Bict312 Practical Assignments
Bict312 Practical Assignments
Discipline\Course: BICT
Module Name: Cybersecurity
Module Code: BICT312
Date due: 4/10/2024
Time due: 23:59
Marks:
Date submitted: Click here to enter text.
1. I know that plagiarism means taking and using the ideas, writings, works or inventions of
another as if they were one’s own. I know that plagiarism not only includes verbatim copying,
but also the extensive use of another person’s ideas without proper acknowledgement (which
includes the proper use of quotation marks). I know that plagiarism covers this sort of use of
material found in textual sources and from the Internet.
2. I acknowledge and understand that plagiarism is wrong.
3. I understand that my research and my writing must be accurately referenced. I have followed
the rules and conventions concerning referencing, citation and the use of quotations as set out
in the handbooks.
4. This assignment is my own work, or my group’s own unique group assignment. I acknowledge
that copying someone else’s assignment, or part of it, is wrong, and that submitting identical
work to others constitutes a form of plagiarism.
5. I have not allowed, nor will I in the future allow, anyone to copy my work with the intention of
passing it off as their own work.
I agree to allow my work to be submitted through plagiarism checking / text matching software.
I have submitted my work to the text matching software site and corrected the work as
required. A summary page from the site is attached to my work.
1.
PRACTICAL ASSIGNMENT 1:
Question 1 (50)
Encryption algorithms have steps that are followed during data encryption and decryption. You are
required to write a computer program, using Python, that allows one to enter text and a password
(key). The entered text should be encrypted using any one of the following three encryption
algorithms:
Advanced Encryption Standard or
Data Encryption Standard
At the end of execution, your program should produce the corresponding cipher text.
NB: you are allowed to use an auto-generated key if this key is displayed as output for one to see
what key was used.
Your program should clearly show the following steps or the following components:
1. Code on block creation (15 Marks)
2. Code that is used for sub-key generation (15 Marks)
3. Code for each round clearly showing the activities involved (20 Marks)
BICT312 PRACTICAL ASSIGNMENT 4 October 2024
PRACTICAL ASSIGNMENT 2:
Question 2 (40)
Encryption algorithms have steps that are followed during data encryption and decryption. You are
required to write a computer program, using Python, that decrypts the cipher text produced in
question 1.
Your program should clearly show the following steps or the following components:
1. Code that is used for sub-key generation (15 Marks)
2. Code for each round clearly showing the activities involved (15 Marks)
3. Bonus marks for a functional program (10 Marks)
NB: No submissions will be required. You shall present your work in class on the 8 th of October
2024.
Page | 1