technical paper on the selection and use of a core cryptographic technique as technical control to a well-defined architecture, system or scenario of an application in computer science

(Technical Report)
This coursework allows you to deepen your knowledge and understanding of the material
presented during the taught component of the module. Whilst this coursework primarily assesses
LO5 (applications of cryptographic techniques), it requires mastering all learning outcomes of this
module for reaching a top grade.
The overall aim of your coursework is to write a technical paper on the selection and use of a core
cryptographic technique as technical control to a well-defined architecture, system or scenario of
an application area within the computer science or engineering discipline.
The specific cryptographic technique should be chosen as one of the techniques discussed in the
lectures – encryption, hash functions, secret sharing, steganography or cryptographic protocols.
Sample valid application areas are e.g. networking or communications, mobile health,
multimedia, digital signal processing or social networks.
The technique should be reviewed theoretically by presenting appropriate mathematical
foundations and cryptographic concepts, and putting it into context with relevant cryptographic
standards if applicable. A corresponding specific implementation (algorithm or protocol) must be
selected as the suitable control. This choice and its suitability for the specific application must be
justified. It should also be explained practically by describing more in detail at least one aspect of
how it would be designed, implemented, deployed, configured or managed.
The report must contain a title, abstract, key terms, introduction section, main body and a
conclusion. In addition to this, full references are required as are captions for all illustrations and
tables. You should include your affiliations with the report, i.e. your name, School and University,
MSc course and K-number. The IEEE conference Microsoft Word template can be found online
and is also available on Canvas for this report and must be followed.
The abstract should summarize the scope of the paper in no more than 150 words. The report
must be 4 pages (this is approximately 3000 words in length, using the 2-column IEEE format and
font size prescribed by the template).
Please pay attention to the marking scheme as a further guidance for content that you should
include in the main body of the report.
References should take the following form: full list of authors (i.e. not ‘et al.’), title of paper/book,
title of journal (publisher if a book), year of publication, volume number and first and last page
numbers. If you are using a Web reference, the full URL must be included along with the date of
access. The references should be listed at the end of the report, but assimilated into the text;
identified by the reference number in square parentheses (this is the Vancouver referencing
Remember that this is to be a technical report, so make sure the report is similar in appearance to
an article suitable for publication in a technical conference or journal.
This coursework component contributes to 50% of the overall module grade. The marking
scheme of this assignment is based on several criteria with corresponding weights, given as
 Synopsis (Title, Abstract and Key Terms) – 10%
 Content (Scope and Technical Accuracy, Logical Coherence, Balanced Addressing of
Cryptographic Technique and Application Domain, Clarity of Expression and Explanations) –
 Critical Analysis (Suitability and Justification of Selected Cryptographic Technique, Addresses
Management or Configuration Aspect) – 40%
 Presentation (Use of Language, Adherence to Formatting Instructions, Quality of Diagrams,
Use of References) – 10%
 Conclusion (Summary of Work, Outlook) – 10%
A (70%-100) The report reflects work clearly beyond what has been taught in the module. A
similar method is used for all images of the selected project. Algorithms that are
used are justified. Include code and discussion of alternative algorithms that
have been used but failed to derive a good result.
B (60%-69%) Very good report that justifies the algorithm(s) selected and a range of results
derived by a range of methods and/or parameters.
C (50%-59%) Report presents adequate results, derived by a single method, but justification
of the selected algorithm and experimentation of other methods are limited.
Fail (1%-49%) No running code and/or inadequate results are presented.
You may consult with the coursework setter for preliminary feedback on the suitability of your
solution during the coursework briefing session and within the specified time of up to one week
after the end of the second teaching week.
The report needs to be submitted as softcopy only, by uploading to Canvas, using the provided
link. The deadline for submission of the completed coursework is Thursday, 5th November,
23:59pm. Once the deadline has passed, a late coursework link will still be available for you in
case you had difficulties with the submission, but you need to e-mail the coursework setter if you
have used it and you may experience a penalty. You will receive written feedback, including your
mark, 3 working weeks after the submission deadline.
You must not present the work of another as your own without proper acknowledgement. It is the
failure to acknowledge the source that constitutes plagiarism. Be aware of the University rules on

Order Now

Calculate a fair price for your paper

Such a cheap price for your free time and healthy sleep

1650 words
Place an order within a couple of minutes.
Get guaranteed assistance and 100% confidentiality.
Total price: $78
WeCreativez WhatsApp Support
Our customer support team is here to answer your questions. Ask us anything!
👋 Hi, how can I help?