SIT735: Application and Communication Protocol Security
Assessment Task 2: Confidential Message
This document supplies detailed information on the second assessment task for this unit.
Key information
0
Weighting: 20%
3
Learning Outcomes
This assessment assesses the following Unit Learning Outcomes (ULO) and related Graduate
Learning Outcomes (GLO):
Unit Learning Outcome (ULO)
ULO3-Apply principles of public key
cryptography to achieve secure
communication networks by using digital
certificates and digital signatures in
compliance with industry standards.
ULO4-Justify the use of cryptographic
schemes on networked infrastructures to
prevent the misuse of technology.
Graduate Learning Outcome (GLO)
GLO1: Discipline knowledge and capabilities
GLO4: Critical thinking
GLOS: Problem solving
GLO1: Discipline knowledge and capabilities
GLO4: Critical thinking
GLOS: Problem solving
Purpose
This assessment allows you to demonstrate your ability to send confidential messages.
Instructions
This is an individual assessment task. Create a public and private key pair to encrypt and decrypt a
message. Students should submit the following files:
The message: This should be a text file, which contains your "encrypted" message. The
message should contain your student ID and name (message.txt). You should use the openssl
commands.
The document: This should be a .pdf file of no more than four pages, split in three sections
with cosponsoring openssl command's (and provide screenshots of each step):
o Section 1: List the openssl commands you used to encrypt the message.
o Section 2: "List" the openssl commands (including options and parameters) that you
used to decrypt the message. Note that, those commands will be executed within
the folder where the encrypted message is located.
o Section 3: "Describe" the communication protocol you have used to communicate in
graphical notation, such as Alice and Bob notation. Use the description of the
protocol to explain how authenticity of the sender and integrity of the message are
achieved. If further openssl command to verify authenticity and/or integrity are
needed, please, add them too.
• Keys: Cryptographic keys necessary for encryption or decryption (that is generated public
and private keys).
Do not zip your files./nAssessment Information
Important technical information:
Encryption and decryption will be done with the command line tool using openssl.
Each instruction should be in the form of an openssl instruction to be executed within the
folder where the submitted files are downloaded.
The current stable version of openssl is 3.
See the rubric below for more details on what we expect from you.
Submission details
The files must be submitted via CloudDeakin no later than Sunday 20 August 2023, 11.55pm (AEST).
Extension requests
Requests for extensions should be made to Unit/Campus Chairs well in advance of the assessment
due date. Please follow the link for detailed information and a form:
http://www.deakin.edu.au/students/faculties/sebe
Special consideration
You may be eligible for special consideration if circumstances beyond your control prevent you from
undertaking or completing an assessment task at the scheduled time.
See the following link for advice on the application process:
http://www.deakin.edu.au/students/studying/assessment-and-results/special-
consideration
Assessment feedback
You will receive feedback in the form of a marking rubric no later than two weeks after the deadline.
Academic integrity, plagiarism and collusion
Plagiarism and collusion constitute extremely serious breaches of academic integrity. They are forms
of cheating, and severe penalties are associated with them, including cancellation of marks for a
specific assignment, for a specific unit or even exclusion from the course. If you are ever in doubt
about how to properly use and cite a source of information refer to the referencing site above.
Plagiarism occurs when a student passes off as the student's own work, or copies without
acknowledgement as to its authorship, the work of any other person or resubmits their own work
from a previous assessment task.
Collusion occurs when a student obtains the agreement of another person for a fraudulent purpose,
with the intent of obtaining an advantage in submitting an assignment or other work.
Work submitted may be reproduced and/or communicated by the university for the purpose of
assuring academic integrity of submissions: https://www.deakin.edu.au/students/study-
support/referencing/academic-integrity
Fig: 1
Fig: 2