Highlights
Q1. Symmetric Key Cryptosystem
In this task, you will demonstrate your understanding of symmetric key encryption and decryption techniques.
Assume that you want to send your RMIT Student Number to your friend. To ensure the security, both of you have decided to use symmetric key encryption and decryption techniques. Consider the numerical part of your RMIT Student Number as the plaintext (P) . For example, if your RMIT Student Number is S4123456 , then the value of P = 4123456 .
Please note that you must use your RMIT Student Number as plaintext. You and your friend have decided to use a shared secret key K which is a 6-bit binary string. Use K = 101011 as the shared secret key . Therefore, you need to use this value of K throughout this question.
Answer the following questions

Figure-1.a: Conversion RMIT Student Number into of binary plaintext segments from the original plain text

Public Key Cryptosystem
In this task, you need to exhibit your understanding of the Public Key Cryptosystem based Key Exchange Protocol . Assume that Alice and Bob want to establish a shared key using the Diffie-Hellman Key Exchange protocol . Trudy is a Man-in- the-Middle (MiM) . Answer the following questions in the context of the Diffie-Hellman Key Exchange protocol.
Please note that you do not need to propose any new techniques. Instead, use an existing method. With necessary diagram, show detailed calculations to justify the correctness of your prevention technique.
Q3. Implementing Firewall Rules using Iptables
In this task, you will demonstrate your knowledge of firewall using Iptables , a Linux command line utility to manage firewall . You are expected to do the following:
This It Computer Science have been solved by our PhD Experts at My Uni Paper. Our Assignment Writing Experts are efficient in providing a fresh solution to this question. We are serving more than 10000+ Students in Australia, the UK, and the US by helping them to score HD in their academics. Our Experts are well-trained to follow all marking rubrics and referencing styles.
Be it a used or new solution, the quality of the work submitted by our assignment experts remains unhampered. You may continue to expect the same or even better quality with the used and new assignment solution files respectively. There’s one thing to be noticed you could choose one between the two and acquire an HD either way. You could choose a new assignment solution file to get yourself an exclusive, plagiarism (with free Turnitin file), expert quality assignment or order an old solution file that was considered worthy of the highest distinction.
© Copyright 2026 My Uni Papers – Student Hustle Made Hassle Free. All rights reserved.