📖 Uncategorized

This assignment evaluates your understanding of cryptographic techniques used to protect digital communication. You will explain, compare, and illustrate how symmetric and asymmetric encryption function and how both

OK Okoth · 📅 6 November 2025 · ⏱ 3 min read
✍️ Need help with this assignment? Get expert quotes in minutes — free to submit. ✍️ Get Writing Help FREE

BIT4213 Fundamental of Cryptography

INSTRUCTION:

  1. This is an INDIVIDUAL
  2. You are required to produce ONE (1) REPORT.
  3. The document file must be converted to .pdf and named 202509_BIT4213_A1_Your Name.
  4. This assignment contributes 20% of the total marks as a continuous assessment.
  5. Please answer by using your OWN WORDS based on your understanding.
  6. PLAGIARISM and COPYING are PROHIBITED. If there is any evidence of this and you are proven to practice plagiarism, action will be taken, and your marks will be deducted.
  7. You must submit the assignment on 6 November 2025 (Thursday) before

11.59 PM.

  1. Submission must be made to LMS.

REPORT FORMAT:

Font Type Arial  
Font Size Title / Heading Contents Header / Footer
14 11 9
Spacing 1.5 Lines  
Paragraphing Alignment Justified  
Page numbers Bottom Centre   
Report Sequences 1.  Cover Page (as per Appendix)

2.  Table of Content (TOC)

3.  Report Content

4.  References

 

***NOTE: Marks will be deducted if you do not follow the format and instructions.

Assignment 1- Understanding Cryptographic Techniques 

Overview

This assignment evaluates your understanding of cryptographic techniques used to protect digital communication. You will explain, compare, and illustrate how symmetric and asymmetric encryption function and how both can be combined in secure systems.

The report should demonstrate your ability to explain technical concepts clearly and apply them to practical cybersecurity contexts.

Learning Outcomes 

Upon completing this assignment, you will be able to:

  • Explain the key principles of symmetric and asymmetric encryption.
  • Compare and differentiate both encryption techniques with suitable examples.
  • Apply and illustrate how encryption methods are combined in secure communication systems.

Instructions

Prepare a short report that includes the following sections.

Use your own words, diagrams, and examples.

Report Structure

    • Define cryptography and its importance in information security.
    • Explain why encryption is essential for confidentiality, authentication, and integrity.
  1. Comparison of Symmetric and Asymmetric Encryption.
    • Use a table to summarize the differences between the two methods.
    • Write a short paragraph after the table describing when and why each method is suitable in practice (e.g., symmetric for speed, asymmetric for secure key exchange).
  2. Diagram and Explanation.
    • Draw and explain a simple diagram showing how both methods can be used together in secure communication (hybrid encryption).
  3. Your diagram should include:

    • Sender and receiver.
    • Symmetric and asymmetric key usage.
    • Encryption/decryption flow with labeled arrows.
    • Example algorithms (e.g., AES + RSA).

    3.2 Explanation:

    After drawing, explain how this hybrid method is used in a real-world application such as Secure web communication (HTTPS), Email encryption (PGP), Cloud storage encryption, etc.

    1. Conclusion Summarize:
    • The main differences between both encryption methods.
    • Why combining them provides stronger and faster secure communication.
    1. References

    Use APA 7th Edition format for any books, articles, or online sources.

    BIT4213 Assessment Rubric (20%)

    Criteria Description Marks
    1. Explanation and

    Comparison of

    Encryption

    Methods

    Clear, accurate explanation of symmetric and asymmetric encryption concepts, including key differences and examples of usage. 6
    2. Diagram and

    Explanation of

    Hybrid Encryption

    Well-labelled and detailed diagram showing the process of combining symmetric and asymmetric encryption. Includes clear explanation of data flow, key exchange, and decryption process. Demonstrates practical understanding of secure communication. 10
    3. Report

    Presentation and

    Structure

    Logical organization, clarity of writing, correct terminology, grammar, and professional formatting.

     

    4
    Total Marks

    Plagiarism Free Assignment Help

    Expert Help With This Assignment — On Your Terms

    • All subjects — UK, USA & Australia writers
    • 100% Plagiarism-Free — Turnitin report included
    • Deadline from 3 hours
    • Unlimited free revisions
    • Free to submit — compare quotes
    OK
    Okoth
    Academic Expert · EssayPanel

    Expert academic writer and education specialist helping students in the UK, USA, and Australia achieve their best results across all subjects.

    Need help with your own assignment?

    Our expert writers can help you apply everything you've just read — to your actual assignment, brief, and marking criteria.

    Get Expert Help Now →
    📝 Free Submission — No Card Required

    Need Help With This Assignment?

    Our verified experts deliver 100% original, plagiarism-free work to your exact brief and marking criteria. Submit free — compare quotes — choose your expert.

    Write My Assignment FREE Get A Free Quote →

    No credit card · No commitment · First quote in minutes