CYSE 463

This course focused on the mathematical foundations and practical applications of modern cryptography. I gained experience with cryptographic protocols and algorithms such as DES, AES, stream ciphers, hash functions, and digital signatures. Key topics included secure key generation and management, number theory, prime number generation, and the application of encryption techniques in real-world cybersecurity systems.

Skills

  1. Implementation and analysis of cryptographic algorithms (AES, DES, hash functions)
  2. Key generation, key exchange, and secure key management practices
  3. Understanding of mathematical foundations (number theory, prime generation, factoring)
  4. Analytical thinking in high-complexity problem solving
  5. Precision and accuracy in protocol implementation
  6. Security-focused decision-making in technical environments

Experience

Skill Highlighted: Understanding of Mathematical Foundations (Number Theory, Prime Generation, Factoring)
Also Demonstrates:
Key Generation and Secure Key Management PracticesPrecision and Accuracy in Protocol ImplementationAnalytical Thinking in High-Complexity Problem Solving

This artifact reflects my ability to apply number theory and prime factorization techniques in the manual implementation of cryptographic algorithms. I demonstrated foundational skills in calculating modular inverses, key generation steps, and mathematical functions central to public-key encryption methods. The work demanded precision and accuracy, showcasing both problem-solving and cryptographic literacy essential for secure system design and audit-readiness in professional environments.

cs-463-1

Skill Highlighted: Implementation and Analysis of Cryptographic Algorithms (AES, DES, Hash Functions)
Also Demonstrates:
Precision and Accuracy in Protocol ImplementationSecurity-Focused Decision-Making in Technical Environments

This artifact contains bonus code implementations related to core cryptographic functions. The task required translating cryptographic theory into functional code with attention to logical structure, syntax, and accuracy. This work reflects my ability to code and analyze secure systems at the protocol level, manage detailed algorithmic processes, and troubleshoot implementations within high-stakes cybersecurity applications.

cs-463-3-code-bonus

Skill Highlighted: Implementation and analysis of cryptographic algorithms (AES, DES, hash functions)
Also Demonstrates:
Key generation and secure key management,
Understanding of mathematical foundations,
Analytical thinking in high-complexity problem solving,
Precision and accuracy in protocol implementation,
Security-focused decision-making in technical environments

This research paper explores blockchain architecture and its reliance on cryptographic principles to secure digital currencies. I analyzed how hash functions, Merkle trees, and public-key encryption support data integrity, authentication, and transaction security. The paper includes comparisons between consensus protocols (Proof-of-Work and Proof-of-Stake), real-world blockchain applications (Bitcoin, Ethereum, and El Salvador’s national policy), and upcoming scalability technologies. This artifact demonstrates my ability to connect technical precision with broader security implications in modern cryptographic systems.

cs-463

Skill Highlighted: Understanding of mathematical foundations (number theory, prime generation, factoring)
Also Demonstrates:
Implementation and analysis of cryptographic algorithms,
Analytical thinking in high-complexity problem solving,
Precision and accuracy in protocol implementation

This handwritten assignment consists of detailed step-by-step solutions involving modular arithmetic, prime number generation, and RSA-based encryption logic. It demonstrates my ability to manually work through complex cryptographic problems using number theory and related concepts. The clarity and structure of the responses reflect not only technical proficiency but also precision in protocol implementation and methodical reasoning—essential skills in cryptographic engineering.

463