WhatsApp-00963951432013 Admin
عدد المساهمات : 2429 نقاط : 302124 السٌّمعَة : 4 تاريخ التسجيل : 20/09/2008 العمر : 54 الموقع : www.aoua.123.st
| موضوع: T325 - TMA - Fall 2015 1/4 T325: T325:T325:T325: Technologies for digital mediaTechnologies for digital media Technologies for digital media Technologies for digital mediaTechnologies for digital mediaTechnologies for digital mediaTechnologies for digital الأربعاء ديسمبر 02, 2015 8:41 am | |
| T325 - TMA - Fall 2015 1/4 T325: T325:T325:T325: Technologies for digital mediaTechnologies for digital media Technologies for digital media Technologies for digital mediaTechnologies for digital mediaTechnologies for digital mediaTechnologies for digital mediaTechnologies for digital mediaTechnologies for digital mediaTechnologies for digital media Technologies for digital media Technologies for digital mediaTechnologies for digital mediaTechnologies for digital mediaTechnologies for digital mediaTechnologies for digital mediaTechnologies for digital mediaTechnologies for digital media Technologies for digital media Technologies for digital media ______________________________________________________________________________ TutorTutor -marked Assignmentmarked Assignmentmarked Assignmentmarked Assignmentmarked Assignment marked Assignment marked Assignment marked Assignmentmarked Assignmentmarked Assignment marked Assignment ______________________________________________________________________________ T325:T325: TMA, FallFallFall 201 5-20162016 CutCut -off date: off date: off date: To Be AssignedTo Be Assigned To Be AssignedTo Be AssignedTo Be Assigned To Be Assigned To Be AssignedTo Be Assigned ______________________________________________________________________________ Total Marks: 40Total Marks: 40 Total Marks: 40 Contents Contents Contents Question 1 ( Question 1 ( Question 1 ( 12 marks marks)…………………………………………………… )…………………………………………………… Question 2 ( Question 2 ( Question 2 ( 28 marks marks)…………………………………………………… )…………………………………………………… Plagiarism Warning:Plagiarism Warning: Plagiarism Warning: Plagiarism Warning: Plagiarism Warning:Plagiarism Warning:Plagiarism Warning:Plagiarism Warning: Plagiarism Warning:Plagiarism Warning: Plagiarism Warning: As per AOU rules and regulations, all students are As per AOU rules and regulations, all students are As per AOU rules and regulations, all students are As per AOU rules and regulations, all students are As per AOU rules and regulations, all students are As per AOU rules and regulations, all students are As per AOU rules and regulations, all students are As per AOU rules and regulations, all students are As per AOU rules and regulations, all students are As per AOU rules and regulations, all students are As per AOU rules and regulations, all students are As per AOU rules and regulations, all students are As per AOU rules and regulations, all students are As per AOU rules and regulations, all students are As per AOU rules and regulations, all students are As per AOU rules and regulations, all students are As per AOU rules and regulations, all students are As per AOU rules and regulations, all students are As per AOU rules and regulations, all students are required to submit their own TMA work and avoid required to submit their own TMA work and avoid required to submit their own TMA work and avoid required to submit their own TMA work and avoid required to submit their own TMA work and avoid required to submit their own TMA work and avoid required to submit their own TMA work and avoid required to submit their own TMA work and avoid required to submit their own TMA work and avoid required to submit their own TMA work and avoid required to submit their own TMA work and avoid required to submit their own TMA work and avoid required to submit their own TMA work and avoid required to submit their own TMA work and avoid required to submit their own TMA work and avoid required to submit their own TMA work and avoid required to submit their own TMA work and avoid required to submit their own TMA work and avoid required to submit their own TMA work and avoid plagiarism. The AOU has implemented sophisticated techniques for plagiarism detection. You must plagiarism. The AOU has implemented sophisticated techniques for plagiarism detection. You must plagiarism. The AOU has implemented sophisticated techniques for plagiarism detection. You must plagiarism. The AOU has implemented sophisticated techniques for plagiarism detection. You must plagiarism. The AOU has implemented sophisticated techniques for plagiarism detection. You must plagiarism. The AOU has implemented sophisticated techniques for plagiarism detection. You must plagiarism. The AOU has implemented sophisticated techniques for plagiarism detection. You must plagiarism. The AOU has implemented sophisticated techniques for plagiarism detection. You must plagiarism. The AOU has implemented sophisticated techniques for plagiarism detection. You must plagiarism. The AOU has implemented sophisticated techniques for plagiarism detection. You must plagiarism. The AOU has implemented sophisticated techniques for plagiarism detection. You must plagiarism. The AOU has implemented sophisticated techniques for plagiarism detection. You must plagiarism. The AOU has implemented sophisticated techniques for plagiarism detection. You must plagiarism. The AOU has implemented sophisticated techniques for plagiarism detection. You must plagiarism. The AOU has implemented sophisticated techniques for plagiarism detection. You must plagiarism. The AOU has implemented sophisticated techniques for plagiarism detection. You must plagiarism. The AOU has implemented sophisticated techniques for plagiarism detection. You must plagiarism. The AOU has implemented sophisticated techniques for plagiarism detection. You must plagiarism. The AOU has implemented sophisticated techniques for plagiarism detection. You must plagiarism. The AOU has implemented sophisticated techniques for plagiarism detection. You must plagiarism. The AOU has implemented sophisticated techniques for plagiarism detection. You must plagiarism. The AOU has implemented sophisticated techniques for plagiarism detection. You must plagiarism. The AOU has implemented sophisticated techniques for plagiarism detection. You must plagiarism. The AOU has implemented sophisticated techniques for plagiarism detection. You must plagiarism. The AOU has implemented sophisticated techniques for plagiarism detection. You must plagiarism. The AOU has implemented sophisticated techniques for plagiarism detection. You must plagiarism. The AOU has implemented sophisticated techniques for plagiarism detection. You must plagiarism. The AOU has implemented sophisticated techniques for plagiarism detection. You must plagiarism. The AOU has implemented sophisticated techniques for plagiarism detection. You must plagiarism. The AOU has implemented sophisticated techniques for plagiarism detection. You must plagiarism. The AOU has implemented sophisticated techniques for plagiarism detection. You must plagiarism. The AOU has implemented sophisticated techniques for plagiarism detection. You must plagiarism. The AOU has implemented sophisticated techniques for plagiarism detection. You must plagiarism. The AOU has implemented sophisticated techniques for plagiarism detection. You must plagiarism. The AOU has implemented sophisticated techniques for plagiarism detection. You must plagiarism. The AOU has implemented sophisticated techniques for plagiarism detection. You must plagiarism. The AOU has implemented sophisticated techniques for plagiarism detection. You must plagiarism. The AOU has implemented sophisticated techniques for plagiarism detection. You must plagiarism. The AOU has implemented sophisticated techniques for plagiarism detection. You must plagiarism. The AOU has implemented sophisticated techniques for plagiarism detection. You must provide all provide all provide all provide all provide all references in case you use and quote another person's work your TMA. You will be references in case you use and quote another person's work your TMA. You will be references in case you use and quote another person's work your TMA. You will be references in case you use and quote another person's work your TMA. You will be references in case you use and quote another person's work your TMA. You will be references in case you use and quote another person's work your TMA. You will be references in case you use and quote another person's work your TMA. You will be references in case you use and quote another person's work your TMA. You will be references in case you use and quote another person's work your TMA. You will be references in case you use and quote another person's work your TMA. You will be references in case you use and quote another person's work your TMA. You will be references in case you use and quote another person's work your TMA. You will be references in case you use and quote another person's work your TMA. You will be references in case you use and quote another person's work your TMA. You will be references in case you use and quote another person's work your TMA. You will be references in case you use and quote another person's work your TMA. You will be references in case you use and quote another person's work your TMA. You will be references in case you use and quote another person's work your TMA. You will be references in case you use and quote another person's work your TMA. You will be references in case you use and quote another person's work your TMA. You will be references in case you use and quote another person's work your TMA. You will be references in case you use and quote another person's work your TMA. You will be references in case you use and quote another person's work your TMA. You will be references in case you use and quote another person's work your TMA. You will be references in case you use and quote another person's work your TMA. You will be references in case you use and quote another person's work your TMA. You will be references in case you use and quote another person's work your TMA. You will be references in case you use and quote another person's work your TMA. You will be references in case you use and quote another person's work your TMA. You will be references in case you use and quote another person's work your TMA. You will be references in case you use and quote another person's work your TMA. You will be references in case you use and quote another person's work your TMA. You will be references in case you use and quote another person's work your TMA. You will be references in case you use and quote another person's work your TMA. You will be references in case you use and quote another person's work your TMA. You will be references in case you use and quote another person's work your TMA. You will be references in case you use and quote another person's work your TMA. You will be references in case you use and quote another person's work your TMA. You will be references in case you use and quote another person's work your TMA. You will be references in case you use and quote another person's work your TMA. You will be references in case you use and quote another person's work your TMA. You will be penalized for any act of plagiarism as per the AOU's rules and regulations. penalized for any act of plagiarism as per the AOU's rules and regulations. penalized for any act of plagiarism as per the AOU's rules and regulations. penalized for any act of plagiarism as per the AOU's rules and regulations.penalized for any act of plagiarism as per the AOU's rules and regulations.penalized for any act of plagiarism as per the AOU's rules and regulations. penalized for any act of plagiarism as per the AOU's rules and regulations. penalized for any act of plagiarism as per the AOU's rules and regulations.penalized for any act of plagiarism as per the AOU's rules and regulations.penalized for any act of plagiarism as per the AOU's rules and regulations.penalized for any act of plagiarism as per the AOU's rules and regulations.penalized for any act of plagiarism as per the AOU's rules and regulations.penalized for any act of plagiarism as per the AOU's rules and regulations. penalized for any act of plagiarism as per the AOU's rules and regulations. penalized for any act of plagiarism as per the AOU's rules and regulations. penalized for any act of plagiarism as per the AOU's rules and regulations. penalized for any act of plagiarism as per the AOU's rules and regulations. penalized for any act of plagiarism as per the AOU's rules and regulations.penalized for any act of plagiarism as per the AOU's rules and regulations. penalized for any act of plagiarism as per the AOU's rules and regulations.penalized for any act of plagiarism as per the AOU's rules and regulations.penalized for any act of plagiarism as per the AOU's rules and regulations. penalized for any act of plagiarism as per the AOU's rules and regulations. penalized for any act of plagiarism as per the AOU's rules and regulations.penalized for any act of plagiarism as per the AOU's rules and regulations. penalized for any act of plagiarism as per the AOU's rules and regulations.penalized for any act of plagiarism as per the AOU's rules and regulations. penalized for any act of plagiarism as per the AOU's rules and regulations.penalized for any act of plagiarism as per the AOU's rules and regulations. penalized for any act of plagiarism as per the AOU's rules and regulations. Declaration of No Plagiarism by Student (to be signed and submitted student with TMA work Declaration of No Plagiarism by Student (to be signed and submitted student with TMA workDeclaration of No Plagiarism by Student (to be signed and submitted student with TMA work Declaration of No Plagiarism by Student (to be signed and submitted student with TMA work Declaration of No Plagiarism by Student (to be signed and submitted student with TMA workDeclaration of No Plagiarism by Student (to be signed and submitted student with TMA work Declaration of No Plagiarism by Student (to be signed and submitted student with TMA workDeclaration of No Plagiarism by Student (to be signed and submitted student with TMA work Declaration of No Plagiarism by Student (to be signed and submitted student with TMA workDeclaration of No Plagiarism by Student (to be signed and submitted student with TMA work Declaration of No Plagiarism by Student (to be signed and submitted student with TMA work Declaration of No Plagiarism by Student (to be signed and submitted student with TMA work Declaration of No Plagiarism by Student (to be signed and submitted student with TMA workDeclaration of No Plagiarism by Student (to be signed and submitted student with TMA workDeclaration of No Plagiarism by Student (to be signed and submitted student with TMA work Declaration of No Plagiarism by Student (to be signed and submitted student with TMA workDeclaration of No Plagiarism by Student (to be signed and submitted student with TMA work Declaration of No Plagiarism by Student (to be signed and submitted student with TMA workDeclaration of No Plagiarism by Student (to be signed and submitted student with TMA workDeclaration of No Plagiarism by Student (to be signed and submitted student with TMA work Declaration of No Plagiarism by Student (to be signed and submitted student with TMA work Declaration of No Plagiarism by Student (to be signed and submitted student with TMA work Declaration of No Plagiarism by Student (to be signed and submitted student with TMA workDeclaration of No Plagiarism by Student (to be signed and submitted student with TMA workDeclaration of No Plagiarism by Student (to be signed and submitted student with TMA workDeclaration of No Plagiarism by Student (to be signed and submitted student with TMA work Declaration of No Plagiarism by Student (to be signed and submitted student with TMA workDeclaration of No Plagiarism by Student (to be signed and submitted student with TMA workDeclaration of No Plagiarism by Student (to be signed and submitted student with TMA workDeclaration of No Plagiarism by Student (to be signed and submitted student with TMA work Declaration of No Plagiarism by Student (to be signed and submitted student with TMA workDeclaration of No Plagiarism by Student (to be signed and submitted student with TMA workDeclaration of No Plagiarism by Student (to be signed and submitted student with TMA workDeclaration of No Plagiarism by Student (to be signed and submitted student with TMA workDeclaration of No Plagiarism by Student (to be signed and submitted student with TMA workDeclaration of No Plagiarism by Student (to be signed and submitted student with TMA workDeclaration of No Plagiarism by Student (to be signed and submitted student with TMA work Declaration of No Plagiarism by Student (to be signed and submitted student with TMA workDeclaration of No Plagiarism by Student (to be signed and submitted student with TMA workDeclaration of No Plagiarism by Student (to be signed and submitted student with TMA workDeclaration of No Plagiarism by Student (to be signed and submitted student with TMA workDeclaration of No Plagiarism by Student (to be signed and submitted student with TMA work Declaration of No Plagiarism by Student (to be signed and submitted student with TMA work Declaration of No Plagiarism by Student (to be signed and submitted student with TMA workDeclaration of No Plagiarism by Student (to be signed and submitted student with TMA workDeclaration of No Plagiarism by Student (to be signed and submitted student with TMA work Declaration of No Plagiarism by Student (to be signed and submitted student with TMA workDeclaration of No Plagiarism by Student (to be signed and submitted student with TMA work Declaration of No Plagiarism by Student (to be signed and submitted student with TMA workDeclaration of No Plagiarism by Student (to be signed and submitted student with TMA workDeclaration of No Plagiarism by Student (to be signed and submitted student with TMA workDeclaration of No Plagiarism by Student (to be signed and submitted student with TMA workDeclaration of No Plagiarism by Student (to be signed and submitted student with TMA workDeclaration of No Plagiarism by Student (to be signed and submitted student with TMA workDeclaration of No Plagiarism by Student (to be signed and submitted student with TMA workDeclaration of No Plagiarism by Student (to be signed and submitted student with TMA workDeclaration of No Plagiarism by Student (to be signed and submitted student with TMA work): ): I hereby declare that this submitted TMA work is a result of my own efforts and have not plagiarized I hereby declare that this submitted TMA work is a result of my own efforts and have not plagiarized I hereby declare that this submitted TMA work is a result of my own efforts and have not plagiarized I hereby declare that this submitted TMA work is a result of my own efforts and have not plagiarized I hereby declare that this submitted TMA work is a result of my own efforts and have not plagiarized I hereby declare that this submitted TMA work is a result of my own efforts and have not plagiarized I hereby declare that this submitted TMA work is a result of my own efforts and have not plagiarized I hereby declare that this submitted TMA work is a result of my own efforts and have not plagiarized I hereby declare that this submitted TMA work is a result of my own efforts and have not plagiarized I hereby declare that this submitted TMA work is a result of my own efforts and have not plagiarized I hereby declare that this submitted TMA work is a result of my own efforts and have not plagiarized I hereby declare that this submitted TMA work is a result of my own efforts and have not plagiarized I hereby declare that this submitted TMA work is a result of my own efforts and have not plagiarized I hereby declare that this submitted TMA work is a result of my own efforts and have not plagiarized I hereby declare that this submitted TMA work is a result of my own efforts and have not plagiarized I hereby declare that this submitted TMA work is a result of my own efforts and have not plagiarized I hereby declare that this submitted TMA work is a result of my own efforts and have not plagiarized I hereby declare that this submitted TMA work is a result of my own efforts and have not plagiarized I hereby declare that this submitted TMA work is a result of my own efforts and have not plagiarized I hereby declare that this submitted TMA work is a result of my own efforts and have not plagiarized I hereby declare that this submitted TMA work is a result of my own efforts and have not plagiarized I hereby declare that this submitted TMA work is a result of my own efforts and have not plagiarized I hereby declare that this submitted TMA work is a result of my own efforts and have not plagiarized I hereby declare that this submitted TMA work is a result of my own efforts and have not plagiarized I hereby declare that this submitted TMA work is a result of my own efforts and have not plagiarized I hereby declare that this submitted TMA work is a result of my own efforts and have not plagiarized I hereby declare that this submitted TMA work is a result of my own efforts and have not plagiarized I hereby declare that this submitted TMA work is a result of my own efforts and have not plagiarized I hereby declare that this submitted TMA work is a result of my own efforts and have not plagiarized I hereby declare that this submitted TMA work is a result of my own efforts and have not plagiarized I hereby declare that this submitted TMA work is a result of my own efforts and have not plagiarized I hereby declare that this submitted TMA work is a result of my own efforts and have not plagiarized I hereby declare that this submitted TMA work is a result of my own efforts and have not plagiarized I hereby declare that this submitted TMA work is a result of my own efforts and have not plagiarized I hereby declare that this submitted TMA work is a result of my own efforts and have not plagiarized I hereby declare that this submitted TMA work is a result of my own efforts and have not plagiarized I hereby declare that this submitted TMA work is a result of my own efforts and have not plagiarized I hereby declare that this submitted TMA work is a result of my own efforts and have not plagiarized I hereby declare that this submitted TMA work is a result of my own efforts and have not plagiarized I hereby declare that this submitted TMA work is a result of my own efforts and have not plagiarized I hereby declare that this submitted TMA work is a result of my own efforts and have not plagiarized I hereby declare that this submitted TMA work is a result of my own efforts and have not plagiarized I hereby declare that this submitted TMA work is a result of my own efforts and have not plagiarized I hereby declare that this submitted TMA work is a result of my own efforts and have not plagiarized I hereby declare that this submitted TMA work is a result of my own efforts and have not plagiarized I hereby declare that this submitted TMA work is a result of my own efforts and have not plagiarized I hereby declare that this submitted TMA work is a result of my own efforts and have not plagiarized I hereby declare that this submitted TMA work is a result of my own efforts and have not plagiarized I hereby declare that this submitted TMA work is a result of my own efforts and have not plagiarized I hereby declare that this submitted TMA work is a result of my own efforts and have not plagiarized I hereby declare that this submitted TMA work is a result of my own efforts and have not plagiarized I hereby declare that this submitted TMA work is a result of my own efforts and have not plagiarized I hereby declare that this submitted TMA work is a result of my own efforts and have not plagiarized I hereby declare that this submitted TMA work is a result of my own efforts and have not plagiarized I hereby declare that this submitted TMA work is a result of my own efforts and have not plagiarized I hereby declare that this submitted TMA work is a result of my own efforts and have not plagiarized I hereby declare that this submitted TMA work is a result of my own efforts and have not plagiarized I hereby declare that this submitted TMA work is a result of my own efforts and have not plagiarized I hereby declare that this submitted TMA work is a result of my own efforts and have not plagiarized any other person's work. I have provided all references of information that used and quoted in my any other person's work. I have provided all references of information that used and quoted in my any other person's work. I have provided all references of information that used and quoted in my any other person's work. I have provided all references of information that used and quoted in my any other person's work. I have provided all references of information that used and quoted in my any other person's work. I have provided all references of information that used and quoted in my any other person's work. I have provided all references of information that used and quoted in my any other person's work. I have provided all references of information that used and quoted in my any other person's work. I have provided all references of information that used and quoted in my any other person's work. I have provided all references of information that used and quoted in my any other person's work. I have provided all references of information that used and quoted in my any other person's work. I have provided all references of information that used and quoted in my any other person's work. I have provided all references of information that used and quoted in my any other person's work. I have provided all references of information that used and quoted in my any other person's work. I have provided all references of information that used and quoted in my any other person's work. I have provided all references of information that used and quoted in my any other person's work. I have provided all references of information that used and quoted in my any other person's work. I have provided all references of information that used and quoted in my any other person's work. I have provided all references of information that used and quoted in my any other person's work. I have provided all references of information that used and quoted in my any other person's work. I have provided all references of information that used and quoted in my any other person's work. I have provided all references of information that used and quoted in my any other person's work. I have provided all references of information that used and quoted in my any other person's work. I have provided all references of information that used and quoted in my any other person's work. I have provided all references of information that used and quoted in my any other person's work. I have provided all references of information that used and quoted in my any other person's work. I have provided all references of information that used and quoted in my any other person's work. I have provided all references of information that used and quoted in my any other person's work. I have provided all references of information that used and quoted in my any other person's work. I have provided all references of information that used and quoted in my any other person's work. I have provided all references of information that used and quoted in my any other person's work. I have provided all references of information that used and quoted in my any other person's work. I have provided all references of information that used and quoted in my any other person's work. I have provided all references of information that used and quoted in my any other person's work. I have provided all references of information that used and quoted in my any other person's work. I have provided all references of information that used and quoted in my any other person's work. I have provided all references of information that used and quoted in my any other person's work. I have provided all references of information that used and quoted in my any other person's work. I have provided all references of information that used and quoted in my any other person's work. I have provided all references of information that used and quoted in my any other person's work. I have provided all references of information that used and quoted in my any other person's work. I have provided all references of information that used and quoted in my any other person's work. I have provided all references of information that used and quoted in my any other person's work. I have provided all references of information that used and quoted in my any other person's work. I have provided all references of information that used and quoted in my TMA work. TMA work. TMA work. Name of Student:……………………………….. Name of Student:……………………………….. Name of Student:……………………………….. Name of Student:……………………………….. SigSig nature:…………………………………………... nature:…………………………………………... nature:…………………………………………... nature:…………………………………………... Date:…………………………………………………… Date:…………………………………………………… Date:…………………………………………………… T325 - TMA – Fall 2015 2/4 Question Question Question Question Question 1 This question carries This question carries This question carries This question carries This question carries This question carries This question carries This question carries 30% of the marks for this assignment% of the marks for this assignment % of the marks for this assignment % of the marks for this assignment % of the marks for this assignment % of the marks for this assignment % of the marks for this assignment % of the marks for this assignment % of the marks for this assignment You have seen in T325 - Block 1 that “The optical components of a digital camera are similar to those of a traditional film camera. The difference is that, instead of projecting an image onto a film, the image is formed on a microelectronic sensor. Most cameras use a sensor of one of two types: CCD (charge coupled device) and CMOS (complementary metal oxide semiconductor)” [1] Using the AOU e-library and/or any internet reliable resource (you are encouraged to use Google Scholar for scientific research), select a scientific publication1 that provides a comparison of the two sensor types. After reading the paper2, you are asked to answer the following questions. 2. List the following information about the paper (3 marks) a. Paper Title b. Paper Author(s) c. Type of publication (conference, journal, master thesis, PhD thesis, technical report, etc.) d. Details of the publication type (conference name, journal name, etc.) e. Publication date 2. Write a brief report (500-700 words), using your own words, that summarizes the advantages and limitations of each type of sensor when compared to the other type. You should at least explain three advantages and three limitations of each sensor type (9 marks) Mark deduction Mark deduction : The following mark deduction will be ap The following mark deduction will be apThe following mark deduction will be ap The following mark deduction will be ap The following mark deduction will be ap The following mark deduction will be apThe following mark deduction will be ap The following mark deduction will be ap The following mark deduction will be apThe following mark deduction will be ap The following mark deduction will be ap The following mark deduction will be ap The following mark deduction will be applied: plied:plied: - Up to twelve twelvetwelve marks marks marks marks for not using your own words not using your own words not using your own wordsnot using your own wordsnot using your own words not using your own words not using your own wordsnot using your own words not using your own words - Two markTwo markTwo mark Two mark Two marks for exceeding the word count limit (exceeding the word count limit (exceeding the word count limit (exceeding the word count limit (exceeding the word count limit (exceeding the word count limit ( exceeding the word count limit (exceeding the word count limit ( exceeding the word count limit (exceeding the word count limit ( exceeding the word count limit ( exceeding the word count limit ( exceeding the word count limit ( exceeding the word count limit ( 700 words) 00 words) 1International conference article, an international journal article, MSc.PhD thesis, Technical report, etc. 2 You are advised to read this paper using the approach that was explained during the course (reference: how to read a paper). T325 - TMA - Fall 2015 3/4 Question Question Question Question Question 2 This question carries 70% of the marks for this assignmentThis question carries 70% of the marks for this assignment This question carries 70% of the marks for this assignmentThis question carries 70% of the marks for this assignment This question carries 70% of the marks for this assignment This question carries 70% of the marks for this assignment This question carries 70% of the marks for this assignmentThis question carries 70% of the marks for this assignment This question carries 70% of the marks for this assignment This question carries 70% of the marks for this assignment This question carries 70% of the marks for this assignment This question carries 70% of the marks for this assignment This question carries 70% of the marks for this assignment This question carries 70% of the marks for this assignment The overall learning objective of this practical question is to get familiar with the concepts of symmetric key encryption and hashing. This will be your first-hand experience with using the OpenSSL command-line tool to encrypt/decrypt messages/files under different encryption modes, and to construct message digests with hash functions. OpenSSL is an open source cryptographic library, providing APIs at different layers. It OpenSSL is an open source cryptographic library, providing APIs at different layers. It OpenSSL is an open source cryptographic library, providing APIs at different layers. It OpenSSL is an open source cryptographic library, providing APIs at different layers. It OpenSSL is an open source cryptographic library, providing APIs at different layers. It OpenSSL is an open source cryptographic library, providing APIs at different layers. It OpenSSL is an open source cryptographic library, providing APIs at different layers. It OpenSSL is an open source cryptographic library, providing APIs at different layers. It OpenSSL is an open source cryptographic library, providing APIs at different layers. It OpenSSL is an open source cryptographic library, providing APIs at different layers. It OpenSSL is an open source cryptographic library, providing APIs at different layers. It OpenSSL is an open source cryptographic library, providing APIs at different layers. It OpenSSL is an open source cryptographic library, providing APIs at different layers. It OpenSSL is an open source cryptographic library, providing APIs at different layers. It OpenSSL is an open source cryptographic library, providing APIs at different layers. It OpenSSL is an open source cryptographic library, providing APIs at different layers. It OpenSSL is an open source cryptographic library, providing APIs at different layers. It OpenSSL is an open source cryptographic library, providing APIs at different layers. It OpenSSL is an open source cryptographic library, providing APIs at different layers. It OpenSSL is an open source cryptographic library, providing APIs at different layers. It OpenSSL is an open source cryptographic library, providing APIs at different layers. It OpenSSL is an open source cryptographic library, providing APIs at different layers. It OpenSSL is an open source cryptographic library, providing APIs at different layers. It OpenSSL is an open source cryptographic library, providing APIs at different layers. It OpenSSL is an open source cryptographic library, providing APIs at different layers. It OpenSSL is an open source cryptographic library, providing APIs at different layers. It OpenSSL is an open source cryptographic library, providing APIs at different layers. It OpenSSL is an open source cryptographic library, providing APIs at different layers. It OpenSSL is an open source cryptographic library, providing APIs at different layers. It OpenSSL is an open source cryptographic library, providing APIs at different layers. It OpenSSL is an open source cryptographic library, providing APIs at different layers. It OpenSSL is an open source cryptographic library, providing APIs at different layers. It OpenSSL is an open source cryptographic library, providing APIs at different layers. It OpenSSL is an open source cryptographic library, providing APIs at different layers. It OpenSSL is an open source cryptographic library, providing APIs at different layers. It OpenSSL is an open source cryptographic library, providing APIs at different layers. It OpenSSL is an open source cryptographic library, providing APIs at different layers. It OpenSSL is an open source cryptographic library, providing APIs at different layers. It OpenSSL is an open source cryptographic library, providing APIs at different layers. It OpenSSL is an open source cryptographic library, providing APIs at different layers. It OpenSSL is an open source cryptographic library, providing APIs at different layers. It OpenSSL is an open source cryptographic library, providing APIs at different layers. It OpenSSL is an open source cryptographic library, providing APIs at different layers. It OpenSSL is an open source cryptographic library, providing APIs at different layers. It OpenSSL is an open source cryptographic library, providing APIs at different layers. It OpenSSL is an open source cryptographic library, providing APIs at different layers. It OpenSSL is an open source cryptographic library, providing APIs at different layers. It OpenSSL is an open source cryptographic library, providing APIs at different layers. It OpenSSL is an open source cryptographic library, providing APIs at different layers. It OpenSSL is an open source cryptographic library, providing APIs at different layers. It OpenSSL is an open source cryptographic library, providing APIs at different layers. It OpenSSL is an open source cryptographic library, providing APIs at different layers. It OpenSSL is an open source cryptographic library, providing APIs at different layers. It OpenSSL is an open source cryptographic library, providing APIs at different layers. It OpenSSL is an open source cryptographic library, providing APIs at different layers. It OpenSSL is an open source cryptographic library, providing APIs at different layers. It open source with GPL license. All the necessary information about OpenSSL can be found at [1]. open source with GPL license. All the necessary information about OpenSSL can be found at [1]. open source with GPL license. All the necessary information about OpenSSL can be found at [1]. open source with GPL license. All the necessary information about OpenSSL can be found at [1].open source with GPL license. All the necessary information about OpenSSL can be found at [1].open source with GPL license. All the necessary information about OpenSSL can be found at [1]. open source with GPL license. All the necessary information about OpenSSL can be found at [1]. open source with GPL license. All the necessary information about OpenSSL can be found at [1].open source with GPL license. All the necessary information about OpenSSL can be found at [1].open source with GPL license. All the necessary information about OpenSSL can be found at [1]. open source with GPL license. All the necessary information about OpenSSL can be found at [1].open source with GPL license. All the necessary information about OpenSSL can be found at [1].open source with GPL license. All the necessary information about OpenSSL can be found at [1]. open source with GPL license. All the necessary information about OpenSSL can be found at [1]. open source with GPL license. All the necessary information about OpenSSL can be found at [1]. open source with GPL license. All the necessary information about OpenSSL can be found at [1]. open source with GPL license. All the necessary information about OpenSSL can be found at [1]. open source with GPL license. All the necessary information about OpenSSL can be found at [1].open source with GPL license. All the necessary information about OpenSSL can be found at [1].open source with GPL license. All the necessary information about OpenSSL can be found at [1]. open source with GPL license. All the necessary information about OpenSSL can be found at [1].open source with GPL license. All the necessary information about OpenSSL can be found at [1].open source with GPL license. All the necessary information about OpenSSL can be found at [1].open source with GPL license. All the necessary information about OpenSSL can be found at [1]. open source with GPL license. All the necessary information about OpenSSL can be found at [1]. open source with GPL license. All the necessary information about OpenSSL can be found at [1]. open source with GPL license. All the necessary information about OpenSSL can be found at [1].open source with GPL license. All the necessary information about OpenSSL can be found at [1]. open source with GPL license. All the necessary information about OpenSSL can be found at [1]. open source with GPL license. All the necessary information about OpenSSL can be found at [1]. open source with GPL license. All the necessary information about OpenSSL can be found at [1].open source with GPL license. All the necessary information about OpenSSL can be found at [1].open source with GPL license. All the necessary information about OpenSSL can be found at [1].open source with GPL license. All the necessary information about OpenSSL can be found at [1].open source with GPL license. All the necessary information about OpenSSL can be found at [1].open source with GPL license. All the necessary information about OpenSSL can be found at [1]. open source with GPL license. All the necessary information about OpenSSL can be found at [1].open source with GPL license. All the necessary information about OpenSSL can be found at [1].open source with GPL license. All the necessary information about OpenSSL can be found at [1].open source with GPL license. All the necessary information about OpenSSL can be found at [1]. open source with GPL license. All the necessary information about OpenSSL can be found at [1].open source with GPL license. All the necessary information about OpenSSL can be found at [1].open source with GPL license. All the necessary information about OpenSSL can be found at [1]. open source with GPL license. All the necessary information about OpenSSL can be found at [1].open source with GPL license. All the necessary information about OpenSSL can be found at [1]. open source with GPL license. All the necessary information about OpenSSL can be found at [1].We will We will We will We will We will We will be using the OpenSSL command line be using the OpenSSL command linebe using the OpenSSL command line be using the OpenSSL command linebe using the OpenSSL command line be using the OpenSSL command line be using the OpenSSL command line be using the OpenSSL command linebe using the OpenSSL command linebe using the OpenSSL command linebe using the OpenSSL command linebe using the OpenSSL command line be using the OpenSSL command linebe using the OpenSSL command line be using the OpenSSL command line be using the OpenSSL command line tool. This tool comes built tool. This tool comes built tool. This tool comes built tool. This tool comes builttool. This tool comes built tool. This tool comes builttool. This tool comes built tool. This tool comes built tool. This tool comes built-in most Linux distributions. If you in most Linux distributions. If you in most Linux distributions. If you in most Linux distributions. If you in most Linux distributions. If you in most Linux distributions. If you in most Linux distributions. If you in most Linux distributions. If you in most Linux distributions. If you in most Linux distributions. If you in most Linux distributions. If you in most Linux distributions. If you in most Linux distributions. If you in most Linux distributions. If you in most Linux distributions. If you in most Linux distributions. If you are an MS Windows user, you can download the command line tool from [2] or 4]. A good tutorial for are an MS Windows user, you can download the command line tool from [2] or 4]. A good tutorial for are an MS Windows user, you can download the command line tool from [2] or 4]. A good tutorial for are an MS Windows user, you can download the command line tool from [2] or 4]. A good tutorial for are an MS Windows user, you can download the command line tool from [2] or 4]. A good tutorial for are an MS Windows user, you can download the command line tool from [2] or 4]. A good tutorial for are an MS Windows user, you can download the command line tool from [2] or 4]. A good tutorial for are an MS Windows user, you can download the command line tool from [2] or 4]. A good tutorial for are an MS Windows user, you can download the command line tool from [2] or 4]. A good tutorial for are an MS Windows user, you can download the command line tool from [2] or 4]. A good tutorial for are an MS Windows user, you can download the command line tool from [2] or 4]. A good tutorial for are an MS Windows user, you can download the command line tool from [2] or 4]. A good tutorial for are an MS Windows user, you can download the command line tool from [2] or 4]. A good tutorial for are an MS Windows user, you can download the command line tool from [2] or 4]. A good tutorial for are an MS Windows user, you can download the command line tool from [2] or 4]. A good tutorial for are an MS Windows user, you can download the command line tool from [2] or 4]. A good tutorial for are an MS Windows user, you can download the command line tool from [2] or 4]. A good tutorial for are an MS Windows user, you can download the command line tool from [2] or 4]. A good tutorial for are an MS Windows user, you can download the command line tool from [2] or 4]. A good tutorial for are an MS Windows user, you can download the command line tool from [2] or 4]. A good tutorial for are an MS Windows user, you can download the command line tool from [2] or 4]. A good tutorial for are an MS Windows user, you can download the command line tool from [2] or 4]. A good tutorial for are an MS Windows user, you can download the command line tool from [2] or 4]. A good tutorial for are an MS Windows user, you can download the command line tool from [2] or 4]. A good tutorial for are an MS Windows user, you can download the command line tool from [2] or 4]. A good tutorial for are an MS Windows user, you can download the command line tool from [2] or 4]. A good tutorial for are an MS Windows user, you can download the command line tool from [2] or 4]. A good tutorial for are an MS Windows user, you can download the command line tool from [2] or 4]. A good tutorial for are an MS Windows user, you can download the command line tool from [2] or 4]. A good tutorial for are an MS Windows user, you can download the command line tool from [2] or 4]. A good tutorial for are an MS Windows user, you can download the command line tool from [2] or 4]. A good tutorial for are an MS Windows user, you can download the command line tool from [2] or 4]. A good tutorial for are an MS Windows user, you can download the command line tool from [2] or 4]. A good tutorial for are an MS Windows user, you can download the command line tool from [2] or 4]. A good tutorial for are an MS Windows user, you can download the command line tool from [2] or 4]. A good tutorial for are an MS Windows user, you can download the command line tool from [2] or 4]. A good tutorial for are an MS Windows user, you can download the command line tool from [2] or 4]. A good tutorial for are an MS Windows user, you can download the command line tool from [2] or 4]. A good tutorial for are an MS Windows user, you can download the command line tool from [2] or 4]. A good tutorial for are an MS Windows user, you can download the command line tool from [2] or 4]. A good tutorial for are an MS Windows user, you can download the command line tool from [2] or 4]. A good tutorial for are an MS Windows user, you can download the command line tool from [2] or 4]. A good tutorial for are an MS Windows user, you can download the command line tool from [2] or 4]. A good tutorial for are an MS Windows user, you can download the command line tool from [2] or 4]. A good tutorial for are an MS Windows user, you can download the command line tool from [2] or 4]. A good tutorial for are an MS Windows user, you can download the command line tool from [2] or 4]. A good tutorial for are an MS Windows user, you can download the command line tool from [2] or 4]. A good tutorial for are an MS Windows user, you can download the command line tool from [2] or 4]. A good tutorial for are an MS Windows user, you can download the command line tool from [2] or 4]. A good tutorial for are an MS Windows user, you can download the command line tool from [2] or 4]. A good tutorial for are an MS Windows user, you can download the command line tool from [2] or 4]. A good tutorial for using the basic OpenSSL command lines can be found in [3] using the basic OpenSSL command lines can be found in [3] using the basic OpenSSL command lines can be found in [3] using the basic OpenSSL command lines can be found in [3] using the basic OpenSSL command lines can be found in [3] using the basic OpenSSL command lines can be found in [3]using the basic OpenSSL command lines can be found in [3]using the basic OpenSSL command lines can be found in [3] using the basic OpenSSL command lines can be found in [3] using the basic OpenSSL command lines can be found in [3]using the basic OpenSSL command lines can be found in [3] using the basic OpenSSL command lines can be found in [3] using the basic OpenSSL command lines can be found in [3] using the basic OpenSSL command lines can be found in [3]using the basic OpenSSL command lines can be found in [3] using the basic OpenSSL command lines can be found in [3]using the basic OpenSSL command lines can be found in [3]using the basic OpenSSL command lines can be found in [3] using the basic OpenSSL command lines can be found in [3]using the basic OpenSSL command lines can be found in [3] Openssl provides a command mode where you can interact with the API; this mode can be used (after installing openssl) by simply typing openssl at the command line. In order to check how to use the various commands, simply type openssl -help on the command line (or simply type -help if you have accessed the OpenSSL command prompt (openssl>)). Unix/Linux users can also get further information by using the man command (e.g. man enc). The OpenSSL [1] website is also very helpful to get additional information about the different available commands. Part 1: Symmetric encryptionPart 1: Symmetric encryptionPart 1: Symmetric encryption Part 1: Symmetric encryption Part 1: Symmetric encryptionPart 1: Symmetric encryptionPart 1: Symmetric encryptionPart 1: Symmetric encryption Part 1: Symmetric encryption Part 1: Symmetric encryption Part 1: Symmetric encryptionPart 1: Symmetric encryptionPart 1: Symmetric encryption 1. The command that allows you to use symmetric encryption is enc command (by typing enc -help, you get all the associated options). In this part, you will play with various encryption algorithms and modes. You will proceed as follows: A. Create a file named file__ where should be replaced by your name and with your student ID. Fill this file with your name, your student ID and any additional information of your choice (1 mark) B. Encrypt the file using the enc command line tool; you can select the algorithm of your choice. You will be prompted to enter the password (and confirm it). Explain the different steps (3 marks) 2. Decrypt the ciphertext produced in question 1(using the same password of course). (3 marks) 3. Decrypt a ciphertext using a wrong password. What do you observe? Explain it (you can refer to internet resources to explain the output you had) (4 marks) T325 - TMA – Fall 2015 4/4 Part 2: Hash Part 2: Hash Part 2: Hash Part 2: Hash Part 2: Hash Part 2: Hash Part 2: Hash functions functionsfunctionsfunctions 1. Create a text message like “Hi, this is . My ID is . This is a trial message to test digest functions!”, save it in a file named msg__, and calculate its digest using the following hash algorithms: MD5, SHA1, SHA-256. Choose the output in binary format. (4 marks) 2. Now try to modify the message (e.g. delete the “!” at the end of the message) and recalculate the digest. (3 marks) What do you note when you compare the (above) two digests for a given hash function (you can use any hexadecimal editor for this purpose)? Explain it. (2 marks) 3. If you apply the hash function a second time to the result (digest), what is the size of the second result? Explain it. (4 marks) 4. If you give MD5 input a file/text with a size of 14 bytes (you can use Openssl rand command to create a random file of given size or any other file editor), what is the result obtained after hashing this file? (4 marks) ChecklistChecklist ChecklistChecklistChecklistChecklistChecklist Make sure that your answer to the question satisfies all the following requirements: - provide - for each question - ALL the screenshots showing the commands you have used and the outputs of these commands - Attach the files generated in Part 1 and Part 2 to the TMA file - Answer the questions raised in each part. References References References References [1] Openssl project website, URL: http://www.openssl.org, Last accessed on September 5, 2015 [2] Shining light productions, “Win32 OpenSSL”, URL: http://slproweb.com/products/Win32OpenSSL.html, Last accessed on: September 5, 2015 [3] Philippe Camacho, “An Introduction to the OpenSSL command line tool”, URL: http://users.dcc.uchile.cl/~pcamacho/tutorial/crypto/openssl/openssl_intro.html, Last accessed on : September 5, 2015 [4] OpenSSL for Windows, URL: http://gnuwin32.sourceforge.net/packages/openssl.htm , Last accessed on September 5, 2015 | |
|