Homework: Homework is
due typewritten
(include source code, but not executable files)
by class starting time on the due date.
Each assigned problem requires a solution
and an explanation (or work) detailing
how you arrived at your solution.
Cite any outside sources used to solve a problem.
When grading an assignment,
I may ask for additional information.
A subset of the assigned problems
will be graded.
Zip your homework into a file named hmk.zip.
Email your work to CS166.section1.SJSU@gmail.com
or CS166.section2.SJSU@gmail.com
(depending on your section).
The subject line of your email must be of the form:
CS166HMK assignmentnumber yourlastname last4digitofyourstudentnumber
That is, the subject line must consist of four identifiers.
There is no space within an identifier and each identifier
is separated by a space.
- Assignment 1: Due Thursday, August 29
Chapter 1, problems 3, 10, 11, 13, 15, 17. The problems for Chapter 1 can
be found
here.
Also, briefly comment on each of the following:
- Assignment 2: Due Thursday, September 5
Chapter 2, problems 2, 5, 11, 12, 15, 16, 22, 24, 26, 29. Use your program from problem 12 to help you solve problem 11.
Also, answer the following questions:
Suppose that you are a Professor at a state university located in San Jose, California. You are scheduled to have a sabbatical leave next semester, but before the university will approve your leave, you are required to submit a document listing your financial assets. This information is to be sealed in an envelope, and the university promises not to open the envelope without informing you. You don't trust the university and, besides, you cannot understand how this this personal, private information could have any relevance to your leave, so you refuse to provide such information. The university threatens to cancel your sabbatical, so as a compromise, you suggest the following. You will provide the information, but in encrypted form, and you will hold the key. If a legitimate need arises, you agree to provide the key to the university. To make sure that the data is secure, you will encrypt it with the strongest cipher known, namely, a one-time pad. From your perspective, is this a good compromise? Why or why not? From the university's perspective, is this a good compromise? Why or why not?
- Assignment 3: Due Thursday, September 12
Chapter 3, problems 3, 5, 6, 9, 11, 14, 19, 25, 27, 30, 31, 39a
- Assignment 4: Due Thursday, September 19
Chapter 4, problems 1, 2, 6, 8, 10, 15, 19a, 22, 25, 29, 30, 42a
- Assignment 5: Due Thursday, September 26
Chapter 5, problems 3, 5, 12, 17, 21, 22, 25, 26, 27, 35, 42, 48
- Assignment 6: Due Thursday, October 10
Chapter 7, problems 10, 11, 13, 18, 21, 26, 28, 29, 31, 32, 37, 38
- Assignment 7: Due Thursday, October 17
Chapter 8, problems 2, 3, 7, 10, 11, 13, 15, 20, 21, 24, 25
- Assignment 8: Due Thursday, October 24
Chapter 8, problems 26, 28, 31, 33, 34,
and send a spoofed email to stamp@cs.sjsu.edu
Chapter 9, problems 7, 13, 15, 16
- Assignment 9: Due Thursday, October 31
Chapter 9, problems 4, 6, 17, 18, 19, 24, 27, 29, 32, 36, 41
- Assignment 10: Due Thursday, November 14
Chapter 10, problems 1, 2, 6, 10
Chapter 12, problems 1, 3, 5, 7, 12 (for problems 3 and 5, you can use any Java reversing tool)
- Assignment 11: Due Thursday, November 21
Chapter 10, problems 12, 13, 14, 15, 21, 24, 26, 32, 35, 37, 39, 40, 42
- Assignment 12: Due Thursday, December 5
Chapter 11, problems 6, 11, 13, 15, 19, 28, 30, 34, 36, 39
- Assignment 13: Due end of finals week
Attend at least one of these master's defenses:
http://cs.sjsu.edu/~stamp/defenses/fall13.html