99爱在线视频这里只有精品_窝窝午夜看片成人精品_日韩精品久久久毛片一区二区_亚洲一区二区久久

合肥生活安徽新聞合肥交通合肥房產(chǎn)生活服務合肥教育合肥招聘合肥旅游文化藝術(shù)合肥美食合肥地圖合肥社保合肥醫(yī)院企業(yè)服務合肥法律

代寫SCC.363、代做Java,c++設(shè)計程序

時間:2024-02-11  來源:合肥網(wǎng)hfw.cc  作者:hfw.cc 我要糾錯



202**024 ASSESSMENTS
Undergraduate
Individual Programming
Assessment Weighting [30%]
SCC.363 Security and Risk
Academic Honesty and Integrity
Students at Lancaster University are part of an academic community that values trust,
fairness and respect and actively encourages students to act with honesty and integrity. It is
a University policy that students take responsibility for their work and comply with the
university’s standards and requirements- found in the Manual of Academic Regulations and
Practice. By submitting their answers students will be confirming that the work submitted is
completely their own. By submitting their answers the group of students will be confirming
that the work submitted is that of the group. Academic misconduct regulations are in place
for all forms of assessment and students may familiarise themselves with this via the
university website:
https://www.lancaster.ac.uk/academic-standards-and-quality/regulations-policies-andcommittees/manual-of-academic-regulations-and-procedures/
Plagiarism
Plagiarism involves the unacknowledged use of someone else’s work and passing it off as if it
were one’s own. This covers every form of submitted work, from written essays, video
vignettes, and coding exercises. However, deliberately plagiarism with the intent to deceive
and gain academic benefit is unacceptable. This is a conscious, pre-meditated form of
cheating and is regarded as a serious breach of the core values of the University. More
information may be found via the plagiarism framework website. All coursework is to be
submitted electronically and will be run through our plagiarism detection mechanisms.
Please ensure you are familiar with the University's Plagiarism rules and if you are in any
doubt please contact your module tutor.
https://www.lancaster.ac.uk/academic-standards-and-quality/regulations-policies-andcommittees/principles-policies-and-guidelines/plagiarism-framework/
General Guidance:
This is an individual assessment that will count for 30% of your overall mark for this module.
Learning objectives
• Develop appreciation and understanding of security concepts.
• Formulate troubleshooting methods to identify/solve problems.
• Evaluate information to argue solution choices critically.
• Effectively communicate ideas.
Submission requirements
Prepare and submit your coding solutions on Coderunner. For all coding solutions, you must
use Python3. You can use modules from standard Python3 and cryptography.io. Your code
should include appropriate comments explaining what you do and why. All implementations
must be in Python3, and the cryptography.io library must be used for any cryptographyrelated functions (if needed). If you must consider padding in any task, you should use PKCS7.
Your code should include appropriate comments explaining your solution.
Example of the type of comments you SHOULD AVOID -- the comments don't explain the
solution:
def avalancheCalculator(string1, string2):
 # I hash the strings and generate the hexdigest values
 hexstring1 = hashlib.sha256(string1.encode()).hexdigest()
 hexstring2 = hashlib.sha256(string2.encode()).hexdigest()

 # I convert the hexdigest to integers
 int1 = int(hexstring1, 16)
 int2 = int(hexstring2, 16)
 # I XOR the integers
 intResult = int1 ^ int2

 # I return the 1's in the binary representation.
 return ( bin(intResult).count('1') )
Examples of types of comments that provide adequate information – the comments explain
the solution to the problem:
def avalancheCalculator(string1, string2):
 # A solution to the problem is to xor the integer representation
 # of the two values and count in the resulting int the number of bits
 # having the value of 1.
 hexstring1 = hashlib.sha256(string1.encode()).hexdigest()
 hexstring2 = hashlib.sha256(string2.encode()).hexdigest()

 int1 = int(hexstring1, 16)
 int2 = int(hexstring2, 16)
 intResult = int1 ^ int2

 # The "1"s in the binary representation of the XOR operation
 # represent which bits from int1 and int2 are different.
 # This is due to applying the XOR operation. 0^1 = 1, 1^0 = 1
 # Counting the "1"s will provide how many bits differ
 return ( bin(intResult).count('1') )
You have to upload the implementation of your functions on CodeRunner.
Marking Guidelines:
• You have to answer all three (3) tasks. Marks will be allocated based on the clarity of your
solution, comments in the code, and correctness. More information is provided within the
individual questions.
• The name of functions, type/number of variables, and return values must follow the tasks’
guidelines. Failing to adhere to this may result in not receiving marks.
Deadline for submissions: Friday 16
th February 16:00
TASK 1
--------
You are provided with the ds_hash hash function. The function receives a
finite message as input and produces a non-negative integer, which we
consider to be the hash value of the given message.
The size of input messages is fixed and always equals 64 bytes. Implement an
appropriate attack to check if the hash function ds_hash is strong collision
resistant. Your alphabet should include all lower-case and upper-case letters
of the English alphabet and all numbers from 0 to 9.
# -- START OF YOUR CODERUNNER SUBMISSION CODE
# INCLUDE ALL YOUR IMPORTS HERE
def ds_hash(message: str) -> int:
 hash_value = 0
 for ch in message:
 hash_value = (hash_value * 71) + ord(ch)

 return hash_value & 0x7FFFFFFF
def myAttack() -> bool:
# YOUR IMPLEMENTATION
return # True or False
# -- END OF YOUR CODERUNNER SUBMISSION CODE
#You can test your code in your system (NOT IN YOUR CODERUNNER SUBMISSION)
as follows:
# MAIN
if __name__ == "__main__":
print( myAttack() )
Marking scheme: This task's weight is 35% for providing a valid attack and
commenting on your code.
TASK 2
--------
Implement an HMAC based on the RFC-2104 definition (Section 2). The RFC is
available at the following link: https://www.rfc-editor.org/rfc/rfc2104
Below is the extract from the RFC that describes how the HMAC can be
implemented, and this is what you need to implement. The text is amended to
provide specific information about the selected H cryptographic hash
function, i.e., SHA256.
 The definition of HMAC requires a cryptographic hash function, which
 we denote by H, and a secret key K. In your implementation, assume H
 to be the SHA256 cryptographic hash function.
 We denote by B the byte-length of such blocks (B=64 for SHA256),
 and by L the byte-length of hash outputs (L=** for SHA256).
 The authentication key K can be of any length up to B, the
 block length of the hash function. Applications that use keys longer
 than B bytes will first hash the key using H and then use the
 resultant L byte string as the actual key to HMAC. In any case the
 minimal recommended length for K is L bytes (as the hash output
 length).
 We define two fixed and different strings ipad and opad as follows
 (the 'i' and 'o' are mnemonics for inner and outer):
 ipad = the byte 0x36 repeated B times
opad = the byte 0x5C repeated B times.
 To compute HMAC over the data `text' we perform
 H(K XOR opad, H(K XOR ipad, text))
 Namely,
 (1) append zeros to the end of K to create a B byte string
 (e.g., if K is of length 20 bytes and B=64, then K will be
 appended with 44 zero bytes 0x00)
 (2) XOR (bitwise exclusive-OR) the B byte string computed in step
 (1) with ipad
 (3) append the stream of data 'text' to the B byte string resulting
 from step (2)
 (4) apply H to the stream generated in step (3)
 (5) XOR (bitwise exclusive-OR) the B byte string computed in
 step (1) with opad
 (6) append the H result from step (4) to the B byte string
 resulting from step (5)
 (7) apply H to the stream generated in step (6) and output
 the result
The function's name has to be CustomHMAC and defined as follows.
# -- START OF YOUR CODERUNNER SUBMISSION CODE
# INCLUDE ALL YOUR IMPORTS HERE
def CustomHMAC(key: bytes, text: str) -> str:
# YOUR IMPLEMENTATION
return # YOUR RESULT
# -- END OF YOUR CODERUNNER SUBMISSION CODE
#You can test your code in your system (NOT IN YOUR CODERUNNER SUBMISSION)
as follows:
# MAIN
if __name__ == "__main__":
 k = os.urandom(16) # k is <class 'bytes'>
 txt = "hello world!!!!" # txt is <class 'str'>

 print( CustomHMAC(k, txt) )
 # The output will be a string of hexadecimal values, e.g.: a51b … 35fa

You can debug your code against the result from the following function:
from cryptography.hazmat.primitives import hashes, hmac
def HMAC_from_Cryptography(key: bytes, text: str) -> str:
 h = hmac.HMAC(key, hashes.SHA256())
 h.update(text.encode())
 signature = h.finalize().hex()

 return signature
Marking scheme: This task's weight is 40%, which will be allocated equally
for correctly implementing the steps and commenting on your code.
TASK 3
--------
Using the AES-ECB encryptor from the cryptography.io module, implement the
AES mode in Figure 1. You can instantiate an AES-ECB encryptor as follows:
from cryptography.hazmat.primitives.ciphers import Cipher, algorithms,
modes
key = # SELECT AN APPROPRIATE KEY FOR AES
cipher = Cipher(algorithms.AES(key), modes.ECB())
encryptor = cipher.encryptor()
Figure 1 - The figure describes a mode of AES for encrypting plaintext to ciphertext
The function's name has to be CustomAESmode and defined as follows:
# -- START OF YOUR CODERUNNER SUBMISSION CODE
# INCLUDE ALL YOUR IMPORTS HERE
def CustomAESMode(key: bytes, iv: bytes, plaintext: str) -> str:
# YOUR IMPLEMENTATION
return # THE CIPHERTEXT
# -- END OF YOUR CODERUNNER SUBMISSION CODE
#You can test your code in your system (NOT IN YOUR CODERUNNER SUBMISSION)
as follows:
# MAIN
if __name__ == "__main__":
 key = bytes.fromhex("06a9214036b8a15b512e03d534120006")
 iv = bytes.fromhex("3dafba429d9eb430b422da802c9fac41")
 txt = "This is a text"

 print( CustomAESMode(key, iv, txt) )
 # The result using the above input should be:
1827bfc04f1a455eb101b943c44afc1d
Marking scheme: This task's weight is 25%, which will be allocated equally
for correctly implementing the steps and commenting on your code.
如有需要,請加QQ:99515681 或WX:codehelp

掃一掃在手機打開當前頁
  • 上一篇:代做CA3 Group程序、Java編程設(shè)計代寫
  • 下一篇:CS170程序代做、Python編程設(shè)計代寫
  • 無相關(guān)信息
    合肥生活資訊

    合肥圖文信息
    急尋熱仿真分析?代做熱仿真服務+熱設(shè)計優(yōu)化
    急尋熱仿真分析?代做熱仿真服務+熱設(shè)計優(yōu)化
    出評 開團工具
    出評 開團工具
    挖掘機濾芯提升發(fā)動機性能
    挖掘機濾芯提升發(fā)動機性能
    海信羅馬假日洗衣機亮相AWE  復古美學與現(xiàn)代科技完美結(jié)合
    海信羅馬假日洗衣機亮相AWE 復古美學與現(xiàn)代
    合肥機場巴士4號線
    合肥機場巴士4號線
    合肥機場巴士3號線
    合肥機場巴士3號線
    合肥機場巴士2號線
    合肥機場巴士2號線
    合肥機場巴士1號線
    合肥機場巴士1號線
  • 短信驗證碼 豆包 幣安下載 AI生圖 目錄網(wǎng)

    關(guān)于我們 | 打賞支持 | 廣告服務 | 聯(lián)系我們 | 網(wǎng)站地圖 | 免責聲明 | 幫助中心 | 友情鏈接 |

    Copyright © 2025 hfw.cc Inc. All Rights Reserved. 合肥網(wǎng) 版權(quán)所有
    ICP備06013414號-3 公安備 42010502001045

    99爱在线视频这里只有精品_窝窝午夜看片成人精品_日韩精品久久久毛片一区二区_亚洲一区二区久久

          9000px;">

                亚洲图片激情小说| 韩国精品主播一区二区在线观看 | 中文av一区特黄| 在线播放视频一区| 99re热这里只有精品视频| 免费成人在线视频观看| 免费观看91视频大全| 国产精品另类一区| 精品久久五月天| 亚洲成av人片在www色猫咪| 色婷婷综合久久久中文一区二区| 亚洲男人的天堂在线aⅴ视频| 国产日韩欧美麻豆| www精品美女久久久tv| 久久五月婷婷丁香社区| 欧美日韩在线一区二区| 欧美一区二区在线播放| 欧美精选一区二区| 日韩欧美二区三区| 久久一日本道色综合| 日韩在线播放一区二区| 亚洲欧美日韩在线| 久久在线观看免费| 日韩欧美国产午夜精品| 亚洲精品在线三区| 国产校园另类小说区| 国产精品白丝在线| 婷婷成人综合网| 国产一区不卡视频| 欧美一区二区三区成人| 懂色av中文字幕一区二区三区| 成人免费视频一区二区| 在线免费观看一区| 精品女同一区二区| 欧美激情一区二区| 亚洲成在线观看| 国产一区亚洲一区| 色婷婷av一区| 精品伦理精品一区| 亚洲欧美电影一区二区| 久久精品免费观看| 91搞黄在线观看| 亚洲精品在线电影| 亚洲综合色区另类av| 精品一区二区三区在线视频| 一区二区三区欧美日| 亚洲一区二区三区国产| 国产一区二区三区四| 国产成人免费在线视频| 欧美日韩成人综合| 久久久另类综合| 石原莉奈在线亚洲三区| 国产精品资源在线观看| 777xxx欧美| 欧美国产激情一区二区三区蜜月| 亚洲女爱视频在线| 人禽交欧美网站| 亚洲成av人片在线| 国产精品一二三四| 色菇凉天天综合网| 欧美一级免费大片| 国产精品国产馆在线真实露脸 | 成人黄色av网站在线| 色婷婷av一区二区三区gif| 6080国产精品一区二区| 欧美一区二区人人喊爽| 国产精品日韩成人| 日韩av在线播放中文字幕| 91最新地址在线播放| 欧美一区二区三区免费在线看| 国产麻豆精品一区二区| 亚洲444eee在线观看| 色综合天天综合网国产成人综合天| 欧美一区二区二区| 日韩精品中午字幕| 亚洲日本丝袜连裤袜办公室| 玖玖九九国产精品| 国产精品一二三在| 91精品国产一区二区三区香蕉| 中文一区二区完整视频在线观看| 一区二区三区欧美久久| 国产精品自产自拍| 欧美一级电影网站| 亚洲免费观看高清完整版在线 | 亚洲综合视频网| 91在线视频免费观看| 亚洲国产精品精华液网站| 91黄色在线观看| 欧美日韩国产另类一区| 亚洲一区欧美一区| 久久精品国产精品亚洲精品| 亚洲天堂福利av| 色婷婷综合久色| 亚洲v精品v日韩v欧美v专区| 欧美一区二区视频观看视频| 久久国产乱子精品免费女| 午夜欧美在线一二页| 久久综合色婷婷| 成人教育av在线| 国产香蕉久久精品综合网| 青青国产91久久久久久| 欧美日韩免费观看一区三区| 欧美一区二区黄| 欧美国产精品中文字幕| 欧美精品一区二区久久婷婷| 日本在线不卡一区| 欧美视频一二三区| 亚洲精选视频在线| 91浏览器打开| 久久久美女毛片| 99久久精品一区二区| 亚洲色图一区二区三区| 午夜a成v人精品| 欧美大片在线观看一区| 经典三级在线一区| 亚洲精品五月天| 欧美亚洲综合色| 国产精品一区二区男女羞羞无遮挡| 久久久精品国产99久久精品芒果 | 亚洲欧美国产77777| 色综合久久66| 久久综合综合久久综合| 国产欧美综合在线观看第十页| 欧美私人免费视频| 久久精品噜噜噜成人88aⅴ| 最新国产成人在线观看| 欧美日韩国产免费一区二区| 成人免费视频一区| 亚洲综合色视频| 亚洲国产精品精华液ab| 91久久精品国产91性色tv| 午夜影视日本亚洲欧洲精品| 精品欧美一区二区久久| 波多野结衣欧美| 亚洲综合在线观看视频| 久久综合九色欧美综合狠狠| 色综合一区二区三区| 国产精品资源网| 亚洲综合一二三区| 久久精品欧美日韩精品 | 精品成人一区二区| 成人一区二区三区视频在线观看| 丝袜诱惑制服诱惑色一区在线观看| 日韩欧美国产一二三区| 欧美视频精品在线| 国产99久久久久久免费看农村| 亚洲色图视频免费播放| 91麻豆精品国产自产在线观看一区| 成人黄色一级视频| 亚洲不卡在线观看| 综合亚洲深深色噜噜狠狠网站| 日韩欧美国产综合一区 | 欧美精品乱码久久久久久| 色综合天天狠狠| 国产中文字幕一区| 精品制服美女久久| 亚洲成av人片观看| 亚洲成人午夜电影| 亚洲人吸女人奶水| 亚洲另类在线一区| 国产精品私人影院| 国产精品超碰97尤物18| 日韩一区二区在线免费观看| 99久久久国产精品| 国产日韩成人精品| 色狠狠桃花综合| 在线观看日韩精品| 成人晚上爱看视频| 成人国产在线观看| 国产真实乱对白精彩久久| 一区二区三区中文在线观看| 中文字幕久久午夜不卡| 久久久噜噜噜久噜久久综合| 欧美一卡2卡3卡4卡| 欧美电视剧在线观看完整版| 欧美性欧美巨大黑白大战| 91亚洲资源网| 99精品一区二区三区| 国产成人精品影视| 不卡的看片网站| av中文字幕不卡| 欧美日韩在线亚洲一区蜜芽| 欧美色精品天天在线观看视频| 91精品国产综合久久小美女 | 精品va天堂亚洲国产| 欧美变态口味重另类| 中文字幕国产一区二区| 国产精品色一区二区三区| 一区二区三区高清不卡| 一区二区三区免费观看| 久久精品国产99国产| 亚洲精品网站在线观看| 人人超碰91尤物精品国产| 国产欧美日韩综合精品一区二区| 国产精品国产三级国产专播品爱网| 国产精品123| 97久久精品人人做人人爽50路| 色哟哟一区二区在线观看| 欧美一卡2卡3卡4卡| 欧美精品一区在线观看|