Search for question
Question

Assessment Information

SIT735: Application and Communication Protocol Security

Assessment Task 2: Confidential Message

This document supplies detailed information on the second assessment task for this unit.

Key information

0

Weighting: 20%

3

Learning Outcomes

This assessment assesses the following Unit Learning Outcomes (ULO) and related Graduate

Learning Outcomes (GLO):

Unit Learning Outcome (ULO)

ULO3-Apply principles of public key

cryptography to achieve secure

communication networks by using digital

certificates and digital signatures in

compliance with industry standards.

ULO4-Justify the use of cryptographic

schemes on networked infrastructures to

prevent the misuse of technology.

Graduate Learning Outcome (GLO)

GLO1: Discipline knowledge and capabilities

GLO4: Critical thinking

GLOS: Problem solving

GLO1: Discipline knowledge and capabilities

GLO4: Critical thinking

GLOS: Problem solving

Purpose

This assessment allows you to demonstrate your ability to send confidential messages.

Instructions

This is an individual assessment task. Create a public and private key pair to encrypt and decrypt a

message. Students should submit the following files:

The message: This should be a text file, which contains your "encrypted" message. The

message should contain your student ID and name (message.txt). You should use the openssl

commands.

The document: This should be a .pdf file of no more than four pages, split in three sections

with cosponsoring openssl command's (and provide screenshots of each step):

o Section 1: List the openssl commands you used to encrypt the message.

o Section 2: "List" the openssl commands (including options and parameters) that you

used to decrypt the message. Note that, those commands will be executed within

the folder where the encrypted message is located.

o Section 3: "Describe" the communication protocol you have used to communicate in

graphical notation, such as Alice and Bob notation. Use the description of the

protocol to explain how authenticity of the sender and integrity of the message are

achieved. If further openssl command to verify authenticity and/or integrity are

needed, please, add them too.

• Keys: Cryptographic keys necessary for encryption or decryption (that is generated public

and private keys).

Do not zip your files./nAssessment Information

Important technical information:

Encryption and decryption will be done with the command line tool using openssl.

Each instruction should be in the form of an openssl instruction to be executed within the

folder where the submitted files are downloaded.

The current stable version of openssl is 3.

See the rubric below for more details on what we expect from you.

Submission details

The files must be submitted via CloudDeakin no later than Sunday 20 August 2023, 11.55pm (AEST).

Extension requests

Requests for extensions should be made to Unit/Campus Chairs well in advance of the assessment

due date. Please follow the link for detailed information and a form:

http://www.deakin.edu.au/students/faculties/sebe

Special consideration

You may be eligible for special consideration if circumstances beyond your control prevent you from

undertaking or completing an assessment task at the scheduled time.

See the following link for advice on the application process:

http://www.deakin.edu.au/students/studying/assessment-and-results/special-

consideration

Assessment feedback

You will receive feedback in the form of a marking rubric no later than two weeks after the deadline.

Academic integrity, plagiarism and collusion

Plagiarism and collusion constitute extremely serious breaches of academic integrity. They are forms

of cheating, and severe penalties are associated with them, including cancellation of marks for a

specific assignment, for a specific unit or even exclusion from the course. If you are ever in doubt

about how to properly use and cite a source of information refer to the referencing site above.

Plagiarism occurs when a student passes off as the student's own work, or copies without

acknowledgement as to its authorship, the work of any other person or resubmits their own work

from a previous assessment task.

Collusion occurs when a student obtains the agreement of another person for a fraudulent purpose,

with the intent of obtaining an advantage in submitting an assignment or other work.

Work submitted may be reproduced and/or communicated by the university for the purpose of

assuring academic integrity of submissions: https://www.deakin.edu.au/students/study-

support/referencing/academic-integrity

Fig: 1

Fig: 2