RU beehive logo ITEC dept promo banner
ITEC 345
2014fall
ibarland

homelectshws
D2Lbreeze (snow day)

paper-description
Course Paper

Pick a topic to research, and write a report (4-6 pages long) on that topic. I have provided a few sample topics below, however I encourage you to consider other security-related topics as well. The report must closely adhere to the format of an IEEE research paper, including citations. A sample format in MS word is available.

Warning:This format is extremely dense: five pages in this format might be the equivalent of ten pages in usual formats.

Be sure your paper is informative, specific, and well-written. You (or a lucky roommate) should give it a close read just before submitting, to catch any grammatical errors, missing words, inconsistent verb tenses, and the like. Ask the reader to tell you something specific that they learned from your paper (and, have in mind something that you hoped they learned, that they didn't know before).

Include a bibliography with at least two original (non-Wikipedia) sources. Citing web sources is okay (but at least one non-web source is preferred when possible). Your paper’s bibliography does not contribute toward the page count.

Turn-in details:

Here is what is expected for each of the deadlines above:

Content Standards

Be specific, not vague

In all cases, giving specific details and concrete examples and techniques is more important than giving general-but-nonspecific overviews.

For example, rather than saying: “Email is insecure, because messages can be forged.” instead, explain how it can be forged:

Email using SMTP doesn’t require authentication: it can be forged. The SMTP server receiving a message simply receives a string stating who the message is purportedly from; anybody connecting to the SMTP server can provide any message and claim any originator.
Even better, demonstrate your point, perhaps including an appendix with a sample SMTP exchange, with the sender’s text in green, and the SMTP server’s output in black:
220 rucs.radford.edu ESMTP Postfix (Ubuntu) 
MAIL FROM:imposter@doppelganger.com
250 2.1.0 Ok
RCPT TO:victim@gmail.com
250 2.1.0 Ok
DATA
354 End data with <CR><LF>.<CR><LF>
subject: help
As a Nigerian prince, I demand your bank account number! 
.
250 2.0.0 Ok
The first version doesn’t necessarily demonstrate any understanding, while the second version explains and specifically demonstrates why.

Similarly: Rather than just say loosely “DES is insecure”, be more precise:

An attacker can break DES with a brute-force attack: the 56-bit key has 256 ~ 72 quadrillion possible values. Although this is very large, it is on the edge of feasible: a network of 1000 students, using off-the-shelf desktop computers (3GHz processors), each taking 100 cycles to do each the 16-rounds of DES, could crack any key within 1.2yrs.

If you find yourself using terms like “can hack into” and “highly insecure”, strive to give concrete examples instead.

Avoiding plagiarism

A good approach to guard against plagiarism is to keep an hour (or better, one day) between reading and writing. That is, read various sources, and take brief notes. Then wait a day, letting the concepts stew. After that, sit down and try to clearly explain the important issues and concepts. If you find yourself getting stuck, or can't remember specific facts, go back and read but (again) wait a day before resuming that part of the writing.

Proof-reading

Even if you don't use Word/OpenOffice, you might want to paste your document into Word just to look for red and green grammar errors/warnings. Also, be sure to scan specifically for common mistakes: “its”/“it's”; “to”/“too”; “their”/“there”/“they're”.

If a roommate or friend is also working on a paper, swap proofreading with them. (You can also give them feedback on what is unclear, too wordy, etc..)

Use bulleted lists

When appropriate use bulleted lists (or enumerated lists, where the order is important). Using sub-sections can also help reveal the structure of your thinking.

Possible Topics (with some possible resources):


Sample Outline

This happens to be the lecture-outline for the Cryptography portion of the class. That covers several weeks worth of lectures, so it's more deeper than a term paper's outline would be, but it exemplifies the structure and detail that an outline should have.

- Crypto:
I. Symmetric
   - Framework: math notation.
   - substitution ciphers: confusion
     . example: caesar; shifting: key-space = 26
     . substitutiong ciphers; key-space = 26!
       how big is 26! ?
       brute-force vs other ways to break
     . pseudo-random generators
     . 1-time pads
   - diffusion
     . example: column ciphers
   - use both conf, diff:
     . DES
     . 2DES (weak); 3DES; AES


II. Asymmetric
    - symmetric wants KDC
    - public-key: motivate/make-plausible
    - RSA algo
    - security of RSA: hinges on factoring

III. Hashing
    - define hash fn
    - uses for hash functions
      - in CS
      - in crypto
    - some non-secure examples
    - desired properties
       weak collision avoidance
       strong collision avoidance
    - demo: md5
    - good current algs
  

Educational Outcomes

Goal 1
Radford University students will demonstrate competency in critical reading, standard written English, audience-specific writing, clear and effective prose, and other elements of composition. Radford University students will be able to:

  1. effectively use standard written English (including grammar, punctuation, spelling, and sentence structure) to construct a thesis-driven essay supported by reasonable arguments
  2. demonstrate the writing process through invention, organization, drafting, revision, editing, proofreading, and presentation
  3. choose appropriate genres and styles when writing for a variety of different audiences
  4. describe and evaluate critically a variety of print and other sources, synthesize and document material appropriately, and avoid plagiarism when developing a research paper

Goal 3:
Radford University students will learn to distinguish knowledge from opinion, challenge ideas, and develop reasonable strategies for belief formation. Radford University students will be able to:

  1. apply the processes of deduction, induction, and other key elements of logical reasoning
  2. create a well-reasoned argument by evaluating the validity of ideas and information, providing evidence and support, and arguing against competing claims when applicable
  3. analyze issues, solve problems, and apply reasoning to everyday situations
  4. evaluate written and verbal arguments by discerning any logical fallacies, distinguishing between documented fact and opinion, examining explicit and implicit assumptions, and assessing the use of evidence to draw inferences and conclusions


1 You may also use your real-name, if you want. Note that your comments will not affect the author's grade, as discussed below.      

2Of course, I'll take into account the differences between the author's polished version and the version you read.      

homelectshws
D2Lbreeze (snow day)


©2014, Ian Barland, Radford University
Last modified 2014.Nov.28 (Fri)
Please mail any suggestions
(incl. typos, broken links)
to ibarlandradford.edu
Rendered by Racket.