国产人妻人伦精品_欧美一区二区三区图_亚洲欧洲久久_日韩美女av在线免费观看

合肥生活安徽新聞合肥交通合肥房產生活服務合肥教育合肥招聘合肥旅游文化藝術合肥美食合肥地圖合肥社保合肥醫院企業服務合肥法律

代寫SCC.363、代做Java,c++設計程序

時間:2024-02-11  來源:合肥網hfw.cc  作者:hfw.cc 我要糾錯



202**024 ASSESSMENTS
Undergraduate
Individual Programming
Assessment Weighting [30%]
SCC.363 Security and Risk
Academic Honesty and Integrity
Students at Lancaster University are part of an academic community that values trust,
fairness and respect and actively encourages students to act with honesty and integrity. It is
a University policy that students take responsibility for their work and comply with the
university’s standards and requirements- found in the Manual of Academic Regulations and
Practice. By submitting their answers students will be confirming that the work submitted is
completely their own. By submitting their answers the group of students will be confirming
that the work submitted is that of the group. Academic misconduct regulations are in place
for all forms of assessment and students may familiarise themselves with this via the
university website:
https://www.lancaster.ac.uk/academic-standards-and-quality/regulations-policies-andcommittees/manual-of-academic-regulations-and-procedures/
Plagiarism
Plagiarism involves the unacknowledged use of someone else’s work and passing it off as if it
were one’s own. This covers every form of submitted work, from written essays, video
vignettes, and coding exercises. However, deliberately plagiarism with the intent to deceive
and gain academic benefit is unacceptable. This is a conscious, pre-meditated form of
cheating and is regarded as a serious breach of the core values of the University. More
information may be found via the plagiarism framework website. All coursework is to be
submitted electronically and will be run through our plagiarism detection mechanisms.
Please ensure you are familiar with the University's Plagiarism rules and if you are in any
doubt please contact your module tutor.
https://www.lancaster.ac.uk/academic-standards-and-quality/regulations-policies-andcommittees/principles-policies-and-guidelines/plagiarism-framework/
General Guidance:
This is an individual assessment that will count for 30% of your overall mark for this module.
Learning objectives
• Develop appreciation and understanding of security concepts.
• Formulate troubleshooting methods to identify/solve problems.
• Evaluate information to argue solution choices critically.
• Effectively communicate ideas.
Submission requirements
Prepare and submit your coding solutions on Coderunner. For all coding solutions, you must
use Python3. You can use modules from standard Python3 and cryptography.io. Your code
should include appropriate comments explaining what you do and why. All implementations
must be in Python3, and the cryptography.io library must be used for any cryptographyrelated functions (if needed). If you must consider padding in any task, you should use PKCS7.
Your code should include appropriate comments explaining your solution.
Example of the type of comments you SHOULD AVOID -- the comments don't explain the
solution:
def avalancheCalculator(string1, string2):
 # I hash the strings and generate the hexdigest values
 hexstring1 = hashlib.sha256(string1.encode()).hexdigest()
 hexstring2 = hashlib.sha256(string2.encode()).hexdigest()

 # I convert the hexdigest to integers
 int1 = int(hexstring1, 16)
 int2 = int(hexstring2, 16)
 # I XOR the integers
 intResult = int1 ^ int2

 # I return the 1's in the binary representation.
 return ( bin(intResult).count('1') )
Examples of types of comments that provide adequate information – the comments explain
the solution to the problem:
def avalancheCalculator(string1, string2):
 # A solution to the problem is to xor the integer representation
 # of the two values and count in the resulting int the number of bits
 # having the value of 1.
 hexstring1 = hashlib.sha256(string1.encode()).hexdigest()
 hexstring2 = hashlib.sha256(string2.encode()).hexdigest()

 int1 = int(hexstring1, 16)
 int2 = int(hexstring2, 16)
 intResult = int1 ^ int2

 # The "1"s in the binary representation of the XOR operation
 # represent which bits from int1 and int2 are different.
 # This is due to applying the XOR operation. 0^1 = 1, 1^0 = 1
 # Counting the "1"s will provide how many bits differ
 return ( bin(intResult).count('1') )
You have to upload the implementation of your functions on CodeRunner.
Marking Guidelines:
• You have to answer all three (3) tasks. Marks will be allocated based on the clarity of your
solution, comments in the code, and correctness. More information is provided within the
individual questions.
• The name of functions, type/number of variables, and return values must follow the tasks’
guidelines. Failing to adhere to this may result in not receiving marks.
Deadline for submissions: Friday 16
th February 16:00
TASK 1
--------
You are provided with the ds_hash hash function. The function receives a
finite message as input and produces a non-negative integer, which we
consider to be the hash value of the given message.
The size of input messages is fixed and always equals 64 bytes. Implement an
appropriate attack to check if the hash function ds_hash is strong collision
resistant. Your alphabet should include all lower-case and upper-case letters
of the English alphabet and all numbers from 0 to 9.
# -- START OF YOUR CODERUNNER SUBMISSION CODE
# INCLUDE ALL YOUR IMPORTS HERE
def ds_hash(message: str) -> int:
 hash_value = 0
 for ch in message:
 hash_value = (hash_value * 71) + ord(ch)

 return hash_value & 0x7FFFFFFF
def myAttack() -> bool:
# YOUR IMPLEMENTATION
return # True or False
# -- END OF YOUR CODERUNNER SUBMISSION CODE
#You can test your code in your system (NOT IN YOUR CODERUNNER SUBMISSION)
as follows:
# MAIN
if __name__ == "__main__":
print( myAttack() )
Marking scheme: This task's weight is 35% for providing a valid attack and
commenting on your code.
TASK 2
--------
Implement an HMAC based on the RFC-2104 definition (Section 2). The RFC is
available at the following link: https://www.rfc-editor.org/rfc/rfc2104
Below is the extract from the RFC that describes how the HMAC can be
implemented, and this is what you need to implement. The text is amended to
provide specific information about the selected H cryptographic hash
function, i.e., SHA256.
 The definition of HMAC requires a cryptographic hash function, which
 we denote by H, and a secret key K. In your implementation, assume H
 to be the SHA256 cryptographic hash function.
 We denote by B the byte-length of such blocks (B=64 for SHA256),
 and by L the byte-length of hash outputs (L=** for SHA256).
 The authentication key K can be of any length up to B, the
 block length of the hash function. Applications that use keys longer
 than B bytes will first hash the key using H and then use the
 resultant L byte string as the actual key to HMAC. In any case the
 minimal recommended length for K is L bytes (as the hash output
 length).
 We define two fixed and different strings ipad and opad as follows
 (the 'i' and 'o' are mnemonics for inner and outer):
 ipad = the byte 0x36 repeated B times
opad = the byte 0x5C repeated B times.
 To compute HMAC over the data `text' we perform
 H(K XOR opad, H(K XOR ipad, text))
 Namely,
 (1) append zeros to the end of K to create a B byte string
 (e.g., if K is of length 20 bytes and B=64, then K will be
 appended with 44 zero bytes 0x00)
 (2) XOR (bitwise exclusive-OR) the B byte string computed in step
 (1) with ipad
 (3) append the stream of data 'text' to the B byte string resulting
 from step (2)
 (4) apply H to the stream generated in step (3)
 (5) XOR (bitwise exclusive-OR) the B byte string computed in
 step (1) with opad
 (6) append the H result from step (4) to the B byte string
 resulting from step (5)
 (7) apply H to the stream generated in step (6) and output
 the result
The function's name has to be CustomHMAC and defined as follows.
# -- START OF YOUR CODERUNNER SUBMISSION CODE
# INCLUDE ALL YOUR IMPORTS HERE
def CustomHMAC(key: bytes, text: str) -> str:
# YOUR IMPLEMENTATION
return # YOUR RESULT
# -- END OF YOUR CODERUNNER SUBMISSION CODE
#You can test your code in your system (NOT IN YOUR CODERUNNER SUBMISSION)
as follows:
# MAIN
if __name__ == "__main__":
 k = os.urandom(16) # k is <class 'bytes'>
 txt = "hello world!!!!" # txt is <class 'str'>

 print( CustomHMAC(k, txt) )
 # The output will be a string of hexadecimal values, e.g.: a51b … 35fa

You can debug your code against the result from the following function:
from cryptography.hazmat.primitives import hashes, hmac
def HMAC_from_Cryptography(key: bytes, text: str) -> str:
 h = hmac.HMAC(key, hashes.SHA256())
 h.update(text.encode())
 signature = h.finalize().hex()

 return signature
Marking scheme: This task's weight is 40%, which will be allocated equally
for correctly implementing the steps and commenting on your code.
TASK 3
--------
Using the AES-ECB encryptor from the cryptography.io module, implement the
AES mode in Figure 1. You can instantiate an AES-ECB encryptor as follows:
from cryptography.hazmat.primitives.ciphers import Cipher, algorithms,
modes
key = # SELECT AN APPROPRIATE KEY FOR AES
cipher = Cipher(algorithms.AES(key), modes.ECB())
encryptor = cipher.encryptor()
Figure 1 - The figure describes a mode of AES for encrypting plaintext to ciphertext
The function's name has to be CustomAESmode and defined as follows:
# -- START OF YOUR CODERUNNER SUBMISSION CODE
# INCLUDE ALL YOUR IMPORTS HERE
def CustomAESMode(key: bytes, iv: bytes, plaintext: str) -> str:
# YOUR IMPLEMENTATION
return # THE CIPHERTEXT
# -- END OF YOUR CODERUNNER SUBMISSION CODE
#You can test your code in your system (NOT IN YOUR CODERUNNER SUBMISSION)
as follows:
# MAIN
if __name__ == "__main__":
 key = bytes.fromhex("06a9214036b8a15b512e03d534120006")
 iv = bytes.fromhex("3dafba429d9eb430b422da802c9fac41")
 txt = "This is a text"

 print( CustomAESMode(key, iv, txt) )
 # The result using the above input should be:
1827bfc04f1a455eb101b943c44afc1d
Marking scheme: This task's weight is 25%, which will be allocated equally
for correctly implementing the steps and commenting on your code.
如有需要,請加QQ:99515681 或WX:codehelp

掃一掃在手機打開當前頁
  • 上一篇:代做CA3 Group程序、Java編程設計代寫
  • 下一篇:CS170程序代做、Python編程設計代寫
  • 無相關信息
    合肥生活資訊

    合肥圖文信息
    流體仿真外包多少錢_專業CFD分析代做_友商科技CAE仿真
    流體仿真外包多少錢_專業CFD分析代做_友商科
    CAE仿真分析代做公司 CFD流體仿真服務 管路流場仿真外包
    CAE仿真分析代做公司 CFD流體仿真服務 管路
    流體CFD仿真分析_代做咨詢服務_Fluent 仿真技術服務
    流體CFD仿真分析_代做咨詢服務_Fluent 仿真
    結構仿真分析服務_CAE代做咨詢外包_剛強度疲勞振動
    結構仿真分析服務_CAE代做咨詢外包_剛強度疲
    流體cfd仿真分析服務 7類仿真分析代做服務40個行業
    流體cfd仿真分析服務 7類仿真分析代做服務4
    超全面的拼多多電商運營技巧,多多開團助手,多多出評軟件徽y1698861
    超全面的拼多多電商運營技巧,多多開團助手
    CAE有限元仿真分析團隊,2026仿真代做咨詢服務平臺
    CAE有限元仿真分析團隊,2026仿真代做咨詢服
    釘釘簽到打卡位置修改神器,2026怎么修改定位在范圍內
    釘釘簽到打卡位置修改神器,2026怎么修改定
  • 短信驗證碼 寵物飼養 十大衛浴品牌排行 suno 豆包網頁版入口 目錄網 排行網

    關于我們 | 打賞支持 | 廣告服務 | 聯系我們 | 網站地圖 | 免責聲明 | 幫助中心 | 友情鏈接 |

    Copyright © 2025 hfw.cc Inc. All Rights Reserved. 合肥網 版權所有
    ICP備06013414號-3 公安備 42010502001045

    国产人妻人伦精品_欧美一区二区三区图_亚洲欧洲久久_日韩美女av在线免费观看
    国产成人精品自拍| 久久综合网hezyo| 日韩xxxx视频| 精品久久久久久无码中文野结衣| 91精品国产高清久久久久久91 | 91精品国产综合久久香蕉最新版| 欧美亚洲视频在线观看| 性欧美精品一区二区三区在线播放 | 日本欧美视频在线观看| 宅男av一区二区三区| 国产成人精品一区二区三区福利 | 欧美性久久久久| 五码日韩精品一区二区三区视频| 九九精品在线观看| 成人444kkkk在线观看| 国产精品免费视频xxxx| 97久久精品视频| 国产一区免费观看| 极品尤物一区二区三区| 欧美一级片免费播放| 亚洲精品欧美极品| 欧美精品福利在线| 欧美精品在线视频观看| 久久综合88中文色鬼| 欧美成aaa人片在线观看蜜臀| 久久天天躁狠狠躁老女人| 久久国产日韩欧美| 日韩在线免费av| www.美女亚洲精品| 色妞欧美日韩在线| 久久亚洲午夜电影| 69精品小视频| 久久久亚洲成人| 国产成人高潮免费观看精品 | 热re99久久精品国产99热| 日本中文字幕在线视频观看| 懂色一区二区三区av片 | 91精品国产高清久久久久久91 | 亚洲一区二区三区免费观看| 中文字幕无码精品亚洲资源网久久| 精品国产乱码一区二区三区四区| 欧美激情在线一区| 插插插亚洲综合网| 国产999视频| 亚洲在线不卡| 亚洲啊啊啊啊啊| 日本中文字幕在线视频观看| 欧美一二三区| 国产欧美一区二区视频| 国产乱子伦精品无码专区| 成人在线观看毛片| 91精品视频网站| 国产福利精品av综合导导航| 久久久久久久电影一区| 久久久免费精品| 国产成人精品视频在线| 国产精品国产亚洲精品看不卡15 | av不卡在线免费观看| 91免费版网站在线观看| 久久久福利视频| 国产精品久久久久久久小唯西川| 九九九久久国产免费| 亚洲不卡中文字幕| 日韩在线国产| 精品一区2区三区| wwwwww欧美| 日韩视频免费中文字幕| 精品久久久久久一区二区里番| 另类美女黄大片| 天天成人综合网| 免费国产成人av| av日韩中文字幕| 俄罗斯精品一区二区三区| 久久偷窥视频| 国产成人无码a区在线观看视频| 国产精品大陆在线观看| 亚洲字幕一区二区| 欧美激情视频网| 欧美乱大交xxxxx潮喷l头像| 99免费在线视频观看| 久久人人爽亚洲精品天堂| 亚洲一区三区视频在线观看| 欧美精品在欧美一区二区| 国产三区在线视频| 久久99九九| 亚洲高清不卡一区| 免费不卡av在线| 久久亚洲中文字幕无码| 久久国产精品久久久久久久久久| 日本黄网站色大片免费观看| av免费中文字幕| 久久97精品久久久久久久不卡| 欧美亚洲一级二级| 久久久久久a亚洲欧洲aⅴ| 久久综合久中文字幕青草| 免费在线观看一区二区| 国产www精品| 午夜精品久久久久久久白皮肤| 精品无码一区二区三区爱欲 | 国产尤物99| 精品国产一区av| 午夜午夜精品一区二区三区文| 国产午夜大地久久| 国产精品久久久久久久久免费| 日本一道本久久| 日日狠狠久久偷偷四色综合免费| 亚洲精品中文字幕乱码三区不卡 | 蜜桃免费区二区三区| 91精品国产乱码久久久久久蜜臀| 国产精品国产三级国产aⅴ9色 | 欧美日韩国产成人| 国产一级片91| 另类美女黄大片| 国产亚洲情侣一区二区无| 久久久精品欧美| 熟女视频一区二区三区| 狠狠色噜噜狠狠狠狠色吗综合| 日韩在线欧美在线| 日韩精品一区中文字幕| 久久99久久99精品| 岛国视频一区| 91|九色|视频| 国产精品电影网站| 国产一区精品在线| 精品国产免费av| 国产精品一区二区三区久久| 中文字幕av日韩精品| 99国产精品久久久久老师| 中文字幕无码精品亚洲35| 97免费高清电视剧观看| 亚洲精品一区二区三区四区五区| 91精品综合视频| 日本不卡在线播放| 久草青青在线观看| 免费国产黄色网址| 久久成人18免费网站| 国产伦精品一区二区三| 中日韩在线视频| 99在线看视频| 日本一区二区在线播放| 久久66热这里只有精品| 欧美极品视频一区二区三区| 欧美成人精品一区| 91免费在线观看网站| 色一情一乱一伦一区二区三区丨| 久久一区二区三区av| 人妻无码久久一区二区三区免费 | 国产精品一区二| 国产精品99久久久久久大便| 免费av一区二区| 欧美交换配乱吟粗大25p| 久久精品色欧美aⅴ一区二区| 黄色污污在线观看| 色综合久久精品亚洲国产| 国产日韩精品视频| 婷婷五月色综合| 久久精品久久精品亚洲人| 黄色免费高清视频| 亚洲日本理论电影| 国产成人avxxxxx在线看| 精品人妻大屁股白浆无码| 欧美精品久久久久久久久久| 国产成+人+综合+亚洲欧洲| 国产综合色香蕉精品| 欧美日韩高清区| 国产成人精品福利一区二区三区| 日本一道本久久| 国产极品美女高潮无套久久久| 精品网站在线看| 川上优av一区二区线观看| 国产精品久久久久久久久久久久久久| 99国产盗摄| 欧美激情国产日韩| 动漫一区二区在线| 久久躁日日躁aaaaxxxx| 国产激情综合五月久久| 国产欧美日韩精品在线观看| 奇米精品一区二区三区| 久久福利网址导航| 久久久久久国产精品免费免费| 国产欧美综合精品一区二区| 欧美亚洲日本网站| 亚洲精品国产精品久久| 精品国产二区在线| 精品国偷自产在线视频| 久久久神马电影| 国产一区二区三区四区五区在线| 日韩欧美一区二区视频在线播放| 欧美精品www在线观看| 久久久久久欧美精品色一二三四| 99精品视频播放| 国产一区 在线播放| 欧美性受xxxx黑人猛交| 性欧美大战久久久久久久| 久久6免费高清热精品| 久久手机免费视频| 国产成人精品无码播放| 久久99精品久久久久久久青青日本| 91久久夜色精品国产网站| 成人免费观看a|