日韩精品一区二区三区高清_久久国产热这里只有精品8_天天做爽夜夜做爽_一本岛在免费一二三区

合肥生活安徽新聞合肥交通合肥房產生活服務合肥教育合肥招聘合肥旅游文化藝術合肥美食合肥地圖合肥社保合肥醫院企業服務合肥法律

代寫SCC.363、代做Java,c++設計程序

時間:2024-02-11  來源:合肥網hfw.cc  作者:hfw.cc 我要糾錯



202**024 ASSESSMENTS
Undergraduate
Individual Programming
Assessment Weighting [30%]
SCC.363 Security and Risk
Academic Honesty and Integrity
Students at Lancaster University are part of an academic community that values trust,
fairness and respect and actively encourages students to act with honesty and integrity. It is
a University policy that students take responsibility for their work and comply with the
university’s standards and requirements- found in the Manual of Academic Regulations and
Practice. By submitting their answers students will be confirming that the work submitted is
completely their own. By submitting their answers the group of students will be confirming
that the work submitted is that of the group. Academic misconduct regulations are in place
for all forms of assessment and students may familiarise themselves with this via the
university website:
https://www.lancaster.ac.uk/academic-standards-and-quality/regulations-policies-andcommittees/manual-of-academic-regulations-and-procedures/
Plagiarism
Plagiarism involves the unacknowledged use of someone else’s work and passing it off as if it
were one’s own. This covers every form of submitted work, from written essays, video
vignettes, and coding exercises. However, deliberately plagiarism with the intent to deceive
and gain academic benefit is unacceptable. This is a conscious, pre-meditated form of
cheating and is regarded as a serious breach of the core values of the University. More
information may be found via the plagiarism framework website. All coursework is to be
submitted electronically and will be run through our plagiarism detection mechanisms.
Please ensure you are familiar with the University's Plagiarism rules and if you are in any
doubt please contact your module tutor.
https://www.lancaster.ac.uk/academic-standards-and-quality/regulations-policies-andcommittees/principles-policies-and-guidelines/plagiarism-framework/
General Guidance:
This is an individual assessment that will count for 30% of your overall mark for this module.
Learning objectives
• Develop appreciation and understanding of security concepts.
• Formulate troubleshooting methods to identify/solve problems.
• Evaluate information to argue solution choices critically.
• Effectively communicate ideas.
Submission requirements
Prepare and submit your coding solutions on Coderunner. For all coding solutions, you must
use Python3. You can use modules from standard Python3 and cryptography.io. Your code
should include appropriate comments explaining what you do and why. All implementations
must be in Python3, and the cryptography.io library must be used for any cryptographyrelated functions (if needed). If you must consider padding in any task, you should use PKCS7.
Your code should include appropriate comments explaining your solution.
Example of the type of comments you SHOULD AVOID -- the comments don't explain the
solution:
def avalancheCalculator(string1, string2):
 # I hash the strings and generate the hexdigest values
 hexstring1 = hashlib.sha256(string1.encode()).hexdigest()
 hexstring2 = hashlib.sha256(string2.encode()).hexdigest()

 # I convert the hexdigest to integers
 int1 = int(hexstring1, 16)
 int2 = int(hexstring2, 16)
 # I XOR the integers
 intResult = int1 ^ int2

 # I return the 1's in the binary representation.
 return ( bin(intResult).count('1') )
Examples of types of comments that provide adequate information – the comments explain
the solution to the problem:
def avalancheCalculator(string1, string2):
 # A solution to the problem is to xor the integer representation
 # of the two values and count in the resulting int the number of bits
 # having the value of 1.
 hexstring1 = hashlib.sha256(string1.encode()).hexdigest()
 hexstring2 = hashlib.sha256(string2.encode()).hexdigest()

 int1 = int(hexstring1, 16)
 int2 = int(hexstring2, 16)
 intResult = int1 ^ int2

 # The "1"s in the binary representation of the XOR operation
 # represent which bits from int1 and int2 are different.
 # This is due to applying the XOR operation. 0^1 = 1, 1^0 = 1
 # Counting the "1"s will provide how many bits differ
 return ( bin(intResult).count('1') )
You have to upload the implementation of your functions on CodeRunner.
Marking Guidelines:
• You have to answer all three (3) tasks. Marks will be allocated based on the clarity of your
solution, comments in the code, and correctness. More information is provided within the
individual questions.
• The name of functions, type/number of variables, and return values must follow the tasks’
guidelines. Failing to adhere to this may result in not receiving marks.
Deadline for submissions: Friday 16
th February 16:00
TASK 1
--------
You are provided with the ds_hash hash function. The function receives a
finite message as input and produces a non-negative integer, which we
consider to be the hash value of the given message.
The size of input messages is fixed and always equals 64 bytes. Implement an
appropriate attack to check if the hash function ds_hash is strong collision
resistant. Your alphabet should include all lower-case and upper-case letters
of the English alphabet and all numbers from 0 to 9.
# -- START OF YOUR CODERUNNER SUBMISSION CODE
# INCLUDE ALL YOUR IMPORTS HERE
def ds_hash(message: str) -> int:
 hash_value = 0
 for ch in message:
 hash_value = (hash_value * 71) + ord(ch)

 return hash_value & 0x7FFFFFFF
def myAttack() -> bool:
# YOUR IMPLEMENTATION
return # True or False
# -- END OF YOUR CODERUNNER SUBMISSION CODE
#You can test your code in your system (NOT IN YOUR CODERUNNER SUBMISSION)
as follows:
# MAIN
if __name__ == "__main__":
print( myAttack() )
Marking scheme: This task's weight is 35% for providing a valid attack and
commenting on your code.
TASK 2
--------
Implement an HMAC based on the RFC-2104 definition (Section 2). The RFC is
available at the following link: https://www.rfc-editor.org/rfc/rfc2104
Below is the extract from the RFC that describes how the HMAC can be
implemented, and this is what you need to implement. The text is amended to
provide specific information about the selected H cryptographic hash
function, i.e., SHA256.
 The definition of HMAC requires a cryptographic hash function, which
 we denote by H, and a secret key K. In your implementation, assume H
 to be the SHA256 cryptographic hash function.
 We denote by B the byte-length of such blocks (B=64 for SHA256),
 and by L the byte-length of hash outputs (L=** for SHA256).
 The authentication key K can be of any length up to B, the
 block length of the hash function. Applications that use keys longer
 than B bytes will first hash the key using H and then use the
 resultant L byte string as the actual key to HMAC. In any case the
 minimal recommended length for K is L bytes (as the hash output
 length).
 We define two fixed and different strings ipad and opad as follows
 (the 'i' and 'o' are mnemonics for inner and outer):
 ipad = the byte 0x36 repeated B times
opad = the byte 0x5C repeated B times.
 To compute HMAC over the data `text' we perform
 H(K XOR opad, H(K XOR ipad, text))
 Namely,
 (1) append zeros to the end of K to create a B byte string
 (e.g., if K is of length 20 bytes and B=64, then K will be
 appended with 44 zero bytes 0x00)
 (2) XOR (bitwise exclusive-OR) the B byte string computed in step
 (1) with ipad
 (3) append the stream of data 'text' to the B byte string resulting
 from step (2)
 (4) apply H to the stream generated in step (3)
 (5) XOR (bitwise exclusive-OR) the B byte string computed in
 step (1) with opad
 (6) append the H result from step (4) to the B byte string
 resulting from step (5)
 (7) apply H to the stream generated in step (6) and output
 the result
The function's name has to be CustomHMAC and defined as follows.
# -- START OF YOUR CODERUNNER SUBMISSION CODE
# INCLUDE ALL YOUR IMPORTS HERE
def CustomHMAC(key: bytes, text: str) -> str:
# YOUR IMPLEMENTATION
return # YOUR RESULT
# -- END OF YOUR CODERUNNER SUBMISSION CODE
#You can test your code in your system (NOT IN YOUR CODERUNNER SUBMISSION)
as follows:
# MAIN
if __name__ == "__main__":
 k = os.urandom(16) # k is <class 'bytes'>
 txt = "hello world!!!!" # txt is <class 'str'>

 print( CustomHMAC(k, txt) )
 # The output will be a string of hexadecimal values, e.g.: a51b … 35fa

You can debug your code against the result from the following function:
from cryptography.hazmat.primitives import hashes, hmac
def HMAC_from_Cryptography(key: bytes, text: str) -> str:
 h = hmac.HMAC(key, hashes.SHA256())
 h.update(text.encode())
 signature = h.finalize().hex()

 return signature
Marking scheme: This task's weight is 40%, which will be allocated equally
for correctly implementing the steps and commenting on your code.
TASK 3
--------
Using the AES-ECB encryptor from the cryptography.io module, implement the
AES mode in Figure 1. You can instantiate an AES-ECB encryptor as follows:
from cryptography.hazmat.primitives.ciphers import Cipher, algorithms,
modes
key = # SELECT AN APPROPRIATE KEY FOR AES
cipher = Cipher(algorithms.AES(key), modes.ECB())
encryptor = cipher.encryptor()
Figure 1 - The figure describes a mode of AES for encrypting plaintext to ciphertext
The function's name has to be CustomAESmode and defined as follows:
# -- START OF YOUR CODERUNNER SUBMISSION CODE
# INCLUDE ALL YOUR IMPORTS HERE
def CustomAESMode(key: bytes, iv: bytes, plaintext: str) -> str:
# YOUR IMPLEMENTATION
return # THE CIPHERTEXT
# -- END OF YOUR CODERUNNER SUBMISSION CODE
#You can test your code in your system (NOT IN YOUR CODERUNNER SUBMISSION)
as follows:
# MAIN
if __name__ == "__main__":
 key = bytes.fromhex("06a9214036b8a15b512e03d534120006")
 iv = bytes.fromhex("3dafba429d9eb430b422da802c9fac41")
 txt = "This is a text"

 print( CustomAESMode(key, iv, txt) )
 # The result using the above input should be:
1827bfc04f1a455eb101b943c44afc1d
Marking scheme: This task's weight is 25%, which will be allocated equally
for correctly implementing the steps and commenting on your code.
如有需要,請加QQ:99515681 或WX:codehelp

掃一掃在手機打開當前頁
  • 上一篇:代做CA3 Group程序、Java編程設計代寫
  • 下一篇:CS170程序代做、Python編程設計代寫
  • 無相關信息
    合肥生活資訊

    合肥圖文信息
    急尋熱仿真分析?代做熱仿真服務+熱設計優化
    急尋熱仿真分析?代做熱仿真服務+熱設計優化
    出評 開團工具
    出評 開團工具
    挖掘機濾芯提升發動機性能
    挖掘機濾芯提升發動機性能
    海信羅馬假日洗衣機亮相AWE  復古美學與現代科技完美結合
    海信羅馬假日洗衣機亮相AWE 復古美學與現代
    合肥機場巴士4號線
    合肥機場巴士4號線
    合肥機場巴士3號線
    合肥機場巴士3號線
    合肥機場巴士2號線
    合肥機場巴士2號線
    合肥機場巴士1號線
    合肥機場巴士1號線
  • 短信驗證碼 酒店vi設計 deepseek 幣安下載 AI生圖 AI寫作 aippt AI生成PPT 阿里商辦

    關于我們 | 打賞支持 | 廣告服務 | 聯系我們 | 網站地圖 | 免責聲明 | 幫助中心 | 友情鏈接 |

    Copyright © 2025 hfw.cc Inc. All Rights Reserved. 合肥網 版權所有
    ICP備06013414號-3 公安備 42010502001045

    日韩精品一区二区三区高清_久久国产热这里只有精品8_天天做爽夜夜做爽_一本岛在免费一二三区

      <em id="rw4ev"></em>

        <tr id="rw4ev"></tr>

        <nav id="rw4ev"></nav>
        <strike id="rw4ev"><pre id="rw4ev"></pre></strike>
        欧美黄色精品| 极品裸体白嫩激情啪啪国产精品| 亚洲国产精品悠悠久久琪琪| 国产精品色婷婷| 久久激情五月婷婷| 欧美三日本三级三级在线播放| 欧美日韩无遮挡| 国产精品理论片| 久久久噜噜噜久久久| 亚洲九九爱视频| 国产精品v欧美精品v日韩| 亚洲欧美www| 欧美日韩成人在线播放| 两个人的视频www国产精品| 久久久国产成人精品| 中国成人亚色综合网站| 国产日韩精品综合网站| 国产精品国产馆在线真实露脸| 欧美性天天影院| 国产精品久久久久久久久久三级| 亚洲国产女人aaa毛片在线| 国产精品视频不卡| 欧美精品乱码久久久久久按摩| 欧美精品久久久久久久久久| 亚洲精品小视频在线观看| 亚洲专区免费| 国语自产精品视频在线看抢先版结局| 亚洲深夜福利视频| 一二三区精品福利视频| 亚洲欧美日本日韩| 国产精品国产三级国产aⅴ无密码| 亚洲主播在线观看| 欧美人成在线| 欧美激情一区二区| 香蕉久久夜色精品国产| 亚洲特级片在线| 亚洲精品久久久久中文字幕欢迎你| 国产亚洲一二三区| 男同欧美伦乱| 亚洲一区在线视频| 欧美午夜宅男影院在线观看| 久久亚洲综合色一区二区三区| 国产精品亚洲一区| 国产色综合天天综合网| 亚洲在线观看| 免费一区视频| 美女精品视频一区| 一区二区欧美精品| 狠狠色噜噜狠狠狠狠色吗综合| 91久久香蕉国产日韩欧美9色| 亚洲激情一区二区三区| 国内自拍一区| 亚洲综合第一页| 在线观看精品| 悠悠资源网久久精品| 亚洲欧美日韩中文在线制服| 老司机久久99久久精品播放免费| 久久综合网色—综合色88| 久久精品夜夜夜夜久久| 欧美视频中文一区二区三区在线观看| 午夜亚洲福利在线老司机| 免费欧美日韩国产三级电影| 亚洲精品国产品国语在线app| 久久av一区二区三区| 蜜桃精品一区二区三区| 久久久中精品2020中文| 欧美一区1区三区3区公司| 99re6这里只有精品视频在线观看| 一区二区日本视频| 国产丝袜一区二区| 狠狠色丁香婷婷综合久久片| 亚洲黄色一区二区三区| 久久噜噜亚洲综合| 免费观看日韩| 久久久999精品免费| 乱中年女人伦av一区二区| 久久精品日产第一区二区| 久久综合影音| 小黄鸭精品aⅴ导航网站入口| 国产欧美精品一区aⅴ影院| 国产精品大片免费观看| 一区二区亚洲精品| 免费在线成人| 亚洲欧美日韩一区二区在线| 亚洲一区成人| 亚洲黄色影片| 亚洲精品一二| 欧美a级片一区| 亚洲毛片在线观看| 国产精品乱码一区二区三区| 免费观看成人网| 欧美日本亚洲| 欧美精品成人一区二区在线观看| 亚洲黄页视频免费观看| 一区二区不卡在线视频 午夜欧美不卡在| 国产亚洲成精品久久| 国产精品日韩欧美一区二区| 亚洲欧洲日本国产| 国产欧美视频在线观看| 精品动漫一区二区| 亚洲成人自拍视频| 一区二区激情| 欧美日韩一区在线视频| 久久亚洲美女| 欧美日韩在线视频一区二区| 国产精品99久久久久久宅男| 亚洲激情欧美| 亚洲一区三区视频在线观看| 久久久久久久999| 免费在线观看日韩欧美| 久久九九热re6这里有精品| 久久久久国产精品午夜一区| 麻豆av一区二区三区久久| 99v久久综合狠狠综合久久| 欧美成年人在线观看| 性色一区二区| 欧美视频在线不卡| 99热精品在线观看| 一区二区免费看| 欧美一区二区三区喷汁尤物| 欧美电影在线播放| 亚洲视频在线播放| 午夜精品影院| 亚洲欧美日本国产专区一区| 美女福利精品视频| 国产亚洲免费的视频看| 亚洲自拍偷拍麻豆| 免费一级欧美片在线观看| 欧美日韩精品欧美日韩精品| 久久国产福利| 欧美日本亚洲视频| 国产精品视区| 国产精品色一区二区三区| 麻豆精品一区二区av白丝在线| 亚洲视频一区在线| 国产一区观看| 一区二区三区四区在线| 欧美日韩精品久久久| 欧美成人四级电影| 亚洲欧美日韩人成在线播放| 亚洲国产欧美国产综合一区| 性欧美videos另类喷潮| 亚洲高清一区二区三区| 国产精品理论片| 欧美伊人久久大香线蕉综合69| 亚洲电影观看| 亚洲美女淫视频| 欧美激情 亚洲a∨综合| 午夜精品久久久久久久久久久久久| 欧美风情在线| 亚洲视频在线免费观看| 欧美日韩精品一区| 国产乱码精品1区2区3区| 久久在精品线影院精品国产| 久久久91精品国产一区二区三区| 欧美在线看片a免费观看| 国产精品久久久久久久久久直播| 久久久久91| 午夜综合激情| 久久精品成人欧美大片古装| 美女脱光内衣内裤视频久久网站| 国产精品一区二区在线| 亚洲一区二区3| 国产精品免费视频观看|