INFORMATION SYSTEMS SECURITY AND CRYPTOGRAPHY

You are expected to write a well-researched paper highlighting the key issues you have been tasked to find out. Include references in your research. Plagiarism will be heavily penalized.

 

Analyze hashing and message digests

Analyze Cryptographic Weaknesses:Encryption based attacks (birthday, dictionary, replay, side channel, factoring attacks), Cryptanalysis methodologies, Frequency analysis, Reverse Engineering, Temporary Files’ vulnerabilities.

Scroll to Top