{"id":294,"date":"2026-03-09T00:19:18","date_gmt":"2026-03-09T00:19:18","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/kennethfearsiii\/?page_id=294"},"modified":"2026-03-09T00:19:18","modified_gmt":"2026-03-09T00:19:18","slug":"cryptography-for-cybersecurity-cs-463-563","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/kennethfearsiii\/cryptography-for-cybersecurity-cs-463-563\/","title":{"rendered":"Cryptography for Cybersecurity (CS 463\/563)"},"content":{"rendered":"\n<h3 class=\"wp-block-heading\">Course Overview<\/h3>\n\n\n\n<p>This course explored the mathematical and technical foundations of modern cryptography and how encryption is used to secure digital communication. The class focused on the principles behind encryption algorithms, authentication methods, and cryptographic protocols used in real-world cybersecurity systems.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Key Concepts Learned<\/h3>\n\n\n\n<p>Throughout this course, I learned how cryptographic systems protect information and maintain data confidentiality and integrity. Topics included modular arithmetic, public key encryption, digital signatures, and hash functions. We also explored how cryptography is applied in modern security technologies.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Skills Developed<\/h3>\n\n\n\n<p>\u2022 RSA encryption and key generation<br>\u2022 Modular arithmetic and number theory used in cryptography<br>\u2022 Hash functions and message authentication<br>\u2022 Elliptic curve cryptography concepts<br>\u2022 Cryptographic analysis of cyberattacks<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Example Work<\/h3>\n\n\n\n<p>One of the major assignments involved analyzing the <strong>Colonial Pipeline ransomware attack<\/strong> and explaining how cryptographic systems can both protect infrastructure and be abused by attackers. Other assignments required solving encryption problems and applying mathematical concepts to real-world cybersecurity scenarios.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Reflection<\/h3>\n\n\n\n<p>This course strengthened my understanding of how encryption protects sensitive information and why cryptography is critical for cybersecurity. It also helped me develop problem-solving skills by applying mathematical concepts to security challenges.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Course Overview This course explored the mathematical and technical foundations of modern cryptography and how encryption is used to secure digital communication. The class focused on the principles behind encryption algorithms, authentication methods, and cryptographic protocols used in real-world cybersecurity&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/kennethfearsiii\/cryptography-for-cybersecurity-cs-463-563\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":25039,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/kennethfearsiii\/wp-json\/wp\/v2\/pages\/294"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/kennethfearsiii\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/kennethfearsiii\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kennethfearsiii\/wp-json\/wp\/v2\/users\/25039"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kennethfearsiii\/wp-json\/wp\/v2\/comments?post=294"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/kennethfearsiii\/wp-json\/wp\/v2\/pages\/294\/revisions"}],"predecessor-version":[{"id":295,"href":"https:\/\/sites.wp.odu.edu\/kennethfearsiii\/wp-json\/wp\/v2\/pages\/294\/revisions\/295"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/kennethfearsiii\/wp-json\/wp\/v2\/media?parent=294"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}