Communication Assignment Sample For Singapore Students
Posted on: 13th Nov 2022

FIN387 Financial Cryptography SUSS Assignment Sample Singapore

The FIN387 Financial Cryptography course is designed for students who want to learn about the use of cryptography in finance. The course covers topics such as digital signatures, elliptic curve cryptography, and secure multiparty computation. The course also covers applications of cryptography in finance, such as electronic voting, electronic commerce, and auction protocols. In this course, students will learn about the design and analysis of cryptographic algorithms, and about the security of crypto-systems. By the end of the course, students should be able to understand and apply cryptographic techniques to solve problems in finance.

Take a Look at PreWritten SUSS FIN387 Financial Cryptography Assignment Answers in Singapore is a reputable online platform that provides academic assistance to students in Singapore. They offer a wide range of services, including assignment writing, essay writing, and exam preparation. One of the subjects they cater to is FIN387, which covers Financial Cryptography.

We offer FIN387 assignment example that can be utilized for reference and guidance. These pre-written answers are specifically tailored to assist students with their assignments in FIN387. They cover various aspects of the course, including topics related to FIN387 TMA1 (TUTOR-MARKED ASSIGNMENT 1), FIN387 TMA2 (TUTOR-MARKED ASSIGNMENT 2), and the FIN387 written exam.

Assignment Activity 1: Formulate security objectives, threat models and identify the defence mechanism.

Modern cryptography is based on the assumption that Shor’s Algorithm, an algorithm for integer factorization, cannot be implemented on a classical computer. However, this assumption may no longer be valid in the future, when quantum computers become available. Financial cryptography is the application of cryptography in the financial sector. It is used to ensure the privacy of financial transactions and to prevent fraud.

One of the main security objectives of financial cryptography is to ensure that information is not leaked to unauthorized parties. This can be achieved by using encryption techniques to protect data from being accessed by unauthorized individuals. Another security objective is to prevent fraud by ensuring that transactions are authenticated and that only authorized parties can access account information.

A threat model is a conceptual model that identifies potential threats to a system. In financial cryptography, the threat model includes attacks that aim to compromise the security of cryptographic algorithms or steal information from financial institutions.

One defence mechanism against attacks on cryptographic algorithms is to use quantum-resistant algorithms. These are algorithms that are resistant to being broken by quantum computers.

Another defence mechanism is to use multi-party computation, which is a technique that allows multiple parties to compute a function without revealing their inputs to each other. This can be used to prevent fraudsters from being able to access sensitive information.

Assignment Activity 2: Analyse data integrity protection in FinTech and blockchain applications.

Data integrity protection is important in FinTech and blockchain applications because it helps to ensure that data has not been tampered with or corrupted. There are a number of ways to protect data integrity, such as using digital signatures or hash functions.

Digital signatures are a way of verifying the authenticity of a message or document. They can be used to ensure that a financial transaction has not been tampered with.

Hash functions are mathematical algorithms that take a message of any size and produce a fixed-size output. Hash functions can be used to verify the integrity of data, as well as to create unique identifiers for data.

Blockchain technology can also be used to protect data integrity. Blockchain is a distributed database that allows multiple parties to share data without the need for a central authority. Each block in the chain contains a cryptographic hash of the previous block, which ensures that the data in the chain cannot be tampered with.

Assignment Activity 3: Examine the usage of public key cryptography in centralised and decentralised settings.

Public key cryptography can be used in both centralised and decentralised settings.

  • In a centralised setting, there is a single authority that controls the distribution of keys. This authority can be used to authenticate users and verify the integrity of data.
  • In a decentralised setting, there is no central authority and keys are distributed among a group of users. This can be used to create a more secure system, as there is no single point of failure.

Public key cryptography can be used to encrypt and decrypt data, as well as to sign and verify digital signatures. It is an important tool for protecting information in both centralised and decentralised settings.

Assignment Activity 4: Appraise security objectives and threat models of centralised and decentralised applications.

When it comes to security objectives and threat models, there are pros and cons to both centralised and decentralised applications.

With a centralised application, all data is stored in one location and is accessible by authorised users. This makes it easy for administrators to keep track of all activity, manage user permissions, and make changes or updates as needed. However, if the central server is compromised, all data is vulnerable.

Decentralised applications spread data across multiple servers that are not controlled by a single entity. This makes them more secure as there is no single point of failure. However, it can be more difficult to manage user permissions and updates when there are multiple servers involved.

It is important to weigh the pros and cons of both centralised and decentralised applications when it comes to security objectives and threat models. Depending on the needs of the application, one may be more suitable than the other.

Assignment Activity 5: Contrast different privacy protection techniques and assess the need for user privacy in existing FinTech and blockchain applications.

There are a number of privacy protection techniques that can be used in FinTech and blockchain applications. These include using encryption, obscuring data, and using access control mechanisms.

Encryption is a process of transforming readable data into an unreadable format. This can be used to protect the privacy of data, as well as to verify the integrity of data.

Obscuring data makes it more difficult to read or understand. This can be used to protect the privacy of data, as well as to make it more difficult for unauthorized users to access data.

Access control mechanisms restrict access to data based on a user’s privileges. This can be used to protect the privacy of data, as well as to ensure that only authorized users can access data.

User privacy is an important consideration when it comes to FinTech and blockchain applications. These applications deal with sensitive information, such as financial data, and it is important to protect the privacy of users. There are a number of techniques that can be used to protect user privacy, and it is important to choose the right one for the application.

Assignment Activity 6: Develop simple Python programs using the crypto library.

The crypto library is a cryptography toolkit included in the Python standard library. It provides cryptographic algorithms and primitives, as well as facilities for managing keys and certificates.

The crypto module provides functionality for hashing, symmetric-key cryptography, and public-key cryptography. Hashing algorithms are used to compute a digest of a value, while symmetric-key algorithms use the same key to encrypt and decrypt data. Public-key algorithms use two separate keys: one to encrypt data and one to decrypt it.

The following code shows how to use the crypto module to hash some text:

import Crypto

hash_string = Crypto.hash(“Hello world!”)


In this example, the Crypto module is imported and used to hash the string “Hello world!”. The resulting hash is then printed.

The following code shows how to use the crypto module to encrypt and decrypt some text:

import Crypto

key = Crypto.generate_random_bytes(16)

ciphertext = Crypto.encrypt(“Hello world!”, key)


plaintext = Crypto.decrypt(ciphertext, key)


In this example, the Crypto module is imported and used to generate a random key. This key is then used to encrypt the string “Hello world!”. The resulting ciphertext is then printed. The key is then used to decrypt the ciphertext, and the resulting plaintext is printed.

Hire our expert writers to complete your FIN387 Financial Cryptography assignments and alleviate your academic stress!

The assignment sample discussed above is based on FIN387 Financial Cryptography. If you are looking for expert Singaporean writers to complete your assignments then you have come to the right place!

We have a team of highly skilled and experienced assignment writers Singapore who can provide you with top-notch quality work within the shortest time possible. We understand the importance of timely delivery and therefore we always make sure that your work is delivered to you well within the deadline.

Our dissertation writing services are available round the clock so you can contact us anytime you want. We understand that students have a lot of other commitments and they may not always be able to meet our deadlines. Therefore, we offer flexible deadline options so that you can choose a time that is convenient for you.

We also offer essay writing services so that you can get your essays written by our expert writers. We understand the importance of high-quality essays and therefore we always make sure that your work is of the highest quality.

At, you can also access a number of assignment samples like FIN303 Financial Management Assignment Sample for free. Hurry up and hire our expert writers now! You won’t regret it!

No Need To Pay Extra
  • Turnitin Report

  • Proofreading and Editing

    Per Page
  • Consultation with Expert

    Per Hour
  • Live Session 1-on-1

    Per 30 min.
  • Quality Check

  • Total

New Special Offer

Get 30% Off


Get Your Assignment Completed At Lower Prices

Plagiarism Free Solutions
100% Original Work
24*7 Online Assistance
Native PhD Experts
Hire a Writer Now
My Assignment Help SG Services
My Assignment Help SG

Rated 4.9/5 Based on 22945 Singaporean Students