Create your own Cryptography using a Substitution Cipher.

Assignment #2 – Cryptography

Cryptography makes up a large part of our technological lives, and in some cases, we never realize that cryptography is working. Do you have a PIN number on your iPhone? The drive is encrypted! Do you use Bitlocker or Cryptdata on your Operating System? Your drive is encrypted! Do you visit most websites? Well most use HTTP Secure via SSL/TLS! Do you use an email service like ProtonMail? Your emails are encrypted… and in all of these cases, you never really interact with the cryptography. Instead, it just happens in the background.

What will we do? Below are a few cryptographic tasks to make sure you’re familiar with various methods of cryptography – from simple ciphers to RSA!

1) Caesar’s Cipher

2) Create your own Cryptography using a Substitution Cipher. Include your SHORT plaintext, the substitution key, along with the cipher text! Please provide Excel or source code if you decide to implement this in a programming language or Excel.

3) Encrypt this number (base 10) using the Public key. (All numbers in base 10 to make it easier).

M = 108

n = 7387 e = 4

4) You received this cipher text message (Base 10) which is supposed to have been encrypted using your public key. Decrypt the message using the following Private key. (All numbers in base 10 to make it easier).

C = 6342

n = 7387 d = 4811

5) Use the following online tool to decrypt an AES 128 ciphertext (base64) using the ECB encryption cipher with a 128 bit key, also given below (Base64 ciphertext). https://www.devglan.com/online- tools/aes-encryption-decryption

KEY: CSITCYBR555HOOD!

(Base64 Cipher Text using ECB cipher scheme):

WV8j7RV0XX+8nawUcVrJ3O2H2kCVz7CHSvcD0Dh3y6vOWzwKegu5WpkFCPhdxFH00Qvut2m5 h5qxpStKOrK/ BZlhUncwUGBg5yhm1+d9tKpAiuv1oli0imtErd0pbCYn0pWMqrVobauHE+jCOt9diqtriR6bCsj29pTq IRTrJqp3REJJ2XrpjWILe4R/URiIGMFIvXdkcZuqeBg5Q6ZWV9QKNPeejlaufXFNb/k1qa1b/+IJ/ u9myavisRCZcpfc/ VtTByUO0sOvy8Yj4hZmlbi9hJvio4YHMwScvgeml1N7m3FKmutaZNsi4b6b2+1DhbfWD+Vs8tLPs UTc6I3XclEAOMMHOFbrJVkQKdcIivUaYAm2qdv+AdJJS4jWz9xdFF5Tikv2NyclXIFlfphyuk502m InMiN2QXBMdbnGdoCWq4+OyfGan7RiLJiYMWLqRT9OXQ5+VvG4YPAQZFbNO+WtK6aWml2 nr3wwY3tFgNNyonHNRu5Eyz2sllItyhX+RHl6RcgKMUoLA6Tl8nUGB0EDY7TdeKOobqBS4yO+2 HTS90EdbjRcCfrWM7oWgG9WRqch5oInBRXTEXiOQjWrVbEvvNyAw8tYVx6uBsU/ qvxJ+dLCi8d2VuHhPTi2MJZy8AQG0fo6HN4q/9ubyXJOuzsXplQzJOlLdtGRvI/ BrNcqw76KUwznvvJxkmuvNIXu114gWe8cc9USFlJw6tRH8dJ82gaWTTBjISaVjk2/umQ=

Provide the PLAINTEXT output (not Base64).

Why are we doing this? Understanding the basics of Cryptography can help in ensuring that you and your companies stay safe from potential attacks! Using encryption on especially sensitive information is extremely important, and understanding the basics of some of the existing cryptographic methods can help you make more informed decisions on products for yourself and your company. Would you rather have an AES 256 encryption? Or maybe you really need RSA 2048? Do you need a symmetric key algorithm… or an asymmetric? What level of encryption… Does the level of encryption matter.

Learning Objectives This assignment makes use of multiple course objectives

• Implement elementary encryptionhttps://www.devglan.com/online-tools/aes-encryption-decryptionhttps://www.devglan.com/online-tools/aes-encryption-decryption

What court wrote this Opinion and what was the legal issue on appeal?

Writing Assignment

There are three written assignments in this course. Please consult the syllabus and the D2L calendar for deadlines and assignment weight. You will be permitted to drop one writing assignment. Before beginning the first assignment, please read the following for guidance:

1. CONTENT

a. Your paper will be graded for proper grammar. Do not start your paper with “I am going to discuss”. Every student in this class has access to Grammarly. Make sure you use it. Proofread your paper and have a friend or family member proofread your paper.

Review your paper for:

organization (clarity, logic), grammar, spelling, avoid run on sentences and fragments, avoid usage of passive voice, and be sure to capitalize proper nouns.

b. Each writing assignment must be typed, double spaced, and use size 12 font with 1” margins and at least 800 words for the content alone. All paragraphs should be in a justified format. This word requirement does not include your citation to the source(s).

c. You may use a block format or, you may indent. If you choose to ident, the first line of each paragraph must be indented by 0.5”. The paper must be submitted through the D2L dropbox feature.

d. All work needs to be your own. Answer in your own words. Do not copy and paste from the case and do not use quotes. I do not expect you to be lawyers but do expect you to really dig in to facilitate valuable growth in critical thinking and communication skills. This may be challenging at first but stick with it! It can be very rewarding to see your case analysis skills and legal terminology improve over the semester!

e. Originality Check and Word Count is enabled for each assignment. No quotes allowed. The entire writing assignment must be in your own words. The plagiarism software will be turned on so NO QUOTES, NO COPYING AT ALL. You can check your own originality count. If you do not know how to do that, contact the MTSU Help Desk online (24/7) or at 1-615/898-5345.

2. CASE BRIEFING AND ANALYSIS

I understand that you are not attorneys. However, I do want you to be able to learn how to structure an analysis of a case. Each writing assignment will include a case “briefing” to structure your analysis. You will then be called upon to apply that case to a fact pattern. Your case briefing should use the following format:

Case Name
LEGALCOGNIZANCE1. What are the facts?Your boss heard about this case but does not know the details. Describe the case to him or her. Address the following:· What are the key facts?· Who filed the initial lawsuit and for what reason(s)?· Did the defendant file a counterclaim against the plaintiff, and if so, for what reason(s)?
2. What type of lawsuit did the plaintiff file and how did the lower court(s) rule?The cases included in the textbook are from an appellate court; i.e., there was at least one prior ruling from another, lower court that is being appealed. Describe the legal actions that happened up to the point of this appeal (Case Posture) (see the paragraph(s) at the end of the FACTS):· Who filed the initial lawsuit?· What was the initial legal claim(s)* filed by the plaintiff (e.g. fraud)?· What remedy was the plaintiff seeking (e.g. recission of the contract)?· If the defendant filed a counterclaim against the plaintiff, what type of legal claim did the defendant make?· How did the initial court (or magistrate or arbitrator) rule? If more than one court, how did each court rule?
3. What court wrote this Opinion and what was the legal issue on appeal?Describe which party appealed and to which court, as well as the legal question this Court was addressing (read and synthesize from the paragraphs at the end of the FACTS, the OPINION and the INTERPRETATION):· Who filed the appeal?· What is the name of the court in which the appeal was filed (i.e. which court rendered the Opinion in this case – see the light blue banner) (the “Court”)?· What was the issue on appeal (i.e. the legal question(s) the court addressed in its opinion (e.g. whether silence about a material fact can amount to fraud)?
4. What legal rule(s) did this Court reference to make its decision?Search for ALL of the legal rules referenced by the Court, such as the elements of the legal claim or the statute (see the Opinion section of this case). You may quote directly from the case here – just be sure to include parentheses around your quotes.
EXPANDPERSPECTIVE5. What were the Plaintiff’s Legal Arguments?
• What legal arguments did the plaintiff make as to why the plaintiff should prevail on appeal? (You may have to infer from the Opinion)
6. What were the Defendant’s Legal Arguments?• What legal arguments did the defendant make as to why the defendant should prevail on appeal? (You may have to infer from the Opinion)
7. What was this Court’s Decision and Reasoning?Describe the final decision of this Court and WHY if ruled this way:· What was the final decision of this Court?· Summarize how the Court applied the facts to EACH element of the applicable rule(s) to make its decision.
BE CURIOUSAND SEARCHFORKNOWLEDGE8. Search for Answers: What are you curious about and what did you find from your search?Pose your OWN question and search for an answer in the case through Westlaw Campus research. For example, suppose you are puzzled by the court’s decision and you want to read additional facts and explanations that are not in the abstracted version. Perhaps you are curious if this issue was decided differently by a court in another state.To look up this case in Westlaw Campus Research database (in the Library tab) enter one of the case citations in the light blue banner (e.g. 193 Cal.Rptr. 130 is one of the citations for the Reed v. King case on page 233).In your answer, address:· What question did you ask?· Describe what you discovered (cite the other case if you looked up another case, or reference the page number if you found information in this case?
THINKCRITICALLY9. What evidence was key to the outcome?• What facts were key to the outcome in this case?
10. Change up: What if the facts were different?• Pose the question: What if the facts were different? Create changes to the facts that would probably have resulted in a different outcome of the case and explain why this would have made a difference.
11. What is the impact?• Consider the ethical, legal, business, and societal impact of this decision. Do you agree or disagree with the outcome? Why or why not?
THINKSTRATEGICALLY12. What are your insights and recommendations?· How can you apply the insight you have gained to your future career or business transactions?· What do you recommend to businesses as a proactive legal/business strategy in light of the outcome in this case?
How are the four megatrends shaping the local and global interrelations among nations?
  1. As described in “The New Population Bomb: The Four Megatrends”, How are the four megatrends shaping the local and global interrelations among nations? What are the major implications?
  2. Howe and Jackson argue that demographic storms, from the premature aging of China’s population to the implosion of Russia’s, will increase the risk of social and political upheaval. Do you accept their analysis? Why? (make sure you justify your position with examples from the readings).
Describes the results of your assessment of the labor market from which your selected organization draws candidates for open positions.

Labor Market

Write a 1000-1200 word paper that:

· Describes the results of your assessment of the labor market from which your selected organization draws candidates for open positions.

· Explains the population, demographics of the population, levels of education, and how much training may be required to prepare new workers drawn from this pool for positions in the firm.

· Use regional economic corporations, US Department of Labor and other sources to provide data.

In addition to the requirements above, your paper:

· Must be double-spaced and 12 point font

· Must be formatted according to APA style

· Must include an introductory paragraph with a thesis statement

· Must conclude with a restatement of the thesis and a conclusion paragraph

· Must reference a minimum of two recent scholarly resources

Describe the controversial topic and cultural identifier. Explain the connection between the controversial topic, the cultural identifier, and the role of social justice.

The field of education is vast and complex with many stakeholders involved, sometimes controversies arise. These controversial issues usually begin with a single or a series of historical events. There also are usually arguments on both sides of the issue, both supporting and opposing. Since these issues may cause strife and division, federal and state policymakers, state and local administration, teachers, students, parents, and community members attempt to offer solutions to these controversial issues. 

Relating to these controversial issues are cultural identifiers which can be defined as characteristics or conditions that make each individual unique. Usually, one or more cultural identifiers are at the root of controversial issues. Understanding both the controversial issue and the related cultural identifier can help stakeholders find the best, most equitable, and most ethical solution for everyone involved.

Throughout this course, you will be working on a 1,000-1,250 word assignment on a controversial topic involving a cultural identifier and the implications of the controversial topic on K-12 education. Your first draft of the assignment will be due in Topic 4, and you will be required to submit it to the peer review forum on day 1 in Topic 5, and your final version will be submitted in Topic 7. 

Part 1

Select a controversial topic related to diverse cultures and communities currently affecting K-12 education. Potential topics could include body image, citizenship status, plastic/cosmetic surgery for teenagers, bathrooms for transgender students, ethnic curriculum/classes, religious clothing, prayer in schools, or other topics that involve a supporting and opposing side and at least one cultural identifier. Utilizing sources found in the GCU Library and the EDU-330 assignment Guide, complete a 500-750 word brainstorming assignment on your topic and address the following prompts:

  • Describe the controversial topic and cultural identifier. Explain the connection between the controversial topic, the cultural identifier, and the role of social justice.
  • Summarize the key historical events that have significantly affected your specific controversial topic.
  • Summarize the topic in the context of K-12 education, including the related cultural identifier and any associated controversies.
  • Identify current scholarly statements for the controversial topic, including at least one supporting and one opposing.
  • Describe how this controversial issue could affect future teaching practices and how it could affect future students.
  • Summarize related policies or methods that have been implemented at the local level including both districts and schools as a solution to the controversial issue.­­­

Part 2

Begin conducting to support your opinion on the controversial issue. Collect a minimum of three scholarly resources from the last five years to support your rough draft due in Topic 4. Submit a 50-150 word summary for each of the three articles, including how the articles apply to your chosen topic.­­

Prepare this assignment according to the guidelines found in the APA Style Guide, located in the Student Success Center.

What are strategies you could use to support memory development for your students?

How would you define memory?
What does it involve?
What are strategies you could use to support memory development for your students?
Would your strategies vary based on age? school subject? Explain.
Conclude with what you feel the relevance of memory is.

What is the main difference between notes payable and bonds payable?
  1. Why do corporations purchase and issue treasury stock?
  2. What is the journal entry for recording the purchase of treasury stock? 
  3. How would you record the reissuance of treasury stock if the proceeds obtained are:  at cost of the treasury stock?  Less than the cost of the treasury stock?  More than the cost of the treasury stock?
  4. What is the main difference between notes payable and bonds payable?
  5. What is the main difference between a bond and a share of stock?
  6. What does it mean to issue bonds at: Par? At a Discount?  At a Premium?
  7. What is the difference between the contract (coupon) rate and the market rate for bonds?
  8. What is the journal entry for recording the issue of a discount bond? What is the entry for recording interest and amortization? 
  9. What is the journal entry for recording the issue of a premium bond? What is the entry for recording interest and amortization? 
  10. What is the journal entry for recording the bond maturity?
Explain how you would go about identifying needs in your school and society, and its relationship to curriculum needs assessment.

Directions: After reading Chapter 7 from Developing the Curriculum by Oliva & Gordon, please answer the following question:

  1. Explain how you would go about identifying needs in your school and society, and its relationship to curriculum needs assessment. Make sure you provide concrete examples and sources.

Directions: After reading Chapters 7 and 8 from Wiggins and McTighe:

  1. Use the GRASPS worksheet below to help you develop a more complete authentic task for your Stage 2.  Fill in the blanks for an authentic task that you can develop from the facets activity above. You do not have to fill in every blank, but use the stems to help you elaborate on the assessment. What is the goal of the assessment? What roles will the students play during the performance? Who is the audience for the results? What is the specific situation? What is the end product? Performance? What standards and criteria will be used to judge the success of the authentic performance?

G.R.A.S.P.S. (Grasps) Worksheet

Actions

  1. Go back to your lesson 1. Develop Stage 2 for your lesson unit. Make sure you include Stage 1 and Stage 2 together. Your GRASPS assignment (above) should help you develop the performance artifacts for your students. Do not forget to include the rubrics you will use to assess student’s performance tasks and your GRASPS (designed above).
  • Do not forget to include the rubrics you will use to assess students’ performance tasks
  • check comments about questions
describe how your project will integrate the insights from each of these disciplines to produce new knowledge.

Disciplinary Description Assignment

In your mid-term assignment, you will be crafting a defense of an interdisciplinary approach regarding a research question that interests you. Imagine that you are working on a specific research question in your field (perhaps you already have a suitable project in mind based upon your coursework). In a well-written essay of at least 10 pages, you will describe the disciplines you will employ to address this question and you will explain how you’ll integrate these disciplines in your project.

In order to complete this assignment, you will find primary texts in your areas of study (you need to draw from at least two areas)–texts like Introduction to Philosophy, The Basics of Engineering, etc.–and you will utilize Repko’s methodology of describing a disciplinary perspective to clearly specify your understanding of the fields. In addition to using those primary texts and the Repko text, you will need to refer to deeper texts in your field to demonstrate your rich understanding of how these fields work. 

After describing the disciplines you utilize in terms of the disciplinary perspectives method (phenomena, method, concepts, etc.), you will go on to describe how your project will integrate the insights from each of these disciplines to produce new knowledge. This will take some imagination, as you can’t possibly know where a research question will take you. 

To give you a better idea of what I’m looking for, I’ve provided two samples below. The first sample is a very rough version of this assignment that I created in the process of developing  this final project  (Links to an external site.) ,

Submit using good Chicago Manual of Style format. Next week, I’ll be providing further information on this project as well as a rubric, but this should be enough information to get you started. 

What are the exploit vectors and vulnerabilities threat actors are predicted to take advantage of?

Advanced persistent threats (APTs) have been thrust into the spotlight due to their advanced tactics, techniques, procedures, and tools. These APTs are resourced unlike other types of cyber threat actors.

Your chief technology officer (CTO) has formed teams to each develop a detailed analysis and presentation of a specific APT, which she will assign to the team.

This is a team assignment, and the team members that were selected by the instructor in the previous assignment will work together. It is up to the team members to decide who is responsible for contributing to the sections of the paper. Remember, if a member fails to complete his or her part of the work, the team is still responsible for all sections.

Note that you are required to complete a peer review for yourself and for each member of the team. The peer review template is provided in the Activities folder.  

Your team’s report should use the  The Cybersecurity Threat Landscape Team Assignment Resources to cover the following five areas:

Part 1: Threat Landscape Analysis

·

· Provide a detailed analysis of the threat landscape.

· What has changed over the past year?

· Describe common tactics, techniques, and procedures to include threat actor types.

· What are the exploit vectors and vulnerabilities threat actors are predicted to take advantage of?

Part 2: APT Analysis

·

· Provide a detailed analysis and description of the APT your group was assigned. Describe the specific tactics used to gain access to the target(s).

· Describe the tools used. Describe what the objective of the APT was/is. Was it successful?

Part 3: Cybersecurity Tools, Tactics, and Procedures

·

· Describe current hardware- and software-based cybersecurity tools, tactics, and procedures.

· Consider the hardware and software solutions deployed today in the context of defense-in-depth.

· Elaborate on why these devices are not successful against the APTs.

Part 4: Machine Learning and Data Analytics

·

· Describe the concepts of machine learning and data analytics and how applying them to cybersecurity will evolve the field.

· Are there companies providing innovative defensive cybersecurity measures based on these technologies? If so, what are they? Would you recommend any of these to the CTO?

Part 5: Using Machine Learning and Data Analytics to Prevent APT

·

· Describe how machine learning and data analytics could have detected and/or prevented the APT you analyzed had the victim organization deployed these technologies at the time of the event. Be specific.

Notes

· Use additional sources of information but also describe the concept in layman’s terms.

· Use visuals where appropriate.

· While quality is valued over quantity, it is expected that a quality paper will result in a minimum length of 10–15 pages.

· You will be assigned an individual grade for this assignment based on your contribution to the overall project. 

× How can I help you?