{"id":348,"date":"2026-04-18T00:23:53","date_gmt":"2026-04-18T00:23:53","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jadynrichardson\/?page_id=348"},"modified":"2026-04-18T03:25:49","modified_gmt":"2026-04-18T03:25:49","slug":"cs-463-cryptography-for-cybersecurity","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/jadynrichardson\/cs-463-cryptography-for-cybersecurity\/","title":{"rendered":"CS 463 &#8211; Cryptography for Cybersecurity"},"content":{"rendered":"\n<p>After completing this 3-credit course, students should have strong mathematical foundations including information theory, number theory, factoring, and prime number generation; cryptographic protocols including basic building blocks and protocols; cryptographic techniques including key generation and key management, and applications; cryptographic algorithms including DES, AES, Stream Ciphers, Hash functions, digital signatures, and more.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Course Objectives<\/h3>\n\n\n\n<p>Upon successful completion of this course, students will:<\/p>\n\n\n\n<ol>\n<li>Recognize the general purpose and goals of the online course<\/li>\n\n\n\n<li>Explain functionality of current cryptographic techniques<\/li>\n\n\n\n<li>Identify basic mathematical techniques underlying cryptology<\/li>\n\n\n\n<li>Evaluate the computational and memory needs of cryptographic techniques<\/li>\n\n\n\n<li>Measure the security strengths and risks of cryptographic techniques<\/li>\n\n\n\n<li>Discern implications of hardware and software implementations of cryptographic techniques<\/li>\n\n\n\n<li>Analyze and critique new cryptographic protocols<\/li>\n\n\n\n<li>Analyze applications in terms of security needs<\/li>\n\n\n\n<li>Match the security needs of application with appropriate cryptographic techniques<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\">Course Materials<\/h2>\n\n\n\n<p>Stream ciphers and DES<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/jadynrichardson\/wp-content\/uploads\/sites\/34320\/2026\/04\/hw3-4.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of hw3-4.\"><\/object><a id=\"wp-block-file--media-de195b94-91d2-47c8-8a5e-fdd237b7c2f5\" href=\"https:\/\/sites.wp.odu.edu\/jadynrichardson\/wp-content\/uploads\/sites\/34320\/2026\/04\/hw3-4.pdf\">hw3-4<\/a><a href=\"https:\/\/sites.wp.odu.edu\/jadynrichardson\/wp-content\/uploads\/sites\/34320\/2026\/04\/hw3-4.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-de195b94-91d2-47c8-8a5e-fdd237b7c2f5\">Download<\/a><\/div>\n\n\n\n<p>AES<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/jadynrichardson\/wp-content\/uploads\/sites\/34320\/2026\/04\/hw4.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of hw4.\"><\/object><a id=\"wp-block-file--media-8763f44b-8fc7-4be0-94b2-29d4b6607b62\" href=\"https:\/\/sites.wp.odu.edu\/jadynrichardson\/wp-content\/uploads\/sites\/34320\/2026\/04\/hw4.pdf\">hw4<\/a><a href=\"https:\/\/sites.wp.odu.edu\/jadynrichardson\/wp-content\/uploads\/sites\/34320\/2026\/04\/hw4.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-8763f44b-8fc7-4be0-94b2-29d4b6607b62\">Download<\/a><\/div>\n\n\n\n<p>More on Block Ciphers<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/jadynrichardson\/wp-content\/uploads\/sites\/34320\/2026\/04\/hw5.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of hw5.\"><\/object><a id=\"wp-block-file--media-dd8ca5eb-c8ad-42bf-9270-e99703e6fd2b\" href=\"https:\/\/sites.wp.odu.edu\/jadynrichardson\/wp-content\/uploads\/sites\/34320\/2026\/04\/hw5.pdf\">hw5<\/a><a href=\"https:\/\/sites.wp.odu.edu\/jadynrichardson\/wp-content\/uploads\/sites\/34320\/2026\/04\/hw5.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-dd8ca5eb-c8ad-42bf-9270-e99703e6fd2b\">Download<\/a><\/div>\n\n\n\n<p>PKI, RSA<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/jadynrichardson\/wp-content\/uploads\/sites\/34320\/2026\/04\/hw6.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of hw6.\"><\/object><a id=\"wp-block-file--media-f8b9f7e8-4a19-4c58-8760-46c2f3e51e24\" href=\"https:\/\/sites.wp.odu.edu\/jadynrichardson\/wp-content\/uploads\/sites\/34320\/2026\/04\/hw6.pdf\">hw6<\/a><a href=\"https:\/\/sites.wp.odu.edu\/jadynrichardson\/wp-content\/uploads\/sites\/34320\/2026\/04\/hw6.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-f8b9f7e8-4a19-4c58-8760-46c2f3e51e24\">Download<\/a><\/div>\n\n\n\n<p>Diffie-Hellman, Elgamal<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/jadynrichardson\/wp-content\/uploads\/sites\/34320\/2026\/04\/hw7.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of hw7.\"><\/object><a id=\"wp-block-file--media-877e5766-20e2-416d-b37b-e8b7131febda\" href=\"https:\/\/sites.wp.odu.edu\/jadynrichardson\/wp-content\/uploads\/sites\/34320\/2026\/04\/hw7.pdf\">hw7<\/a><a href=\"https:\/\/sites.wp.odu.edu\/jadynrichardson\/wp-content\/uploads\/sites\/34320\/2026\/04\/hw7.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-877e5766-20e2-416d-b37b-e8b7131febda\">Download<\/a><\/div>\n\n\n\n<p>Elliptic Curves<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/jadynrichardson\/wp-content\/uploads\/sites\/34320\/2026\/04\/hw9-2-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of hw9-2-1.\"><\/object><a id=\"wp-block-file--media-a75dda60-d97f-4fc1-8d51-b4ef1066a65f\" href=\"https:\/\/sites.wp.odu.edu\/jadynrichardson\/wp-content\/uploads\/sites\/34320\/2026\/04\/hw9-2-1.pdf\">hw9-2-1<\/a><a href=\"https:\/\/sites.wp.odu.edu\/jadynrichardson\/wp-content\/uploads\/sites\/34320\/2026\/04\/hw9-2-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-a75dda60-d97f-4fc1-8d51-b4ef1066a65f\">Download<\/a><\/div>\n\n\n\n<p>Digital Signatures and Message Authentication codes<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/jadynrichardson\/wp-content\/uploads\/sites\/34320\/2026\/04\/hw10.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of hw10.\"><\/object><a id=\"wp-block-file--media-64464aa5-de1d-43f9-8a39-fa9519193430\" href=\"https:\/\/sites.wp.odu.edu\/jadynrichardson\/wp-content\/uploads\/sites\/34320\/2026\/04\/hw10.pdf\">hw10<\/a><a href=\"https:\/\/sites.wp.odu.edu\/jadynrichardson\/wp-content\/uploads\/sites\/34320\/2026\/04\/hw10.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-64464aa5-de1d-43f9-8a39-fa9519193430\">Download<\/a><\/div>\n\n\n\n<p>Hash Functions<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/jadynrichardson\/wp-content\/uploads\/sites\/34320\/2026\/04\/hw11-1-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of hw11-1-1.\"><\/object><a id=\"wp-block-file--media-dbcd5ccd-6fb1-4b73-8682-0695a4e23507\" href=\"https:\/\/sites.wp.odu.edu\/jadynrichardson\/wp-content\/uploads\/sites\/34320\/2026\/04\/hw11-1-1.pdf\">hw11-1-1<\/a><a href=\"https:\/\/sites.wp.odu.edu\/jadynrichardson\/wp-content\/uploads\/sites\/34320\/2026\/04\/hw11-1-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-dbcd5ccd-6fb1-4b73-8682-0695a4e23507\">Download<\/a><\/div>\n\n\n\n<p>Key generation and management<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/jadynrichardson\/wp-content\/uploads\/sites\/34320\/2026\/04\/hw12-1-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of hw12-1-1.\"><\/object><a id=\"wp-block-file--media-8f8ec7aa-43a5-4299-be25-4cb4a3f078a5\" href=\"https:\/\/sites.wp.odu.edu\/jadynrichardson\/wp-content\/uploads\/sites\/34320\/2026\/04\/hw12-1-1.pdf\">hw12-1-1<\/a><a href=\"https:\/\/sites.wp.odu.edu\/jadynrichardson\/wp-content\/uploads\/sites\/34320\/2026\/04\/hw12-1-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-8f8ec7aa-43a5-4299-be25-4cb4a3f078a5\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>After completing this 3-credit course, students should have strong mathematical foundations including information theory, number theory, factoring, and prime number generation; cryptographic protocols including basic building blocks and protocols; cryptographic techniques including key generation and key management, and applications; cryptographic algorithms including DES, AES, Stream Ciphers, Hash functions, digital signatures, and more. Course Objectives Upon&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/jadynrichardson\/cs-463-cryptography-for-cybersecurity\/\">Read More<\/a><\/div>\n","protected":false},"author":27592,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jadynrichardson\/wp-json\/wp\/v2\/pages\/348"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jadynrichardson\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jadynrichardson\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jadynrichardson\/wp-json\/wp\/v2\/users\/27592"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jadynrichardson\/wp-json\/wp\/v2\/comments?post=348"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/jadynrichardson\/wp-json\/wp\/v2\/pages\/348\/revisions"}],"predecessor-version":[{"id":427,"href":"https:\/\/sites.wp.odu.edu\/jadynrichardson\/wp-json\/wp\/v2\/pages\/348\/revisions\/427"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jadynrichardson\/wp-json\/wp\/v2\/media?parent=348"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}