其他分享
首页 > 其他分享> > CE235 Computer Security

CE235 Computer Security

作者:互联网


CE235 Computer Security Assignment 3

The assignment is worth 7.5% of the total mark for this module. This assignment involves writing a C/C++ program for task 1 described below. The purpose of this assignment is for you to get a good understanding of the SHA-256.

The task:

Task 1 (7.5%)
Read the description and the pseudocode of SHA-256 at https://en.wikipedia.org/wiki/SHA-2 and develop the program called ConsoleSHA.cpp (which will be later renamed to CE235A3.cpp). Your program needs to be able to take an input and show the resulting hash value.

The program should contain brief comments describing the main block of the program, and the program should be laid out neatly with consistent indentation.

Assessment criteria:
Correctness of program 50%
Quality of program 25%
Clarity of program and comments 25%

Submission
You are required to submit the source code files (CE235A3.cpp). All of the files should be placed in a single folder which should then be zipped for submission to the coursework submission system (FASER), i.e. the submission should be a single file in zip format.

After you complete your programs, you should demonstrate them to the module supervisor.

Late submission and plagiarism
This assignment is to be done individually, i.e. whatever you submit must be your own individual work. Any software or any other materials that you use in this assignment, whether previously published or not, must be referred to and properly acknowledged. Please be aware that the module supervisor may ask students for an interview to explain their submitted work.

Please refer to the Undergraduate Students’ Handbook for details of the School policy regarding late submission and University regulations regarding plagiarism:
http://www.essex.ac.uk/ldev/resources/plagiarism/default.aspx
http://www.essex.ac.uk/about/governance/policies/academic-offences.aspx

因为专业,所以值得信赖。如有需要,请加QQ:99515681 或 微信:codehelp

标签:CE235,submission,Computer,assignment,module,should,SHA,program,Security
来源: https://www.cnblogs.com/studydotnet2/p/12040058.html