Cryptography and Information Security

In this course, I've gained valuable insights into the crucial role of cryptographic techniques in ensuring the confidentiality and authenticity of information exchanged over insecure communication channels.

 
Private-key cryptography, a cornerstone of this field, emphasizes the importance of data security through secrecy and authenticity. This cryptographic method employs a single, confidential key for both encryption and decryption processes. The course has emphasized the critical need to safeguard this key to maintain the security of communication. 


Additionally, public-key cryptography has expanded my knowledge base by introducing asymmetric encryption techniques. This approach relies on a pair of keys, public and private, and plays a crucial role in securing communications over open channels. An in-depth exploration of algorithms such as RSA and ECC has highlighted the power of public-key cryptography in preserving data integrity and verifying the legitimacy of messages and entities.


Moreover, I've gained practical insights into deployed cryptography, which has illustrated the real-world application of cryptographic principles. This experience has reinforced the idea that cryptography is not solely theoretical but a vital tool in our digital age. Its significance spans from securing online transactions to protecting sensitive data within complex network architectures.

During this course, we were introduced to a variety of ciphers, such as Caesar, Affine, Hill, Substitution, Shift, and Vigenère. Each assignment required us to decipher ciphertexts using an assigned method. To demonstrate our understanding, we were instructed to create documents detailing our approach and methodology for decrypting the messages. This process not only reinforced our understanding of cryptographic techniques but also encouraged us to articulate and document our problem-solving strategies.

HW3CRYPT.pdf