{"id":71,"date":"2026-02-12T02:25:34","date_gmt":"2026-02-12T02:25:34","guid":{"rendered":"http:\/\/totesa.website\/student\/?page_id=71"},"modified":"2026-03-08T01:05:19","modified_gmt":"2026-03-08T01:05:19","slug":"significant-projects","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/joshua-bodie\/academics\/significant-projects\/","title":{"rendered":"Cryptography Analysis and Symmetric Encryption Concepts"},"content":{"rendered":"\n<p>This artifact demonstrates my understanding of fundamental cryptographic concepts used to protect digital information. In this assignment, I applied mathematical and analytical techniques to study symmetric encryption, pseudorandom generators, and pseudorandom functions. The work required careful reasoning and step-by-step calculations to understand how cryptographic algorithms generate secure outputs and protect communication systems.\u00a0<\/p>\n\n\n\n<p>One part of the assignment involved analyzing a\u00a0linear congruential generator (LCG)\u00a0and calculating the sequence of values produced by the generator using modular arithmetic. This exercise demonstrated how pseudorandom number generators operate and how predictable patterns can appear when generators rely on simple linear functions. Understanding these patterns is important because weak randomness can create vulnerabilities in cryptographic systems.\u00a0<\/p>\n\n\n\n<p>Another section required analyzing a\u00a05-bit Linear Feedback Shift Register (LFSR)\u00a0and determining the first 30 output bits as well as the period of the generator. This task showed how LFSRs produce pseudorandom sequences and how their internal structure affects the length of the generated sequence. The assignment also explored the weaknesses of linear generators and how attackers may predict outputs if the internal state is recovered.\u00a0<\/p>\n\n\n\n<p>The assignment also included a detailed analysis of the\u00a0DES f-function, where I expanded a 32-bit input to 48 bits, performed XOR operations with a subkey, applied S-box substitutions, and computed the final permutation output. This process illustrates the complexity of block cipher operations and how multiple transformations work together to secure encrypted data.\u00a0<\/p>\n\n\n\n<p>Overall, this artifact demonstrates my ability to apply\u00a0cryptographic theory, mathematical reasoning, and algorithmic analysis, which are essential skills for understanding how modern encryption systems protect sensitive information.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Skill: Cryptography and Secure Communication<\/h2>\n\n\n\n<p>because it demonstrates:<\/p>\n\n\n\n<ul>\n<li>modular arithmetic and cryptographic calculations<\/li>\n\n\n\n<li>pseudorandom generator analysis<\/li>\n\n\n\n<li>LFSR keystream generation<\/li>\n\n\n\n<li>DES block cipher operations<\/li>\n\n\n\n<li>Understanding cryptographic weaknesses<\/li>\n<\/ul>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/joshua-bodie\/wp-content\/uploads\/sites\/40771\/2026\/03\/Joshua-Bodie-hw3_6_tex.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Joshua-Bodie-hw3_6_tex.\"><\/object><a id=\"wp-block-file--media-39256a3f-1ee0-4388-abd6-8d210b59c903\" href=\"https:\/\/sites.wp.odu.edu\/joshua-bodie\/wp-content\/uploads\/sites\/40771\/2026\/03\/Joshua-Bodie-hw3_6_tex.pdf\">Joshua-Bodie-hw3_6_tex<\/a><a href=\"https:\/\/sites.wp.odu.edu\/joshua-bodie\/wp-content\/uploads\/sites\/40771\/2026\/03\/Joshua-Bodie-hw3_6_tex.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-39256a3f-1ee0-4388-abd6-8d210b59c903\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>This artifact demonstrates my understanding of fundamental cryptographic concepts used to protect digital information. In this assignment, I applied mathematical and analytical techniques to study symmetric encryption, pseudorandom generators, and pseudorandom functions. The work required careful reasoning and step-by-step calculations to understand how cryptographic algorithms generate secure outputs and protect communication systems.\u00a0 One part of&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/joshua-bodie\/academics\/significant-projects\/\">Read More<\/a><\/div>\n","protected":false},"author":26712,"featured_media":0,"parent":33,"menu_order":0,"comment_status":"closed","ping_status":"open","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/joshua-bodie\/wp-json\/wp\/v2\/pages\/71"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/joshua-bodie\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/joshua-bodie\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/joshua-bodie\/wp-json\/wp\/v2\/users\/26712"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/joshua-bodie\/wp-json\/wp\/v2\/comments?post=71"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/joshua-bodie\/wp-json\/wp\/v2\/pages\/71\/revisions"}],"predecessor-version":[{"id":268,"href":"https:\/\/sites.wp.odu.edu\/joshua-bodie\/wp-json\/wp\/v2\/pages\/71\/revisions\/268"}],"up":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/joshua-bodie\/wp-json\/wp\/v2\/pages\/33"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/joshua-bodie\/wp-json\/wp\/v2\/media?parent=71"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}