COMP1212代寫、代做Java/c++程序設(shè)計(jì)

            時(shí)間:2024-05-08  來(lái)源:  作者: 我要糾錯(cuò)



            School of Computing: assessment brief
            Module title Computer Processors
            Module code COMP1212
            Assignment title Assignment 2: Encryption using a Feistel Cipher
            Assignment type
            and description
            In-course assessment. Requires design, implementation
            and testing of code written in assembly language
            Rationale
            Provides an opportunity to write assembly code including
             understanding the implementation of branching and
            functions and learn how a Feistel Cipher works for encryption.
            Word
            limit and
            guidance
            This coursework should take less than 15 hours to complete.
            Weighting
            60%
            Submission deadline
            10am
             9/5/24
            Submission
            method
            Gradescope
            Feedback provision Feedback will be provided through Gradescope
            Learning outcomes
            assessed
            Explain how high level programming constructs, such
            as ’if’ statements and ’for’ loops, are implemented at a
            machine level
            Module lead Andy Bulpitt
            Other Staff contact Noleen K¨ohler
            11. Assignment guidance
            The Feistel cipher is a symmetric block cipher encryption framework which is the basis
            of many modern day encryption algorithms. In this coursework you will implement
            a Feistel cipher system as a software implementation in Hack Assembly.
            In a Feistel cipher the plaintext, P, to be encrypted is split into two equal size parts
            L0 and R0 such that P = L0R0. A function F is applied to one half of the plaintext,
            combined with a key, and the result is XOR’d with the other half of the plaintext.
            Feistel ciphers often employ multiple rounds of this scheme. In general the scheme
            works as follows, for all i = 0, . . . , n,
            Li+1 = Ri
            Ri+1 = Li ⊕ F(Ri
            , Ki)
            To decrypt an encrypted message using this cipher we can apply the same procedure
            in reverse. For i = n, n − 1, . . . , 0,
            Ri = Li+1
            Li = Ri+1 ⊕ F(Li+1, Ki)
            For this coursework we are interested in the 16-bit Feistel cipher which uses 4 rounds.
            The function F(A, B) = A ⊕ ¬B.
            The keys are derived from a single 8-bit key K0 such that,
            K0 = b7b6b5b4b3b2b1b0
            K1 = b6b5b4b3b2b1b0b7
            K2 = b5b4b3b2b1b0b7b6
            K3 = b4b3b2b1b0b7b6b5
            2. Assessment tasks
            (a) Write a program (XOR.asm) in HACK assembly that implements a bit-wise
            XOR function between two 16-bit values stored in RAM[3] and RAM[4] and
            stores the result in RAM[5].
            [4 marks]
            2(b) Write a program (Rotate.asm) in HACK assembly that implements an algorithm
            to rotate the bits of a 16-bit number left (Least Significant bit (LSb) to Most
            Significant bit (MSb)). The original number should be stored in RAM[3], the
            number of times to rotate the bits should be in RAM[4] and the result stored in
            RAM[5], i.e. 1010111100000000 rotated left 3 times would be 0111100000000101
            where the MSb is used to replace the LSb on each rotation.
            [8 marks]
            (c) Write a program (FeistelEncryption.asm) in HACK assembly, that implements
            the described Feistel encryption system. The initial key, K0, will be stored in
            RAM[1], and the plaintext to be encrypted will be represented by a 16-bit value
            stored in RAM[2]. The result of the encryption should be stored in RAM[0].
            [10 marks]
            [Total 22 marks]
            3. General guidance and study support
            Tools required to simulate the hardware and CPU are provided on Minerva under
            Learning resources: Software. You may find it easier to implement cipher in a high
            level language first. This will also allow you to test the results of your HACK program.
            Support will be available during lab classes. Please ensure the files you upload work
            with the test files provided and use the filenames provided in this sheet. Do not
            alter the format of the lines of these test files in any way. The spacing in
            each line needs to be preserved You are of course welcome to build your own
            test files in the same format or add to these files.
            4. Assessment criteria and marking process
            This coursework will be automatically marked using Gradescope. Feedback will be
            provided through Gradescope.
            Marks are awarded for passing the automated tests on the submitted programs.
            These will not necessarily be the same tests that are provided to help you develop
            the solution. You should therefore test your solution thoroughly using other values
            for the plaintext and keys before your final submission.
            5. Presentation and referencing
            Submitted code should provide suitable comments where possible.
            6. Submission requirements
            Links to submit your work can be found on Minerva under Assessment and feedback/Submit
            my work. The HACK assembly (asm) files for each part must be uploaded
            individually. Ensure you use only the filenames provided in this specification
            sheet.
            37. Academic misconduct and plagiarism
            Academic integrity means engaging in good academic practice. This involves essential
            academic skills, such as keeping track of where you find ideas and information and
            referencing these accurately in your work.
            By submitting this assignment you are confirming that the work is a true expression
            of your own work and ideas and that you have given credit to others where their
            work has contributed to yours.
            8. Assessment/marking criteria
            No marks will be awarded for tests which fail
            • Part a) is graded using 4 tests, each worth 1 mark. [max 4 marks]
            • Part b) is graded using 4 tests, each worth 2 marks. [max 8 marks]
            • Part c) is graded using 4 tests, each worth 2 marks and a further 2 marks for
            optimised solutions that require a lower number of operations to complete the
            encryption [max 10 marks]
            [Total 22 marks]
            4

            請(qǐng)加QQ:99515681  郵箱:99515681@qq.com   WX:codinghelp





















             

            標(biāo)簽:

            掃一掃在手機(jī)打開當(dāng)前頁(yè)
          1. 上一篇:代做COCMP5328、代寫Python設(shè)計(jì)程序
          2. 下一篇:代做DSA1002、代寫Java/c++設(shè)計(jì)編程
          3. 無(wú)相關(guān)信息
            昆明生活資訊

            昆明圖文信息
            蝴蝶泉(4A)-大理旅游
            蝴蝶泉(4A)-大理旅游
            油炸竹蟲
            油炸竹蟲
            酸筍煮魚(雞)
            酸筍煮魚(雞)
            竹筒飯
            竹筒飯
            香茅草烤魚
            香茅草烤魚
            檸檬烤魚
            檸檬烤魚
            昆明西山國(guó)家級(jí)風(fēng)景名勝區(qū)
            昆明西山國(guó)家級(jí)風(fēng)景名勝區(qū)
            昆明旅游索道攻略
            昆明旅游索道攻略
          4. 高仿包包訂製 幣安官網(wǎng)下載

            關(guān)于我們 | 打賞支持 | 廣告服務(wù) | 聯(lián)系我們 | 網(wǎng)站地圖 | 免責(zé)聲明 | 幫助中心 | 友情鏈接 |

            Copyright © 2025 kmw.cc Inc. All Rights Reserved. 昆明網(wǎng) 版權(quán)所有
            ICP備06013414號(hào)-3 公安備 42010502001045

            主站蜘蛛池模板: 78成人精品电影在线播放日韩精品电影一区亚洲| 国产另类TS人妖一区二区 | 无码人妻久久一区二区三区蜜桃 | 亚洲一区二区三区乱码A| 亚洲av一综合av一区| 国产成人无码精品一区不卡| 精品日韩亚洲AV无码一区二区三区 | 人妻互换精品一区二区| 亚洲国产成人一区二区精品区| 国产精品 一区 在线| 日本一区二区三区免费高清在线 | 国产精品久久久久久一区二区三区 | 亚洲AV无码一区二区二三区入口| 亚洲A∨精品一区二区三区下载| 亚洲第一区香蕉_国产a| 日产一区日产2区| 国产乱码伦精品一区二区三区麻豆| 在线成人综合色一区| 最新中文字幕一区二区乱码 | 国产在线精品一区二区在线看| 国产日本一区二区三区| 人妻无码视频一区二区三区 | 亚洲av无码一区二区乱子伦as| 曰韩精品无码一区二区三区| 中文字幕精品亚洲无线码一区应用| 日韩一区二区在线观看| 国产成人免费一区二区三区| 国产一区在线观看免费| 亚无码乱人伦一区二区| 色国产在线视频一区| 无码AV一区二区三区无码| 亚洲乱码国产一区网址| 国产在线一区二区综合免费视频| 久久人妻内射无码一区三区| 久久精品国产一区二区三| 国产乱码一区二区三区| 内射少妇一区27P| 三上悠亚精品一区二区久久| 人妻无码第一区二区三区| 无码av免费毛片一区二区| 国产成人精品一区二区三在线观看 |