In this assignment, there are (six) questions in total.
Question 1 is about designing Privacy Preserving System. The question has two options. You need to answer any 1 out of two options. In the first option, you are required to design a privacy-preserving revenue model using the homomorphic property of the Exponential ElGamal cryptosystems. In the second option, you are expected to apply your understanding of privacy preserving computation in the context of electronic voting (E-Voting) based on the homomorphic property of Paillier Cryptosystems.
Question 2 is about the application of Digital Signature Schemes. In this question, you are expected to demonstrate your understanding of the RSA digital signature scheme and its security limitation. You are required to show step-by-step processes of how RSA digital signature can be forged. Marks will be deducted if you fail to show the detail computation correctly, skip the computation steps, or do not provide explanations.
Question 3 is about showing your understanding on secure data hiding. In this question, there are 2 (two) options:
Q3(a) and Q3(b). You need to choose any 1 out of the two options. In question Q3(a), you are required to implement an image steganography method based on LSB Image steganography algorithm. In question Q3(b), you are required to discuss embedding and extraction methods using Text steganography algorithm on HTML source. You should describe detail steps of the steganography with necessary screenshots.
Question 4 is related to the implementation of a secure file sharing system based on the concept of public-key cryptosystem-based encryption-decryption and digital signature. You should use OpenSSL and IPFS commands to show step by step processes to perform the secure file sharing tasks. you are expected to provide screenshots of the outcomes for commands. Marks will be deducted if you fail to show the commands correctly, skip any command, or do not provide screenshots.
Question 5 is on report writing on Blockchain or implementation of a blockchain-based system. Only for this question, you can submit the solution individually or in a group. In the case of a group submission, the maximum group members can be 3 (three), and you must mention the names of group members in the solution of this question. In this question, there are 2 (two) options: Q5(a) and Q5(b). You need to choose any 1 out of the two options. The first option Q5(a) is on report writing and the option, Q5(b) is about the implementation of a blockchain-based system. If you select Q5(a), you are expected to demonstrate your understanding of the Blockchain and write a well-organized report on a given topic. We are looking for interesting and innovative system design in the report. The report should be appended in the same document where you write the answers for other questions. Further instructions are given in the question. If you select Q5(b), you are expected to implement a blockchain system for a given scenario. You should describe detail steps of implementation with necessary code segments. Additionally, you need to provide a video demonstration and submit the code on the CANVAS. For a video demonstration, you are required to upload your video in the Youtube or any other platform and provide the link in the PDF document. The corresponding code should be uploaded as a ZIP file on the CANVAS.
Question 6 is related to analyzing the security of authentication protocols. Your answer should contain necessary explanation. Marks will be deducted if you fail to provide the explanation correctly for all of the protocols.