0% found this document useful (0 votes)
14 views5 pages

Bict312 Practical Assignments

The BICT312 Practical Assignment requires students to work in groups of up to five to complete two programming tasks using Python related to encryption algorithms. The first task involves writing a program to encrypt text using either the Advanced Encryption Standard or Data Encryption Standard, while the second task focuses on decrypting the resulting cipher text. Students must also complete an Academic Honesty Declaration and submit their work by October 4, 2024, with presentations scheduled for October 8, 2024.

Uploaded by

Nyiko Mnisi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views5 pages

Bict312 Practical Assignments

The BICT312 Practical Assignment requires students to work in groups of up to five to complete two programming tasks using Python related to encryption algorithms. The first task involves writing a program to encrypt text using either the Advanced Encryption Standard or Data Encryption Standard, while the second task focuses on decrypting the resulting cipher text. Students must also complete an Academic Honesty Declaration and submit their work by October 4, 2024, with presentations scheduled for October 8, 2024.

Uploaded by

Nyiko Mnisi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

BICT312 PRACTICAL ASSIGNMENT

Do the assignment in a group of at most 5 students


Student name: Click here to enter text.

Student number: Click here to enter text.

Discipline\Course: BICT
Module Name: Cybersecurity
Module Code: BICT312
Date due: 4/10/2024
Time due: 23:59
Marks:
Date submitted: Click here to enter text.

Lecturer: Click here to enter text.


ACADEMIC HONESTY DECLARATION

1. I know that plagiarism means taking and using the ideas, writings, works or inventions of
another as if they were one’s own. I know that plagiarism not only includes verbatim copying,
but also the extensive use of another person’s ideas without proper acknowledgement (which
includes the proper use of quotation marks). I know that plagiarism covers this sort of use of
material found in textual sources and from the Internet.
2. I acknowledge and understand that plagiarism is wrong.
3. I understand that my research and my writing must be accurately referenced. I have followed
the rules and conventions concerning referencing, citation and the use of quotations as set out
in the handbooks.
4. This assignment is my own work, or my group’s own unique group assignment. I acknowledge
that copying someone else’s assignment, or part of it, is wrong, and that submitting identical
work to others constitutes a form of plagiarism.
5. I have not allowed, nor will I in the future allow, anyone to copy my work with the intention of
passing it off as their own work.

Click here to sign/enter name. Click here to enter a date.


Signed Date

Tick the statements below that apply

I agree to allow my work to be submitted through plagiarism checking / text matching software.

I have submitted my work to the text matching software site and corrected the work as
required. A summary page from the site is attached to my work.

Click here to sign/enter name. Click here to enter a date.


Signed Date
Table of Contents

1.
PRACTICAL ASSIGNMENT 1:

Question 1 (50)

Encryption algorithms have steps that are followed during data encryption and decryption. You are
required to write a computer program, using Python, that allows one to enter text and a password
(key). The entered text should be encrypted using any one of the following three encryption
algorithms:
 Advanced Encryption Standard or
 Data Encryption Standard

At the end of execution, your program should produce the corresponding cipher text.
NB: you are allowed to use an auto-generated key if this key is displayed as output for one to see
what key was used.

Your program should clearly show the following steps or the following components:
1. Code on block creation (15 Marks)
2. Code that is used for sub-key generation (15 Marks)
3. Code for each round clearly showing the activities involved (20 Marks)
BICT312 PRACTICAL ASSIGNMENT 4 October 2024

PRACTICAL ASSIGNMENT 2:

Question 2 (40)

Encryption algorithms have steps that are followed during data encryption and decryption. You are
required to write a computer program, using Python, that decrypts the cipher text produced in
question 1.
Your program should clearly show the following steps or the following components:
1. Code that is used for sub-key generation (15 Marks)
2. Code for each round clearly showing the activities involved (15 Marks)
3. Bonus marks for a functional program (10 Marks)

NB: No submissions will be required. You shall present your work in class on the 8 th of October
2024.

Page | 1

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy