91精品国产91久久久久久_国产精品二区一区二区aⅴ污介绍_一本久久a久久精品vr综合_亚洲视频一区二区三区

合肥生活安徽新聞合肥交通合肥房產(chǎn)生活服務(wù)合肥教育合肥招聘合肥旅游文化藝術(shù)合肥美食合肥地圖合肥社保合肥醫(yī)院企業(yè)服務(wù)合肥法律

代寫SCC.363、代做Java,c++設(shè)計程序

時間:2024-02-11  來源:合肥網(wǎng)hfw.cc  作者:hfw.cc 我要糾錯



202**024 ASSESSMENTS
Undergraduate
Individual Programming
Assessment Weighting [30%]
SCC.363 Security and Risk
Academic Honesty and Integrity
Students at Lancaster University are part of an academic community that values trust,
fairness and respect and actively encourages students to act with honesty and integrity. It is
a University policy that students take responsibility for their work and comply with the
university’s standards and requirements- found in the Manual of Academic Regulations and
Practice. By submitting their answers students will be confirming that the work submitted is
completely their own. By submitting their answers the group of students will be confirming
that the work submitted is that of the group. Academic misconduct regulations are in place
for all forms of assessment and students may familiarise themselves with this via the
university website:
https://www.lancaster.ac.uk/academic-standards-and-quality/regulations-policies-andcommittees/manual-of-academic-regulations-and-procedures/
Plagiarism
Plagiarism involves the unacknowledged use of someone else’s work and passing it off as if it
were one’s own. This covers every form of submitted work, from written essays, video
vignettes, and coding exercises. However, deliberately plagiarism with the intent to deceive
and gain academic benefit is unacceptable. This is a conscious, pre-meditated form of
cheating and is regarded as a serious breach of the core values of the University. More
information may be found via the plagiarism framework website. All coursework is to be
submitted electronically and will be run through our plagiarism detection mechanisms.
Please ensure you are familiar with the University's Plagiarism rules and if you are in any
doubt please contact your module tutor.
https://www.lancaster.ac.uk/academic-standards-and-quality/regulations-policies-andcommittees/principles-policies-and-guidelines/plagiarism-framework/
General Guidance:
This is an individual assessment that will count for 30% of your overall mark for this module.
Learning objectives
• Develop appreciation and understanding of security concepts.
• Formulate troubleshooting methods to identify/solve problems.
• Evaluate information to argue solution choices critically.
• Effectively communicate ideas.
Submission requirements
Prepare and submit your coding solutions on Coderunner. For all coding solutions, you must
use Python3. You can use modules from standard Python3 and cryptography.io. Your code
should include appropriate comments explaining what you do and why. All implementations
must be in Python3, and the cryptography.io library must be used for any cryptographyrelated functions (if needed). If you must consider padding in any task, you should use PKCS7.
Your code should include appropriate comments explaining your solution.
Example of the type of comments you SHOULD AVOID -- the comments don't explain the
solution:
def avalancheCalculator(string1, string2):
 # I hash the strings and generate the hexdigest values
 hexstring1 = hashlib.sha256(string1.encode()).hexdigest()
 hexstring2 = hashlib.sha256(string2.encode()).hexdigest()

 # I convert the hexdigest to integers
 int1 = int(hexstring1, 16)
 int2 = int(hexstring2, 16)
 # I XOR the integers
 intResult = int1 ^ int2

 # I return the 1's in the binary representation.
 return ( bin(intResult).count('1') )
Examples of types of comments that provide adequate information – the comments explain
the solution to the problem:
def avalancheCalculator(string1, string2):
 # A solution to the problem is to xor the integer representation
 # of the two values and count in the resulting int the number of bits
 # having the value of 1.
 hexstring1 = hashlib.sha256(string1.encode()).hexdigest()
 hexstring2 = hashlib.sha256(string2.encode()).hexdigest()

 int1 = int(hexstring1, 16)
 int2 = int(hexstring2, 16)
 intResult = int1 ^ int2

 # The "1"s in the binary representation of the XOR operation
 # represent which bits from int1 and int2 are different.
 # This is due to applying the XOR operation. 0^1 = 1, 1^0 = 1
 # Counting the "1"s will provide how many bits differ
 return ( bin(intResult).count('1') )
You have to upload the implementation of your functions on CodeRunner.
Marking Guidelines:
• You have to answer all three (3) tasks. Marks will be allocated based on the clarity of your
solution, comments in the code, and correctness. More information is provided within the
individual questions.
• The name of functions, type/number of variables, and return values must follow the tasks’
guidelines. Failing to adhere to this may result in not receiving marks.
Deadline for submissions: Friday 16
th February 16:00
TASK 1
--------
You are provided with the ds_hash hash function. The function receives a
finite message as input and produces a non-negative integer, which we
consider to be the hash value of the given message.
The size of input messages is fixed and always equals 64 bytes. Implement an
appropriate attack to check if the hash function ds_hash is strong collision
resistant. Your alphabet should include all lower-case and upper-case letters
of the English alphabet and all numbers from 0 to 9.
# -- START OF YOUR CODERUNNER SUBMISSION CODE
# INCLUDE ALL YOUR IMPORTS HERE
def ds_hash(message: str) -> int:
 hash_value = 0
 for ch in message:
 hash_value = (hash_value * 71) + ord(ch)

 return hash_value & 0x7FFFFFFF
def myAttack() -> bool:
# YOUR IMPLEMENTATION
return # True or False
# -- END OF YOUR CODERUNNER SUBMISSION CODE
#You can test your code in your system (NOT IN YOUR CODERUNNER SUBMISSION)
as follows:
# MAIN
if __name__ == "__main__":
print( myAttack() )
Marking scheme: This task's weight is 35% for providing a valid attack and
commenting on your code.
TASK 2
--------
Implement an HMAC based on the RFC-2104 definition (Section 2). The RFC is
available at the following link: https://www.rfc-editor.org/rfc/rfc2104
Below is the extract from the RFC that describes how the HMAC can be
implemented, and this is what you need to implement. The text is amended to
provide specific information about the selected H cryptographic hash
function, i.e., SHA256.
 The definition of HMAC requires a cryptographic hash function, which
 we denote by H, and a secret key K. In your implementation, assume H
 to be the SHA256 cryptographic hash function.
 We denote by B the byte-length of such blocks (B=64 for SHA256),
 and by L the byte-length of hash outputs (L=** for SHA256).
 The authentication key K can be of any length up to B, the
 block length of the hash function. Applications that use keys longer
 than B bytes will first hash the key using H and then use the
 resultant L byte string as the actual key to HMAC. In any case the
 minimal recommended length for K is L bytes (as the hash output
 length).
 We define two fixed and different strings ipad and opad as follows
 (the 'i' and 'o' are mnemonics for inner and outer):
 ipad = the byte 0x36 repeated B times
opad = the byte 0x5C repeated B times.
 To compute HMAC over the data `text' we perform
 H(K XOR opad, H(K XOR ipad, text))
 Namely,
 (1) append zeros to the end of K to create a B byte string
 (e.g., if K is of length 20 bytes and B=64, then K will be
 appended with 44 zero bytes 0x00)
 (2) XOR (bitwise exclusive-OR) the B byte string computed in step
 (1) with ipad
 (3) append the stream of data 'text' to the B byte string resulting
 from step (2)
 (4) apply H to the stream generated in step (3)
 (5) XOR (bitwise exclusive-OR) the B byte string computed in
 step (1) with opad
 (6) append the H result from step (4) to the B byte string
 resulting from step (5)
 (7) apply H to the stream generated in step (6) and output
 the result
The function's name has to be CustomHMAC and defined as follows.
# -- START OF YOUR CODERUNNER SUBMISSION CODE
# INCLUDE ALL YOUR IMPORTS HERE
def CustomHMAC(key: bytes, text: str) -> str:
# YOUR IMPLEMENTATION
return # YOUR RESULT
# -- END OF YOUR CODERUNNER SUBMISSION CODE
#You can test your code in your system (NOT IN YOUR CODERUNNER SUBMISSION)
as follows:
# MAIN
if __name__ == "__main__":
 k = os.urandom(16) # k is <class 'bytes'>
 txt = "hello world!!!!" # txt is <class 'str'>

 print( CustomHMAC(k, txt) )
 # The output will be a string of hexadecimal values, e.g.: a51b … 35fa

You can debug your code against the result from the following function:
from cryptography.hazmat.primitives import hashes, hmac
def HMAC_from_Cryptography(key: bytes, text: str) -> str:
 h = hmac.HMAC(key, hashes.SHA256())
 h.update(text.encode())
 signature = h.finalize().hex()

 return signature
Marking scheme: This task's weight is 40%, which will be allocated equally
for correctly implementing the steps and commenting on your code.
TASK 3
--------
Using the AES-ECB encryptor from the cryptography.io module, implement the
AES mode in Figure 1. You can instantiate an AES-ECB encryptor as follows:
from cryptography.hazmat.primitives.ciphers import Cipher, algorithms,
modes
key = # SELECT AN APPROPRIATE KEY FOR AES
cipher = Cipher(algorithms.AES(key), modes.ECB())
encryptor = cipher.encryptor()
Figure 1 - The figure describes a mode of AES for encrypting plaintext to ciphertext
The function's name has to be CustomAESmode and defined as follows:
# -- START OF YOUR CODERUNNER SUBMISSION CODE
# INCLUDE ALL YOUR IMPORTS HERE
def CustomAESMode(key: bytes, iv: bytes, plaintext: str) -> str:
# YOUR IMPLEMENTATION
return # THE CIPHERTEXT
# -- END OF YOUR CODERUNNER SUBMISSION CODE
#You can test your code in your system (NOT IN YOUR CODERUNNER SUBMISSION)
as follows:
# MAIN
if __name__ == "__main__":
 key = bytes.fromhex("06a9214036b8a15b512e03d534120006")
 iv = bytes.fromhex("3dafba429d9eb430b422da802c9fac41")
 txt = "This is a text"

 print( CustomAESMode(key, iv, txt) )
 # The result using the above input should be:
1827bfc04f1a455eb101b943c44afc1d
Marking scheme: This task's weight is 25%, which will be allocated equally
for correctly implementing the steps and commenting on your code.
如有需要,請加QQ:99515681 或WX:codehelp

掃一掃在手機打開當(dāng)前頁
  • 上一篇:代做CA3 Group程序、Java編程設(shè)計代寫
  • 下一篇:CS170程序代做、Python編程設(shè)計代寫
  • 無相關(guān)信息
    合肥生活資訊

    合肥圖文信息
    2025年10月份更新拼多多改銷助手小象助手多多出評軟件
    2025年10月份更新拼多多改銷助手小象助手多
    有限元分析 CAE仿真分析服務(wù)-企業(yè)/產(chǎn)品研發(fā)/客戶要求/設(shè)計優(yōu)化
    有限元分析 CAE仿真分析服務(wù)-企業(yè)/產(chǎn)品研發(fā)
    急尋熱仿真分析?代做熱仿真服務(wù)+熱設(shè)計優(yōu)化
    急尋熱仿真分析?代做熱仿真服務(wù)+熱設(shè)計優(yōu)化
    出評 開團(tuán)工具
    出評 開團(tuán)工具
    挖掘機濾芯提升發(fā)動機性能
    挖掘機濾芯提升發(fā)動機性能
    海信羅馬假日洗衣機亮相AWE  復(fù)古美學(xué)與現(xiàn)代科技完美結(jié)合
    海信羅馬假日洗衣機亮相AWE 復(fù)古美學(xué)與現(xiàn)代
    合肥機場巴士4號線
    合肥機場巴士4號線
    合肥機場巴士3號線
    合肥機場巴士3號線
  • 短信驗證碼 目錄網(wǎng) 排行網(wǎng)

    關(guān)于我們 | 打賞支持 | 廣告服務(wù) | 聯(lián)系我們 | 網(wǎng)站地圖 | 免責(zé)聲明 | 幫助中心 | 友情鏈接 |

    Copyright © 2025 hfw.cc Inc. All Rights Reserved. 合肥網(wǎng) 版權(quán)所有
    ICP備06013414號-3 公安備 42010502001045

    91精品国产91久久久久久_国产精品二区一区二区aⅴ污介绍_一本久久a久久精品vr综合_亚洲视频一区二区三区
    日韩欧美激情在线| 日韩精品亚洲一区二区三区免费| 欧美绝品在线观看成人午夜影视| 美玉足脚交一区二区三区图片| 亚洲伦理一区| 午夜亚洲激情| 美女国产精品| 在线观看不卡一区| 欧美片在线播放| 日韩午夜小视频| 欧美xxxx老人做受| 久久久久九九视频| 中文字幕免费一区| 亚洲欧美色一区| 午夜精品福利一区二区三区av| 亚洲国产精品一区二区www在线| 亚洲国产日产av| 久久精品二区亚洲w码| 国产一二三精品| 不卡免费追剧大全电视剧网站| 91视频在线看| 一本色道久久综合亚洲精品不| 免费日韩视频| 在线播放亚洲一区| 久久久久久麻豆| 亚洲视频免费观看| 日本欧美肥老太交大片| 国产精一区二区三区| 色综合天天做天天爱| 99一区二区| 欧美日韩视频不卡| 久久久精品国产免大香伊 | 中文字幕一区二区三区蜜月| 一二三区精品视频| 韩国v欧美v日本v亚洲v| 91丨porny丨蝌蚪视频| 中日韩视频在线观看| 欧美日韩1234| 日本一区二区不卡视频| 午夜精品在线看| 成人晚上爱看视频| aa国产精品| 欧美一区二区久久久| ...xxx性欧美| 激情小说欧美图片| 狠狠干成人综合网| 欧美日韩情趣电影| 国产精品久久免费看| 久久精品国产**网站演员| 欧美精品99| 欧美日韩一区 二区 三区 久久精品| 2017欧美狠狠色| 亚洲成人资源在线| 色综合久久中文综合久久97 | 国产三级久久久| 久久国产精品区| 韩日精品视频| 日韩欧美专区在线| 午夜视黄欧洲亚洲| 欧美日韩亚洲一区| 884aa四虎影成人精品一区| 亚洲免费观看在线视频| 成人午夜免费av| 每日更新成人在线视频| 国产日产欧美一区| 久久国产欧美日韩精品| 亚洲国产一区二区三区a毛片 | 亚洲黄色高清| 国产精品swag| 99热这里只有精品8| 日韩欧美亚洲国产另类| 午夜精品一区二区三区免费视频| 女人天堂亚洲aⅴ在线观看| 欧美日韩国产一级二级| 亚洲自拍偷拍麻豆| 国产综合视频| 精品国产自在久精品国产| 美女视频黄 久久| 亚洲一区二区精品在线| 国产免费观看久久| 成人sese在线| 91精品国产色综合久久不卡蜜臀 | 久久这里有精品15一区二区三区| 中日韩免费视频中文字幕| 国产白丝精品91爽爽久久| 老妇喷水一区二区三区| 一区二区三区四区视频精品免费 | 亚洲一区免费看| 亚洲人xxxx| 欧美视频四区| 国产欧美一区二区三区鸳鸯浴 | 久久精品国产99久久6| 亚洲欧美日韩精品一区二区| 亚洲女人小视频在线观看| 欧美日韩综合另类| 中文字幕的久久| 欧美日韩精品一本二本三本| 久久久久久久久免费| 成人综合婷婷国产精品久久免费| 欧美福利一区二区| 国产成人自拍高清视频在线免费播放| 欧美最猛性xxxxx直播| 免费观看成人鲁鲁鲁鲁鲁视频| 老鸭窝毛片一区二区三区| 亚洲午夜激情网站| 久久人人精品| 蜜桃91丨九色丨蝌蚪91桃色| 欧美专区亚洲专区| 狠狠色综合播放一区二区| 欧美日韩一区二区三区在线| 另类调教123区 | 九九**精品视频免费播放| 欧美日韩国产首页在线观看| 久久99热99| 日韩欧美中文字幕一区| 成人av影院在线| 亚洲国产精品v| 亚洲激情婷婷| 日韩高清在线电影| 欧美日韩精品免费| 成人激情开心网| 国产精品久久毛片| 午夜亚洲一区| 麻豆精品一区二区| 精品国产免费一区二区三区四区| 欧美.www| 亚洲成人精品影院| 欧美一区二区三区性视频| 91一区二区三区在线播放| 亚洲乱码精品一二三四区日韩在线 | 欧美日本不卡高清| 亚洲一区二区三区自拍| 欧美色视频在线| 91亚洲精品久久久蜜桃| 亚洲欧美日韩在线| 91精品1区2区| 91亚洲精华国产精华精华液| 亚洲精品自拍动漫在线| 欧美视频在线不卡| 91蜜桃传媒精品久久久一区二区| 悠悠色在线精品| 欧美精品九九99久久| 国内自拍一区| 久久99精品久久久久久久久久久久| 日韩美女一区二区三区| 夜夜精品视频| 国产成人精品三级麻豆| 亚洲色图一区二区三区| 欧美日韩视频第一区| 韩国免费一区| 国产做a爰片久久毛片| 国产精品萝li| 欧美高清精品3d| 国产欧美韩日| 成人免费视频app| 五月天亚洲精品| 欧美极品aⅴ影院| 欧美日韩在线综合| 亚洲人成网站在线观看播放 | 欧美色电影在线| 伊伊综合在线| 国产成人鲁色资源国产91色综 | 亚洲狼人精品一区二区三区| 国产99久久精品| 午夜欧美大尺度福利影院在线看 | 国产在线不卡一卡二卡三卡四卡| 亚洲欧洲日本在线| 日韩欧美一级特黄在线播放| 一本色道88久久加勒比精品| av激情综合网| 麻豆国产欧美日韩综合精品二区| 国产精品免费网站在线观看| 日韩一区二区免费高清| 久久本道综合色狠狠五月| 国产主播一区| 不卡的电视剧免费网站有什么| 美女国产一区二区| 夜夜亚洲天天久久| 国产精品成人在线观看| 精品国免费一区二区三区| 欧美挠脚心视频网站| 久久久久久精| 一区二区三区欧美成人| 国产精品jizz在线观看美国| 成人黄色一级视频| 国产精品综合二区| 六月丁香婷婷色狠狠久久| 亚洲国产综合人成综合网站| 中文字幕日韩av资源站| 国产日韩欧美综合在线| 精品捆绑美女sm三区| 欧美精三区欧美精三区| 一本久久a久久免费精品不卡| aa成人免费视频| 日韩视频一区| 一本一本久久| 99热免费精品| 国产精品一级久久久| 中日韩视频在线观看| 国产精品老牛|