حل واجبات الجامعة العربية المفتوحة
حل واجبات الجامعه العربية المفتوحه مع الشرح
لجميع فروع الجامعة ولجميع التخصصات ولجميع المواد
حلول نموذجية مضمونة وغير مكررة - قسم خاص للتربية
KSA-Kuwait - Bahrain -Oman - Jordon -Lebanon -Egypt-Sudan
الكويت البحرين عمان الأردن لبنان مصر البحرين حائل الرياض الدمام جدة المدينة المنورة الاحساء
(.turnitin./ ) فحص التشابه وفقا لنظام الجامعة عن طريق موقع كشف التشابه
اتصل : O544321455 - OO966544321455
واتس اب: 966544321455+
ايميل : a_al_shora@hot mail.com
سكايبي : a_al_shora
حل واجب 0.5.4.4.3.2.1.4.5.5 الجامعة العربية المفتوحة
حل واجبات الجامعة العربية المفتوحة O54.4.3.2.1.4.5.5 - OO96654.4.3.2.1.4.5.5
ايميل : a_al_shora @ h.o.t.m.ail.c.o.m
سكايبي: a_al_shora
واتس اب: OO96654.4.3.2.1.4.5.5
T325: Technologies for digital media
__________________________________________________ ____________________________
Tutor-marked Assignment
__________________________________________________ ____________________________
T325: TMA, Spring 2014-2015 Cut-off date: April 30, 2015
__________________________________________________ ____________________________
Total Marks: 100
Contents
Question 1 (30 marks)……………………………………………………
Question 2 (70 marks)……………………………………………………
Plagiarism Warning:
As per AOU rules and regulations, all students are required to submit their own TMA work and avoid plagiarism. The AOU has implemented sophisticated techniques for plagiarism detection. You must provide all references in case you use and quote another person's work in your TMA. You will be penalized for any act of plagiarism as per the AOU's rules and regulations.
Declaration of No Plagiarism by Student (to be signed and submitted by student with TMA work):
I hereby declare that this submitted TMA work is a result of my own efforts and I have not plagiarized any other person's work. I have provided all references of information that I have used and quoted in my TMA work.
Name of Student:………………………………..
Signature:…………………………………………...
Date:……………………………………………………
Question 1
This question carries 30% of the marks for this assignment
Using the AOU e-library and/or any internet reliable resource (you are encouraged to use Google Scholar for scientific research), select a recent scientific publication that presents a digital watermarking algorithm/technique. You should refer to your course tutor to validate your selection. The selected paper after reading the paper , you are asked to answer the following questions.
1. List the following information about the paper (6 marks)
a. Paper title
b. Paper Author(s)
c. Type of publication (conference, journal, master thesis, PhD thesis, technical report, etc.)
d. Information of the publication type (conference name, journal name, etc.)
e. Publication date
2. In Block 2 - Part 4, you have seen that there are a number of requirements for a digital watermarking algorithm (you can refer to Block 2 - page 117 or to the corresponding PowerPoint slides). Based on your thorough reading of the selected paper, you are asked to explain – using your own words- how the authors of the paper addressed these requirements (you should at least consider four requirements). The outcome of this question should be as follows:
a. List the four selected requirements (4 marks)
b. Explain how the selected paper addressed each of these requirements (20 marks)
Mark deduction: The following mark deduction will be applied:
- Up to twelve marks for not using your own words
- Two mark for exceeding the word count limit (700 words)
Question 2
This question carries 70% of the marks for this assignment
The purpose of this question is to provide you with a hands-on practice on some of the cryptographic primitives that you have seen in Block 2- part 2. In particular the symmetric, asymmetric and hybrid encryption algorithms. In order to do so, you will be using a teaching cryptographic tool named Cryptool.
CrypTool – as introduced by its developers - is a “comprehensive free educational program about cryptography and cryptanalysis offering extensive online help and many visualizations”. In order to complete this question, you need to install CrypTool-1 on your personal computer/notebook. You can download it from the Cryptool-1 download page [2]. The software will also be made available on the Moodle course website. Alternatively, you may use computers located in the computer lab which have CrypTool-1 already installed on them (refer to your course coordinator regarding the Moodle course website and the computer lab information).
A hybrid cryptosystem is a combination of symmetric and asymmetric system designed to solve the limitations of each type of cryptosystem while combining their advantages. In this exercise, you will be using a hybrid cryptosystem consisting of the combination of AES (symmetric) and RSA (asymmetric) cryptosystems.
1- Prepare plaintext file (2 marks)
a. Create a text file (.txt) that will serve as a file to encrypt using the hybrid cryptosystem. This file should include your first/last name and your student ID in the first line and any other text of your choice. Save this file as “plaintext-xxxx.txt” (xxxx should be replaced with your student ID, for instance if the student ID is 090011, the file name will be plaintext-090011.txt).
2- Run Cryptool
3- Generate RSA key pair: (10 marks)
a. From the menu bar, click on the menu item: Digital Signatures/PKI -> PKI -> Generate/Import Keys, and follow the steps to generate RSA Key pairs (2048 bits). Use your last and first name as identifiers and use 1234 as a PIN code. (You should explain the role of this PIN code in your answer)
4- Export key pairs (8 marks)
a. After generating the keys, click on “Show Key Pairs” Button and from the next window, Select the key you have generated in step 3 and click on export “PSE (PKCS#12)”. Again use 1234 as the PIN code. (You should explain why there are two PIN codes in your answer).
b. Save the file as “privatekeys-xxxx.p12” (xxxx should be replaced with your student ID, for instance if the student ID is 090011, the file name will be privatekeys -090011.p12).
5- Hybrid cryptosystem: encryption process (35 marks)
a. Open the plaintext file you have created in step 1. Then, click on the following menu Item: Encrypt/Decrypt -> Hybrid -> RSA-AES encryption. This will show you the process of the hybrid encryption (Figure 1).
b. Using your own words, explain how a hybrid key cryptosystem works. (8 marks)
c. Encrypt the plaintext file using the hybrid RSA-AES cryptosystem. During this process, you will use the public key that you have generated in 3. Explain each step of the process. Screenshots should highlight the progress of the encryption process and the output of each step (session key, Asymmetric keys, encrypted document, encrypted session key, and final output). You should explain each of the outputs. (25 marks)
d. Save the encrypted file as “ciphertext-xxxx.txt” (xxxx should be replaced with your student ID, for instance if the student ID is 090011, the file name will be ciphertext -090011.txt).(2 marks)
6- Hybrid cryptosystem: Decryption process (15 marks)
a. Open the ciphertext file you have created in step 5.d. Then, click on the following menu Item: Encrypt/Decrypt -> Hybrid -> RSA-AES decryption, and follow process of the hybrid encryption (Figure 1). Explain each step of the process (screenshot for each step with explanation).
Figure 1. Hybrid Cryptosystem - Encryption process
حل واجبات الجامعة العربية المفتوحة
حل واجبات الجامعه العربية المفتوحه مع الشرح
لجميع فروع الجامعة ولجميع التخصصات ولجميع المواد
حلول نموذجية مضمونة وغير مكررة - قسم خاص للتربية
KSA-Kuwait - Bahrain -Oman - Jordon -Lebanon -Egypt-Sudan
الكويت البحرين عمان الأردن لبنان مصر البحرين حائل الرياض الدمام جدة المدينة المنورة الاحساء
(.turnitin./ ) فحص التشابه وفقا لنظام الجامعة عن طريق موقع كشف التشابه
اتصل : O544321455 - OO966544321455
واتس اب: 966544321455+
ايميل : a_al_shora@hot mail.com
سكايبي : a_al_shora
حل واجب 0.5.4.4.3.2.1.4.5.5 الجامعة العربية المفتوحة
حل واجبات الجامعة العربية المفتوحة O54.4.3.2.1.4.5.5 - OO96654.4.3.2.1.4.5.5
ايميل : a_al_shora @ h.o.t.m.ail.c.o.m
سكايبي: a_al_shora
واتس اب: OO96654.4.3.2.1.4.5.5
حل واجبات الجامعه العربية المفتوحه مع الشرح
لجميع فروع الجامعة ولجميع التخصصات ولجميع المواد
حلول نموذجية مضمونة وغير مكررة - قسم خاص للتربية
KSA-Kuwait - Bahrain -Oman - Jordon -Lebanon -Egypt-Sudan
الكويت البحرين عمان الأردن لبنان مصر البحرين حائل الرياض الدمام جدة المدينة المنورة الاحساء
(.turnitin./ ) فحص التشابه وفقا لنظام الجامعة عن طريق موقع كشف التشابه
اتصل : O544321455 - OO966544321455
واتس اب: 966544321455+
ايميل : a_al_shora@hot mail.com
سكايبي : a_al_shora
حل واجب 0.5.4.4.3.2.1.4.5.5 الجامعة العربية المفتوحة
حل واجبات الجامعة العربية المفتوحة O54.4.3.2.1.4.5.5 - OO96654.4.3.2.1.4.5.5
ايميل : a_al_shora @ h.o.t.m.ail.c.o.m
سكايبي: a_al_shora
واتس اب: OO96654.4.3.2.1.4.5.5
T325: Technologies for digital media
__________________________________________________ ____________________________
Tutor-marked Assignment
__________________________________________________ ____________________________
T325: TMA, Spring 2014-2015 Cut-off date: April 30, 2015
__________________________________________________ ____________________________
Total Marks: 100
Contents
Question 1 (30 marks)……………………………………………………
Question 2 (70 marks)……………………………………………………
Plagiarism Warning:
As per AOU rules and regulations, all students are required to submit their own TMA work and avoid plagiarism. The AOU has implemented sophisticated techniques for plagiarism detection. You must provide all references in case you use and quote another person's work in your TMA. You will be penalized for any act of plagiarism as per the AOU's rules and regulations.
Declaration of No Plagiarism by Student (to be signed and submitted by student with TMA work):
I hereby declare that this submitted TMA work is a result of my own efforts and I have not plagiarized any other person's work. I have provided all references of information that I have used and quoted in my TMA work.
Name of Student:………………………………..
Signature:…………………………………………...
Date:……………………………………………………
Question 1
This question carries 30% of the marks for this assignment
Using the AOU e-library and/or any internet reliable resource (you are encouraged to use Google Scholar for scientific research), select a recent scientific publication that presents a digital watermarking algorithm/technique. You should refer to your course tutor to validate your selection. The selected paper after reading the paper , you are asked to answer the following questions.
1. List the following information about the paper (6 marks)
a. Paper title
b. Paper Author(s)
c. Type of publication (conference, journal, master thesis, PhD thesis, technical report, etc.)
d. Information of the publication type (conference name, journal name, etc.)
e. Publication date
2. In Block 2 - Part 4, you have seen that there are a number of requirements for a digital watermarking algorithm (you can refer to Block 2 - page 117 or to the corresponding PowerPoint slides). Based on your thorough reading of the selected paper, you are asked to explain – using your own words- how the authors of the paper addressed these requirements (you should at least consider four requirements). The outcome of this question should be as follows:
a. List the four selected requirements (4 marks)
b. Explain how the selected paper addressed each of these requirements (20 marks)
Mark deduction: The following mark deduction will be applied:
- Up to twelve marks for not using your own words
- Two mark for exceeding the word count limit (700 words)
Question 2
This question carries 70% of the marks for this assignment
The purpose of this question is to provide you with a hands-on practice on some of the cryptographic primitives that you have seen in Block 2- part 2. In particular the symmetric, asymmetric and hybrid encryption algorithms. In order to do so, you will be using a teaching cryptographic tool named Cryptool.
CrypTool – as introduced by its developers - is a “comprehensive free educational program about cryptography and cryptanalysis offering extensive online help and many visualizations”. In order to complete this question, you need to install CrypTool-1 on your personal computer/notebook. You can download it from the Cryptool-1 download page [2]. The software will also be made available on the Moodle course website. Alternatively, you may use computers located in the computer lab which have CrypTool-1 already installed on them (refer to your course coordinator regarding the Moodle course website and the computer lab information).
A hybrid cryptosystem is a combination of symmetric and asymmetric system designed to solve the limitations of each type of cryptosystem while combining their advantages. In this exercise, you will be using a hybrid cryptosystem consisting of the combination of AES (symmetric) and RSA (asymmetric) cryptosystems.
1- Prepare plaintext file (2 marks)
a. Create a text file (.txt) that will serve as a file to encrypt using the hybrid cryptosystem. This file should include your first/last name and your student ID in the first line and any other text of your choice. Save this file as “plaintext-xxxx.txt” (xxxx should be replaced with your student ID, for instance if the student ID is 090011, the file name will be plaintext-090011.txt).
2- Run Cryptool
3- Generate RSA key pair: (10 marks)
a. From the menu bar, click on the menu item: Digital Signatures/PKI -> PKI -> Generate/Import Keys, and follow the steps to generate RSA Key pairs (2048 bits). Use your last and first name as identifiers and use 1234 as a PIN code. (You should explain the role of this PIN code in your answer)
4- Export key pairs (8 marks)
a. After generating the keys, click on “Show Key Pairs” Button and from the next window, Select the key you have generated in step 3 and click on export “PSE (PKCS#12)”. Again use 1234 as the PIN code. (You should explain why there are two PIN codes in your answer).
b. Save the file as “privatekeys-xxxx.p12” (xxxx should be replaced with your student ID, for instance if the student ID is 090011, the file name will be privatekeys -090011.p12).
5- Hybrid cryptosystem: encryption process (35 marks)
a. Open the plaintext file you have created in step 1. Then, click on the following menu Item: Encrypt/Decrypt -> Hybrid -> RSA-AES encryption. This will show you the process of the hybrid encryption (Figure 1).
b. Using your own words, explain how a hybrid key cryptosystem works. (8 marks)
c. Encrypt the plaintext file using the hybrid RSA-AES cryptosystem. During this process, you will use the public key that you have generated in 3. Explain each step of the process. Screenshots should highlight the progress of the encryption process and the output of each step (session key, Asymmetric keys, encrypted document, encrypted session key, and final output). You should explain each of the outputs. (25 marks)
d. Save the encrypted file as “ciphertext-xxxx.txt” (xxxx should be replaced with your student ID, for instance if the student ID is 090011, the file name will be ciphertext -090011.txt).(2 marks)
6- Hybrid cryptosystem: Decryption process (15 marks)
a. Open the ciphertext file you have created in step 5.d. Then, click on the following menu Item: Encrypt/Decrypt -> Hybrid -> RSA-AES decryption, and follow process of the hybrid encryption (Figure 1). Explain each step of the process (screenshot for each step with explanation).
Figure 1. Hybrid Cryptosystem - Encryption process
حل واجبات الجامعة العربية المفتوحة
حل واجبات الجامعه العربية المفتوحه مع الشرح
لجميع فروع الجامعة ولجميع التخصصات ولجميع المواد
حلول نموذجية مضمونة وغير مكررة - قسم خاص للتربية
KSA-Kuwait - Bahrain -Oman - Jordon -Lebanon -Egypt-Sudan
الكويت البحرين عمان الأردن لبنان مصر البحرين حائل الرياض الدمام جدة المدينة المنورة الاحساء
(.turnitin./ ) فحص التشابه وفقا لنظام الجامعة عن طريق موقع كشف التشابه
اتصل : O544321455 - OO966544321455
واتس اب: 966544321455+
ايميل : a_al_shora@hot mail.com
سكايبي : a_al_shora
حل واجب 0.5.4.4.3.2.1.4.5.5 الجامعة العربية المفتوحة
حل واجبات الجامعة العربية المفتوحة O54.4.3.2.1.4.5.5 - OO96654.4.3.2.1.4.5.5
ايميل : a_al_shora @ h.o.t.m.ail.c.o.m
سكايبي: a_al_shora
واتس اب: OO96654.4.3.2.1.4.5.5