{"id":668,"date":"2024-11-27T02:31:04","date_gmt":"2024-11-27T02:31:04","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/?page_id=668"},"modified":"2024-11-27T03:25:29","modified_gmt":"2024-11-27T03:25:29","slug":"cs-463-cryptography-for-cybersecurity","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/cs-463-cryptography-for-cybersecurity\/","title":{"rendered":"CS 463 Cryptography for Cybersecurity"},"content":{"rendered":"\n<p>A collection of homework assignments which demonstrate the mathematical knowledge required for computer operations such as encryption\/decryption, symmetric\/asymmetric cryptography, and key exchange. <\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-edwin-wells-e-portfolio wp-block-embed-edwin-wells-e-portfolio\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"xMsrNeTft8\"><a href=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/670-2\/\">Modular Arithmetic Foundations<\/a><\/blockquote><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Modular Arithmetic Foundations&#8221; &#8212; Edwin Wells E-Portfolio\" src=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/670-2\/embed\/#?secret=4d1x6i40Bg#?secret=xMsrNeTft8\" data-secret=\"xMsrNeTft8\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><figcaption class=\"wp-element-caption\">Foundational arithmetic for all of cryptography<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-edwin-wells-e-portfolio wp-block-embed-edwin-wells-e-portfolio\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"RkbIKCpvLx\"><a href=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/prime-fields-and-aes-substitution\/\">Prime Fields and AES Substitution<\/a><\/blockquote><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Prime Fields and AES Substitution&#8221; &#8212; Edwin Wells E-Portfolio\" src=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/prime-fields-and-aes-substitution\/embed\/#?secret=Weu9sR0KlE#?secret=RkbIKCpvLx\" data-secret=\"RkbIKCpvLx\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><figcaption class=\"wp-element-caption\">Mathematics for symmetric cryptography<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-edwin-wells-e-portfolio wp-block-embed-edwin-wells-e-portfolio\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"KbNZOHWbej\"><a href=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/mathematical-foundations-for-public-key-cryptography\/\">Mathematical Foundations for Public Key Cryptography<\/a><\/blockquote><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Mathematical Foundations for Public Key Cryptography&#8221; &#8212; Edwin Wells E-Portfolio\" src=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/mathematical-foundations-for-public-key-cryptography\/embed\/#?secret=qGF6zZEvrY#?secret=KbNZOHWbej\" data-secret=\"KbNZOHWbej\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><figcaption class=\"wp-element-caption\">Mathematics for asymmetric cryptography<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-edwin-wells-e-portfolio wp-block-embed-edwin-wells-e-portfolio\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"shujsQB6aQ\"><a href=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/public-key-cryptography-diffie-hellman-and-elgamal-encryption-schemes\/\">Public Key Cryptography: Diffie-Hellman and Elgamal Encryption Schemes<\/a><\/blockquote><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Public Key Cryptography: Diffie-Hellman and Elgamal Encryption Schemes&#8221; &#8212; Edwin Wells E-Portfolio\" src=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/public-key-cryptography-diffie-hellman-and-elgamal-encryption-schemes\/embed\/#?secret=onUxNIpOOt#?secret=shujsQB6aQ\" data-secret=\"shujsQB6aQ\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><figcaption class=\"wp-element-caption\">Mathematics for public key exchange<\/figcaption><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>A collection of homework assignments which demonstrate the mathematical knowledge required for computer operations such as encryption\/decryption, symmetric\/asymmetric cryptography, and key exchange.<\/p>\n","protected":false},"author":25223,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-json\/wp\/v2\/pages\/668"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-json\/wp\/v2\/users\/25223"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-json\/wp\/v2\/comments?post=668"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-json\/wp\/v2\/pages\/668\/revisions"}],"predecessor-version":[{"id":701,"href":"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-json\/wp\/v2\/pages\/668\/revisions\/701"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-json\/wp\/v2\/media?parent=668"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}