Вы находитесь на странице: 1из 2

UNIVERSITY OF ENGINEERING & TECHNOLOGY, MARDAN

Department of Computer Software Engineering

Assignment # 4: Complex Engineering Problem


Subject Name: SE-409 Enterprise Security Architecture
Semester: Spring 2019 (8th) Marks: 10
Assigned on: 18-6-2019 Submission Due Date: 8-7-2019

Target CLO-3, PLO-3

Note:
1) This assignment should be undertaken by the students individually.

Problem Statement:

Often there is confusion on using Symmetric and Asymmetric cryptosystems for different
scenarios as each of these algorithms have their own advantages and disadvantages. Selecting
inappropriate algorithm for a particular scenario may lead to inefficiency of the overall system.
Therefore, there is a need to design an efficient and secure cryptographic system for
communication between two parties depending on various scenario.

Objectives:

Design a secure communication infrastructure utilizing both public and private key
cryptosystems. Depending on the user requirements (scenario), the system should utilize
appropriate algorithm for encryption and key exchange.
The system should be fast and as well as provides enough level of security in different types of
scenario of communication.

Investigation/ Evaluation

Students need to investigate the performance and adequate level of encryption required for a
particular scenario and type of communication between two parties. Various public key
cryptographic algorithms (e.g., RSA) and private key algorithms (DES, RSA) should be investigated
for its application on each scenario.

Design:

Students need to design a solution which achieve the mentioned objectives.

Deliverables:

The deliverable should consist of: (i) Complete design of secure communication system along
with pseudocode/programming code/graphical layout of design.

--End of Assignment--
Complex Engineering Problem

Attributes Conformance

S# Attribute Present in the


Problem
1 Range of conflicting requirements: This Yes
assignment is intended to challenge
students to address a wide range of
conflicting issues.
2 Depth of Analysis required: There is no Yes
obvious solution to this assignment. Creative
thinking in terms of usage of appropriate
technologies to design is central to this
assignment.
3 Depth of knowledge required: Yes
Demonstration of sound engineering design
principles and problem solving is required to
solve this assignment. In-depth knowledge
of Enterprise Security and cryptography is
required to accomplish this task.
4 Familiarity of issues: Students are not Yes
familiar with the issues which may be
encountered as they are doing/experiencing
this task for the first time. Significant
challenges beyond what students have
experienced in previous projects are present
in this assignment.
5 Extent of applicable codes: Is not outside No
the problems encompassed by standards
and codes of practice for professional
engineers.
6 Extent of stakeholder Involved: Diverse Yes
groups of stakeholders (Students, faculty
and allied-staff) with involvement and level
of widely varying needs.
7 Consequences: Have significant Yes
consequences in a range of contexts. For
example, cybercrimes, online frauds,
hacking etc.
8 Interdependence: The system consists of Yes
sub-systems and components. Students
must address the design of each component
separately and in combination with the
other components.

Вам также может понравиться