Cryptography for Cybersecurity (CS 463/563)
Course Overview
This course explored the mathematical and technical foundations of modern cryptography and how encryption is used to secure digital communication. The class focused on the principles behind encryption algorithms, authentication methods, and cryptographic protocols used in real-world cybersecurity systems.
Key Concepts Learned
Throughout this course, I learned how cryptographic systems protect information and maintain data confidentiality and integrity. Topics included modular arithmetic, public key encryption, digital signatures, and hash functions. We also explored how cryptography is applied in modern security technologies.
Skills Developed
• RSA encryption and key generation
• Modular arithmetic and number theory used in cryptography
• Hash functions and message authentication
• Elliptic curve cryptography concepts
• Cryptographic analysis of cyberattacks
Example Work
One of the major assignments involved analyzing the Colonial Pipeline ransomware attack and explaining how cryptographic systems can both protect infrastructure and be abused by attackers. Other assignments required solving encryption problems and applying mathematical concepts to real-world cybersecurity scenarios.
Reflection
This course strengthened my understanding of how encryption protects sensitive information and why cryptography is critical for cybersecurity. It also helped me develop problem-solving skills by applying mathematical concepts to security challenges.