In this assignment students implement a basic security protocol in which a key is distributed to multiple parties such that a certain number of parties must combine their knowledge to learn the full key. In addition, this assignment reviews the concepts of random number generation and floating point numbers, as well as requiring students to design their own decomposition. It is particularly useful for students who need practice decomposing problems.
Make Interdisciplinary Connections to CS by inviting a colleague from the CS department that focuses on security to collaborate on the development and presentation of this assignment.
Relates the CS topics to real-world applications to Employ Meaningful and Relevant Content. Incorporates Student Choice by permitting the implementation of additional features for extra-credit.