حل واجب t325 2015/2016
حل واجبات الجامعة العربية المفتوحة
حل واجبات الجامعه العربية المفتوحه مع الشرح
لجميع فروع الجامعة ولجميع التخصصات ولجميع المواد
حلول نموذجية مضمونة وغير مكررة - قسم خاص للتربية
KSA-Kuwait - Bahrain -Oman - Jordon -Lebanon -Egypt-Sudan
الكويت البحرين عمان الأردن لبنان مصر البحرين حائل الرياض الدمام جدة المدينة المنورة الاحساء
(.turnitin./ ) فحص التشابه وفقا لنظام الجامعة عن طريق موقع كشف التشابه
اتصل : O544321455 - OO966544321455
واتس اب: 966544321455+
ايميل : a_al_shora@hot mail.com
سكايبي : a_al_shora
حل واجب 0.5.4.4.3.2.1.4.5.5 الجامعة العربية المفتوحة
حل واجبات الجامعة العربية المفتوحة O54.4.3.2.1.4.5.5 - OO96654.4.3.2.1.4.5.5
ايميل : a_al_shora @ h.o.t.m.ail.c.o.m
سكايبي: a_al_shora
واتس اب: OO96654.4.3.2.1.4.5.5
Question 1
This question carries 30% of the marks for this assignment
You have seen in T325 - Block 1 that “The optical components of a digital camera are similar to those of a traditional film camera. The difference is that, instead of projecting an image onto a film, the image is formed on a microelectronic sensor. Most cameras use a sensor of one of two types: CCD (charge coupled device) and CMOS (complementary metal oxide semiconductor)” [1]
Using the AOU e-library and/or any internet reliable resource (you are encouraged to use Google Scholar for scientific research), select a
scientific publication1 that provides a comparison of the two sensor types. After reading the paper2, you are asked to answer the following questions.
2. List the following information about the paper
(3 marks)
a. Paper Title
b. Paper Author(s)
c. Type of publication (conference, journal, master thesis, PhD thesis, technical report, etc.)
d. Details of the publication type (conference name, journal name, etc.)
e. Publication date
2. Write a brief report (500-700 words),
using your own words, that summarizes the advantages and limitations of each type of sensor when compared to the other type. You should at least explain three advantages and three limitations of each sensor type
(9 marks)
Mark deduction: The following mark deduction will be applied:
-
Up to twelve marks for
not using your own words
-
Two marks for
exceeding the word count limit (700 words)
1International conference article, an international journal article, MSc.PhD thesis, Technical report, etc.
2 You are advised to read this paper using the approach that was explained during the course (reference: how to read a paper).
Question 2
This question carries 70% of the marks for this assignment
The overall learning objective of this practical question is to get familiar with the concepts of symmetric key encryption and hashing. This will be your first-hand experience with using the OpenSSL command- line tool to encrypt/decrypt messages/files under different encryption modes, and to construct message digests with hash functions.
OpenSSL is an open source cryptographic library, providing cryptographic APIs at different layers. It is open source with GPL license. All the necessary information about OpenSSL can be found at [1].We will be using the OpenSSL command line tool. This tool comes built-in in most Linux distributions. If you are an MS Windows user, you can download the command line tool from [2] or [4]. A good tutorial for using the basic OpenSSL command lines can be found in [3]
Openssl provides a command mode where you can interact with the API; this mode can be used (after installing openssl) by simply typing
openssl at the command line. In order to check how to use the various commands, simply type
openssl <command_name> -help on the command line (or simply type
<command_name> -help if you have accessed the OpenSSL command prompt (
openssl>)). Unix/Linux users can also get further information by using the
man command (e.g.
man enc). The OpenSSL [1] website is also very helpful to get additional information about the different available commands.
Part 1: Symmetric encryption
1. The command that allows you to use symmetric encryption is
enc command (by typing
enc -help, you get all the associated options). In this part, you will play with various encryption algorithms and modes. You will proceed as follows:
A. Create a file named
file_<student_name>_<student_id> where <student_name> should be replaced by your name and <student_id> with your student ID. Fill this file with your name, your student ID and any additional information of your choice
(1 mark)
B. Encrypt the file using the
enc command line tool; you can select the algorithm of your choice.
You will be prompted to enter the password (and confirm it). Explain the different steps
(3 marks)
2. Decrypt the ciphertext produced in question 1(using the same password of course).
(3 marks)
3. Decrypt a ciphertext using a wrong password. What do you observe? Explain it (you can refer to internet resources to explain the output you had)
(4 marks)
Part 2: Hash functions
1. Create a text message like “Hi, this is <student_name>. My ID is <student_id>. This is a trial message to test digest functions!”, save it in a file named msg_<student_name>_<student_id>, and calculate its digest using the following hash algorithms: MD5, SHA1, SHA-256. Choose the output in binary format.
(4 marks)
2. Now try to modify the message (e.g. delete the “!” at the end of the message) and recalculate the digest.
(3 marks) What do you note when you compare the (above) two digests for a given hash function (you can use any hexadecimal editor for this purpose)? Explain it.
(2 marks)
3. If you apply the hash function a second time to the result (digest), what is the size of the second result? Explain it.
(4 marks)
4. If you give MD5 input a file/text with a size of 14 bytes (you can use Openssl rand command to create a random file of given size or any other file editor), what is the result obtained after hashing this file?
(4 marks)
Checklist
Make sure that your answer to the question satisfies all the following requirements:
- provide - for each question -
ALL the screenshots showing the commands you have used and the outputs of these commands
- Attach the files generated in Part 1 and Part 2 to the TMA file
- Answer the questions raised in each part.
Question 1
This question carries 30% of the marks for this assignment
You have seen in T325 - Block 1 that “The optical components of a digital camera are similar to those of a traditional film camera. The difference is that, instead of projecting an image onto a film, the image is formed on a microelectronic sensor. Most cameras use a sensor of one of two types: CCD (charge coupled device) and CMOS (complementary metal oxide semiconductor)” [1]
Using the AOU e-library and/or any internet reliable resource (you are encouraged to use Google Scholar for scientific research), select a
scientific publication1 that provides a comparison of the two sensor types. After reading the paper2, you are asked to answer the following questions.
2. List the following information about the paper
(3 marks)
a. Paper Title
b. Paper Author(s)
c. Type of publication (conference, journal, master thesis, PhD thesis, technical report, etc.)
d. Details of the publication type (conference name, journal name, etc.)
e. Publication date
2. Write a brief report (500-700 words),
using your own words, that summarizes the advantages and limitations of each type of sensor when compared to the other type. You should at least explain three advantages and three limitations of each sensor type
(9 marks)
Mark deduction: The following mark deduction will be applied:
-
Up to twelve marks for
not using your own words
-
Two marks for
exceeding the word count limit (700 words)
1International conference article, an international journal article, MSc.PhD thesis, Technical report, etc.
2 You are advised to read this paper using the approach that was explained during the course (reference: how to read a paper).
Question 2
This question carries 70% of the marks for this assignment
The overall learning objective of this practical question is to get familiar with the concepts of symmetric key encryption and hashing. This will be your first-hand experience with using the OpenSSL command- line tool to encrypt/decrypt messages/files under different encryption modes, and to construct message digests with hash functions.
OpenSSL is an open source cryptographic library, providing cryptographic APIs at different layers. It is open source with GPL license. All the necessary information about OpenSSL can be found at [1].We will be using the OpenSSL command line tool. This tool comes built-in in most Linux distributions. If you are an MS Windows user, you can download the command line tool from [2] or [4]. A good tutorial for using the basic OpenSSL command lines can be found in [3]
Openssl provides a command mode where you can interact with the API; this mode can be used (after installing openssl) by simply typing
openssl at the command line. In order to check how to use the various commands, simply type
openssl <command_name> -help on the command line (or simply type
<command_name> -help if you have accessed the OpenSSL command prompt (
openssl>)). Unix/Linux users can also get further information by using the
man command (e.g.
man enc). The OpenSSL [1] website is also very helpful to get additional information about the different available commands.
Part 1: Symmetric encryption
1. The command that allows you to use symmetric encryption is
enc command (by typing
enc -help, you get all the associated options). In this part, you will play with various encryption algorithms and modes. You will proceed as follows:
A. Create a file named
file_<student_name>_<student_id> where <student_name> should be replaced by your name and <student_id> with your student ID. Fill this file with your name, your student ID and any additional information of your choice
(1 mark)
B. Encrypt the file using the
enc command line tool; you can select the algorithm of your choice.
You will be prompted to enter the password (and confirm it). Explain the different steps
(3 marks)
2. Decrypt the ciphertext produced in question 1(using the same password of course).
(3 marks)
3. Decrypt a ciphertext using a wrong password. What do you observe? Explain it (you can refer to internet resources to explain the output you had)
(4 marks)
Part 2: Hash functions
1. Create a text message like “Hi, this is <student_name>. My ID is <student_id>. This is a trial message to test digest functions!”, save it in a file named msg_<student_name>_<student_id>, and calculate its digest using the following hash algorithms: MD5, SHA1, SHA-256. Choose the output in binary format.
(4 marks)
2. Now try to modify the message (e.g. delete the “!” at the end of the message) and recalculate the digest.
(3 marks) What do you note when you compare the (above) two digests for a given hash function (you can use any hexadecimal editor for this purpose)? Explain it.
(2 marks)
3. If you apply the hash function a second time to the result (digest), what is the size of the second result? Explain it.
(4 marks)
4. If you give MD5 input a file/text with a size of 14 bytes (you can use Openssl rand command to create a random file of given size or any other file editor), what is the result obtained after hashing this file?
(4 marks)
Checklist
Make sure that your answer to the question satisfies all the following requirements:
- provide - for each question -
ALL the screenshots showing the commands you have used and the outputs of these commands
- Attach the files generated in Part 1 and Part 2 to the TMA file
- Answer the questions raised in each part.