28.11.2014 Term Project CMPE 553 Cryptography and Network Security, Fall 2014 Term project is to be made in groups of at most three students. Task Develop a network application for testing block ciphers in different modes of operation. Implemented in the project block ciphers should allow both encryption and decryption. Block ciphers and operation modes to choose are given in Tables 1 and 2 respectively. Communicating parties shall be represented as processes running on two separate computers connected via some channel. Table 1. Block ciphers # Cipher name 1. DES 2. Double DES with two keys [1] 3. Triple DES with two keys [1] 4. Triple DES with three keys [1] 5. S-DES Table 2. Modes of block cipher operation # Mode of operation 1. Cipher Block Chaining (CBC) 2. Cipher Feedback (CFB) 3. Output Feedback (OFB) 4. Counter Select any algorithm from Table 1 and any mode of operation from Table 2. A combination (algorithm-mode of operation) must be unique for each student/group of students. For example, if variant (block cipher 1 (DES), mode of operation 3 (OFB)), is selected by some person/group, then this combination is not to be used by any other person/group. Your choices should be conveyed by e-mail to the lecturer (last day is Monday, December 8, 2014). Later choice making will be penalized by 4 points deduction. Selected algorithms are to be implemented and investigated for the selected mode of operation. Grading policy and requirements 1. Maximum point for the term project is 20. 1 2. Term project materials should be submitted to the lecturer 12.01.2015, Monday, before 12.00. Later materials submission will lead to deduction of 2 points, if submitted on the same day, and 4 points, otherwise. Your variant choice should be conveyed to the lecturer (last day is Monday, December 8, 2014). Later choice making will be penalized by 4 points deduction. Already made choices will be available from the course web-page. 3. Reports will be defended during 13.01.2015-15.01.2015, date and time will be announced additionally. Later defense of reports will lead to deduction of 4 points. 4. Materials on term project should contain: - paper report on the work done - diskette with: Word document file of report; source codes and executables of developed applications; necessary examples of plaintexts and cipher-texts and so on; necessary for work special libraries if any. So, diskette should contain source code, all information concerning description of your project, and it should be possible to launch from it your application, to enter necessary data, to view obtained results. 5. Report on term project should have: - cover page (department, course, title of term project, student’s name, instructor’s name, date); - task definition; - brief definition of an algorithm and mode of operation to be implemented; - description of developed application and its source codes; - description of tests conducted to verify correct work of your application, provide screenshots of working program, comment them; - experiments results and discussion; - conclusion - references to used articles, textbooks, web-sites and so on, if any References 1. http://cmpe.emu.edu.tr/chefranov/cmpe553_07_Spring/Notes/Ch6ModernSymCip hers.doc 2