加勒比久久综合,国产精品伦一区二区,66精品视频在线观看,一区二区电影

合肥生活安徽新聞合肥交通合肥房產生活服務合肥教育合肥招聘合肥旅游文化藝術合肥美食合肥地圖合肥社保合肥醫院企業服務合肥法律

代寫SCC.363、代做Java,c++設計程序

時間:2024-02-11  來源:合肥網hfw.cc  作者:hfw.cc 我要糾錯



202**024 ASSESSMENTS
Undergraduate
Individual Programming
Assessment Weighting [30%]
SCC.363 Security and Risk
Academic Honesty and Integrity
Students at Lancaster University are part of an academic community that values trust,
fairness and respect and actively encourages students to act with honesty and integrity. It is
a University policy that students take responsibility for their work and comply with the
university’s standards and requirements- found in the Manual of Academic Regulations and
Practice. By submitting their answers students will be confirming that the work submitted is
completely their own. By submitting their answers the group of students will be confirming
that the work submitted is that of the group. Academic misconduct regulations are in place
for all forms of assessment and students may familiarise themselves with this via the
university website:
https://www.lancaster.ac.uk/academic-standards-and-quality/regulations-policies-andcommittees/manual-of-academic-regulations-and-procedures/
Plagiarism
Plagiarism involves the unacknowledged use of someone else’s work and passing it off as if it
were one’s own. This covers every form of submitted work, from written essays, video
vignettes, and coding exercises. However, deliberately plagiarism with the intent to deceive
and gain academic benefit is unacceptable. This is a conscious, pre-meditated form of
cheating and is regarded as a serious breach of the core values of the University. More
information may be found via the plagiarism framework website. All coursework is to be
submitted electronically and will be run through our plagiarism detection mechanisms.
Please ensure you are familiar with the University's Plagiarism rules and if you are in any
doubt please contact your module tutor.
https://www.lancaster.ac.uk/academic-standards-and-quality/regulations-policies-andcommittees/principles-policies-and-guidelines/plagiarism-framework/
General Guidance:
This is an individual assessment that will count for 30% of your overall mark for this module.
Learning objectives
• Develop appreciation and understanding of security concepts.
• Formulate troubleshooting methods to identify/solve problems.
• Evaluate information to argue solution choices critically.
• Effectively communicate ideas.
Submission requirements
Prepare and submit your coding solutions on Coderunner. For all coding solutions, you must
use Python3. You can use modules from standard Python3 and cryptography.io. Your code
should include appropriate comments explaining what you do and why. All implementations
must be in Python3, and the cryptography.io library must be used for any cryptographyrelated functions (if needed). If you must consider padding in any task, you should use PKCS7.
Your code should include appropriate comments explaining your solution.
Example of the type of comments you SHOULD AVOID -- the comments don't explain the
solution:
def avalancheCalculator(string1, string2):
 # I hash the strings and generate the hexdigest values
 hexstring1 = hashlib.sha256(string1.encode()).hexdigest()
 hexstring2 = hashlib.sha256(string2.encode()).hexdigest()

 # I convert the hexdigest to integers
 int1 = int(hexstring1, 16)
 int2 = int(hexstring2, 16)
 # I XOR the integers
 intResult = int1 ^ int2

 # I return the 1's in the binary representation.
 return ( bin(intResult).count('1') )
Examples of types of comments that provide adequate information – the comments explain
the solution to the problem:
def avalancheCalculator(string1, string2):
 # A solution to the problem is to xor the integer representation
 # of the two values and count in the resulting int the number of bits
 # having the value of 1.
 hexstring1 = hashlib.sha256(string1.encode()).hexdigest()
 hexstring2 = hashlib.sha256(string2.encode()).hexdigest()

 int1 = int(hexstring1, 16)
 int2 = int(hexstring2, 16)
 intResult = int1 ^ int2

 # The "1"s in the binary representation of the XOR operation
 # represent which bits from int1 and int2 are different.
 # This is due to applying the XOR operation. 0^1 = 1, 1^0 = 1
 # Counting the "1"s will provide how many bits differ
 return ( bin(intResult).count('1') )
You have to upload the implementation of your functions on CodeRunner.
Marking Guidelines:
• You have to answer all three (3) tasks. Marks will be allocated based on the clarity of your
solution, comments in the code, and correctness. More information is provided within the
individual questions.
• The name of functions, type/number of variables, and return values must follow the tasks’
guidelines. Failing to adhere to this may result in not receiving marks.
Deadline for submissions: Friday 16
th February 16:00
TASK 1
--------
You are provided with the ds_hash hash function. The function receives a
finite message as input and produces a non-negative integer, which we
consider to be the hash value of the given message.
The size of input messages is fixed and always equals 64 bytes. Implement an
appropriate attack to check if the hash function ds_hash is strong collision
resistant. Your alphabet should include all lower-case and upper-case letters
of the English alphabet and all numbers from 0 to 9.
# -- START OF YOUR CODERUNNER SUBMISSION CODE
# INCLUDE ALL YOUR IMPORTS HERE
def ds_hash(message: str) -> int:
 hash_value = 0
 for ch in message:
 hash_value = (hash_value * 71) + ord(ch)

 return hash_value & 0x7FFFFFFF
def myAttack() -> bool:
# YOUR IMPLEMENTATION
return # True or False
# -- END OF YOUR CODERUNNER SUBMISSION CODE
#You can test your code in your system (NOT IN YOUR CODERUNNER SUBMISSION)
as follows:
# MAIN
if __name__ == "__main__":
print( myAttack() )
Marking scheme: This task's weight is 35% for providing a valid attack and
commenting on your code.
TASK 2
--------
Implement an HMAC based on the RFC-2104 definition (Section 2). The RFC is
available at the following link: https://www.rfc-editor.org/rfc/rfc2104
Below is the extract from the RFC that describes how the HMAC can be
implemented, and this is what you need to implement. The text is amended to
provide specific information about the selected H cryptographic hash
function, i.e., SHA256.
 The definition of HMAC requires a cryptographic hash function, which
 we denote by H, and a secret key K. In your implementation, assume H
 to be the SHA256 cryptographic hash function.
 We denote by B the byte-length of such blocks (B=64 for SHA256),
 and by L the byte-length of hash outputs (L=** for SHA256).
 The authentication key K can be of any length up to B, the
 block length of the hash function. Applications that use keys longer
 than B bytes will first hash the key using H and then use the
 resultant L byte string as the actual key to HMAC. In any case the
 minimal recommended length for K is L bytes (as the hash output
 length).
 We define two fixed and different strings ipad and opad as follows
 (the 'i' and 'o' are mnemonics for inner and outer):
 ipad = the byte 0x36 repeated B times
opad = the byte 0x5C repeated B times.
 To compute HMAC over the data `text' we perform
 H(K XOR opad, H(K XOR ipad, text))
 Namely,
 (1) append zeros to the end of K to create a B byte string
 (e.g., if K is of length 20 bytes and B=64, then K will be
 appended with 44 zero bytes 0x00)
 (2) XOR (bitwise exclusive-OR) the B byte string computed in step
 (1) with ipad
 (3) append the stream of data 'text' to the B byte string resulting
 from step (2)
 (4) apply H to the stream generated in step (3)
 (5) XOR (bitwise exclusive-OR) the B byte string computed in
 step (1) with opad
 (6) append the H result from step (4) to the B byte string
 resulting from step (5)
 (7) apply H to the stream generated in step (6) and output
 the result
The function's name has to be CustomHMAC and defined as follows.
# -- START OF YOUR CODERUNNER SUBMISSION CODE
# INCLUDE ALL YOUR IMPORTS HERE
def CustomHMAC(key: bytes, text: str) -> str:
# YOUR IMPLEMENTATION
return # YOUR RESULT
# -- END OF YOUR CODERUNNER SUBMISSION CODE
#You can test your code in your system (NOT IN YOUR CODERUNNER SUBMISSION)
as follows:
# MAIN
if __name__ == "__main__":
 k = os.urandom(16) # k is <class 'bytes'>
 txt = "hello world!!!!" # txt is <class 'str'>

 print( CustomHMAC(k, txt) )
 # The output will be a string of hexadecimal values, e.g.: a51b … 35fa

You can debug your code against the result from the following function:
from cryptography.hazmat.primitives import hashes, hmac
def HMAC_from_Cryptography(key: bytes, text: str) -> str:
 h = hmac.HMAC(key, hashes.SHA256())
 h.update(text.encode())
 signature = h.finalize().hex()

 return signature
Marking scheme: This task's weight is 40%, which will be allocated equally
for correctly implementing the steps and commenting on your code.
TASK 3
--------
Using the AES-ECB encryptor from the cryptography.io module, implement the
AES mode in Figure 1. You can instantiate an AES-ECB encryptor as follows:
from cryptography.hazmat.primitives.ciphers import Cipher, algorithms,
modes
key = # SELECT AN APPROPRIATE KEY FOR AES
cipher = Cipher(algorithms.AES(key), modes.ECB())
encryptor = cipher.encryptor()
Figure 1 - The figure describes a mode of AES for encrypting plaintext to ciphertext
The function's name has to be CustomAESmode and defined as follows:
# -- START OF YOUR CODERUNNER SUBMISSION CODE
# INCLUDE ALL YOUR IMPORTS HERE
def CustomAESMode(key: bytes, iv: bytes, plaintext: str) -> str:
# YOUR IMPLEMENTATION
return # THE CIPHERTEXT
# -- END OF YOUR CODERUNNER SUBMISSION CODE
#You can test your code in your system (NOT IN YOUR CODERUNNER SUBMISSION)
as follows:
# MAIN
if __name__ == "__main__":
 key = bytes.fromhex("06a9214036b8a15b512e03d534120006")
 iv = bytes.fromhex("3dafba429d9eb430b422da802c9fac41")
 txt = "This is a text"

 print( CustomAESMode(key, iv, txt) )
 # The result using the above input should be:
1827bfc04f1a455eb101b943c44afc1d
Marking scheme: This task's weight is 25%, which will be allocated equally
for correctly implementing the steps and commenting on your code.
如有需要,請加QQ:99515681 或WX:codehelp

掃一掃在手機打開當前頁
  • 上一篇:代做CA3 Group程序、Java編程設計代寫
  • 下一篇:CS170程序代做、Python編程設計代寫
  • 無相關信息
    合肥生活資訊

    合肥圖文信息
    2025年10月份更新拼多多改銷助手小象助手多多出評軟件
    2025年10月份更新拼多多改銷助手小象助手多
    有限元分析 CAE仿真分析服務-企業/產品研發/客戶要求/設計優化
    有限元分析 CAE仿真分析服務-企業/產品研發
    急尋熱仿真分析?代做熱仿真服務+熱設計優化
    急尋熱仿真分析?代做熱仿真服務+熱設計優化
    出評 開團工具
    出評 開團工具
    挖掘機濾芯提升發動機性能
    挖掘機濾芯提升發動機性能
    海信羅馬假日洗衣機亮相AWE  復古美學與現代科技完美結合
    海信羅馬假日洗衣機亮相AWE 復古美學與現代
    合肥機場巴士4號線
    合肥機場巴士4號線
    合肥機場巴士3號線
    合肥機場巴士3號線
  • 短信驗證碼 目錄網 排行網

    關于我們 | 打賞支持 | 廣告服務 | 聯系我們 | 網站地圖 | 免責聲明 | 幫助中心 | 友情鏈接 |

    Copyright © 2025 hfw.cc Inc. All Rights Reserved. 合肥網 版權所有
    ICP備06013414號-3 公安備 42010502001045

    欧美视频三区| 国产一级久久| 亚洲综合婷婷| 欧美xxav| 精品日韩毛片| 日产国产欧美视频一区精品| 精品亚洲a∨| 久久国产福利| 久久亚洲影视| 日韩黄色av| 国产精品www.| 欧美一级在线| 日韩精品一二区| 在线日本高清免费不卡| 日韩**一区毛片| 综合国产在线| 一区二区三区国产在线| 蜜桃一区二区三区四区| 国产综合网站| 精品日本12videosex| 日韩午夜av在线| 精品香蕉视频| 香蕉成人app| 国产精品欧美三级在线观看| 久久精品国产精品亚洲综合| 国产色播av在线| 老鸭窝91久久精品色噜噜导演| 亚洲国内欧美| 精品国产乱码| 国产成人精品亚洲线观看| 日本中文字幕在线一区| 欧美欧美在线| 日本vs亚洲vs韩国一区三区| 免费在线观看一区| 亚洲国产福利| 国产在线精彩视频| 蜜桃av噜噜一区二区三区小说| 99热免费精品在线观看| 国产主播精品| 国产精品av一区二区| 久久久777| 精品深夜福利视频| 精品99久久| 国产成人精品福利| 精品国产乱码久久久| 欧美日韩导航| 欧美人体视频| 91精品国产91久久久久久黑人| 中文无码日韩欧| 日韩avvvv在线播放| 国产美女亚洲精品7777| 日韩在线影视| 大陆精大陆国产国语精品| 亚洲综合网狠久久| 国产精品网站在线看| 国产成人tv| 国产99久久| 偷拍欧美精品| 欧美日韩四区| 日韩精品一区第一页| 免费久久精品视频| 国产在线看片免费视频在线观看| 国产va在线视频| 日韩伦理一区| 久久精品99国产国产精| 麻豆91在线播放免费| 99视频这里有精品| 日韩av中文在线观看| 大香伊人久久精品一区二区| 久久国产直播| 伊人成人网在线看| 人人精品人人爱| 日本乱码一区二区三区不卡| 神马久久资源| 亚洲日本成人| 日韩成人免费电影| 国产精品久久久网站| 欧美日韩黑人| 91一区二区| 久久精品资源| 国产一区二区三区亚洲综合| 66精品视频在线观看| 久久在线免费| 人人爽香蕉精品| av成人亚洲| 国产一区二区三区精品在线观看| 午夜久久av| 午夜欧美精品久久久久久久| 国产精品黑丝在线播放| 欧美成人xxxx| 国产在视频线精品视频www666| 伊色综合久久之综合久久| 136国产福利精品导航网址| 免费黄网站欧美| 日本午夜免费一区二区| 一级欧美视频| 成人免费电影网址| 久久av在线| 国产欧美自拍| 精品视频一区二区三区在线观看| 欧美午夜精彩| 国产拍在线视频| 在线精品观看| 粉嫩久久久久久久极品| 免费精品视频| 日韩高清欧美激情| 91久久精品无嫩草影院| 9国产精品视频| 日韩毛片网站| 日韩精品中文字幕吗一区二区| 国内精品福利| 日韩高清欧美| 美女精品一区最新中文字幕一区二区三区 | 正在播放日韩精品| 亚洲伦理精品| 91精品国产福利在线观看麻豆| 欧美黄色大片在线观看| 国内精品久久久久国产盗摄免费观看完整版 | 亚洲日本视频| 秋霞欧美视频| 国产理论在线| 欧美日本三级| 最新亚洲视频| 日韩和欧美一区二区| 国产精品欧美大片| 9999国产精品| 欧美热在线视频精品999| 九一精品国产| 欧美在线黄色| 欧美xxxx在线| 午夜av成人| 日韩一区网站| 黄在线观看免费网站ktv| 国产美女精品视频免费播放软件| 婷婷久久国产对白刺激五月99| 成人高清一区| 美女福利一区| 欧美一级网址| 国产96在线亚洲| 日本少妇一区| 久久99偷拍| 日韩三区四区| 成人精品影院| 日日夜夜精品| 亚洲91久久| 另类小说一区二区三区| 亚洲无线视频| 日本va欧美va欧美va精品| 免费av一区二区三区四区| 欧美亚洲一区| 婷婷丁香综合| 中文在线日韩| 日韩中文字幕区一区有砖一区| 亚洲aaa级| 欧美3p视频| 超碰精品在线| 四虎国产精品免费久久| 色狠狠久久av综合| 欧美激情福利| 精品日本12videosex| 在线国产日韩| 日韩中文字幕麻豆| 亚洲高清在线一区| 狠狠久久伊人中文字幕| 欧美日韩第一| 国产剧情一区| 免费福利视频一区二区三区| 群体交乱之放荡娇妻一区二区| 日韩成人综合网站| 好看的av在线不卡观看| 欧美黄色一级| 天堂√中文最新版在线| 精品国产一区二区三区av片 | 久久精品久久综合| 成人动漫免费在线观看| 国产精品观看| sm久久捆绑调教精品一区| 精品三级av在线导航| 欧美日韩亚洲三区| 日韩综合网站| 亚洲第一精品影视| 国产精品一站二站| 日韩大片在线| 伊人青青综合网| 五月亚洲婷婷| 日本特黄久久久高潮| 免费观看日韩av| 99久久亚洲精品蜜臀| 99精品国产九九国产精品| 中文字幕在线官网| 1024精品久久久久久久久| 日韩高清在线免费观看| 亚洲高清资源| 蜜臀a∨国产成人精品| 91精品啪在线观看国产18| 久久资源综合| 成人国产一区二区三区精品麻豆| 影院欧美亚洲| 精品嫩草影院| 亚洲婷婷伊人|