Project Requirements
- Written report. While there is no minimum or maximum
number of pages, quality (not quantity) is the objective.
- Oral report to class.
- Note that some questions on the final test
will be taken from the oral reports.
Project ideas
- Study and analyze a current security topic.
The references listed in your textbook
are an excellent source for project
topics. Google is another good source.
- Write programs to implement and analyze
a cryptographic algorithm or security protocol.
- Develop your own security-related
protocol or algorithm.
- Analyze a cryptanalytic attack. My book
{\it Applied Cryptanalysis: Breaking Ciphers in the Real World}
is a good source for such topics. Copies of this book are on
reserve at the library.
- Many other security topics are possible.
- Note that each project must
include a substantial amount of coding.
Important Dates
- Your project selection must be approved by me
by Monday, February 9.
- The project is due before spring break.
- The oral reports will begin after Thanksgiving.
- You must provide me with a softcopy of both your
paper and your presentation, and all code.
The papers and presentations will be posted online.
Plagiarism
- All papers will be submitted to www.turnitin.com
(an online plagiarism detection tool). If I determine that
you have committed plagiarism, you will fail the course
and I will submit an academic dishonesty report.
- If you are unsure
as to what constitutes plagiarism, find out!.