国产| 日韩一区二区免费在线电影| 久久精品国产99国产| 欧美成人性福生活免费看| 老司机午夜精品99久久| 精品国产电影一区二区| 国产成人精品影视| 国产欧美日韩不卡| 国产在线播精品第三| 欧美韩国日本综合| 成+人+亚洲+综合天堂| 最新中文字幕一区二区三区| 一本久久综合亚洲鲁鲁五月天| 亚洲激情图片qvod| 91精品欧美福利在线观看| 美腿丝袜亚洲色图| 中文字幕乱码日本亚洲一区二区| 99久免费精品视频在线观看 | 中文久久乱码一区二区| 成人午夜私人影院| 亚洲天堂a在线| 国产一区欧美二区| 国产欧美久久久精品影院| av一区二区三区在线| 亚洲黄色尤物视频| 日韩免费高清视频| 丰满少妇久久久久久久 | 日韩一区和二区| 粉嫩av一区二区三区在线播放 | 久久精品视频一区二区| www.色综合.com| 首页综合国产亚洲丝袜| 久久嫩草精品久久久精品一| 97se亚洲国产综合自在线 | 亚洲精品成人悠悠色影视| 亚洲一区二区视频在线| 色一情一伦一子一伦一区| 国产成人免费高清| 亚洲高清不卡在线|