Submit the final version of your final product paper. It should be a complete, polished artifact containing all of the main elements of the
final product. It should reflect the incorporation of feedback gained throughout the course. You should pay particular attention to grammatical correctness,
succinctness and clarity.
The final project for this course is the creation of an analytical paper reviewing routes of attack on a modern cryptosystem.
Prompt: Identify a modern cryptosystem and analyze the potential routes of attack.
The analysis will contain the following critical elements:
Background/History: What is the history of the modern cryptosystem? Introduce the cipher and demonstrate your understanding of how the cipher
works.
Technical Analysis of Cryptographic Attack: Craft a thesis statement. Identify weaknesses and the potential attack.
Legal Issues: What legal issues could arise from an attack?
Application of Mathematics to Cryptography: Accurately apply mathematical principles to your analysis of thecipher.
Properties of the Algorithm: This paper is a summary of your work to understand a specific algorithm. When you start this assignment, you will most
likely not completely understand the process by which your selected cryptosystem works. Reading, thinking about, and understanding your selected
algorithm will require an investment in time prior to the initiation of writing this paper. Ensure that you budget your time accordingly
Technical Writing: Your ability to communicate your analysis using professional, technical writing will be part of the evaluation. Technical writing should
be clear, concise, and brief. Avoid any kind of literary embellishment. Be as direct as possible in your first draft. Six pages will be enough to provide a very
detailed analysis if the writing is clear.