Explorations and Applications of Modern Cryptology
Document Type
Oral Presentation
Campus where you would like to present
Ellensburg
Event Website
https://digitalcommons.cwu.edu/source
Start Date
16-5-2021
End Date
22-5-2021
Keywords
Cryptology, Mathematics, Encryption
Abstract
From as early as 400 BC, civilizations have been using cryptography; the art of creating codes. Often utilized among military personal, encrypted messages contributed a significant amount to the success of a nation or region in wars and battles. Today, cryptology is used to secure our data, keeping our private information hidden from unwanted eyes. As mathematics and sciences advance, new methods for cryptology arise. In this project, we researched a variety of encryption methods. From lower level algebra to upper level abstract algebra, these methods vary in complexity which affect how difficult the resulting ciphers are to break. After an exploration of these methods, we made an attempt to decrypt a journal from the 1800s that has never been deciphered before. This presentation will provide a summary of this journey from learning to applying cryptology.
Recommended Citation
Wiles, Kimberly, "Explorations and Applications of Modern Cryptology" (2021). Symposium Of University Research and Creative Expression (SOURCE). 67.
https://digitalcommons.cwu.edu/source/2021/COTS/67
Department/Program
Mathematics
Additional Mentoring Department
https://cwu.studentopportunitycenter.com/explorations-and-applications-of-modern-cryptology/
Explorations and Applications of Modern Cryptology
Ellensburg
From as early as 400 BC, civilizations have been using cryptography; the art of creating codes. Often utilized among military personal, encrypted messages contributed a significant amount to the success of a nation or region in wars and battles. Today, cryptology is used to secure our data, keeping our private information hidden from unwanted eyes. As mathematics and sciences advance, new methods for cryptology arise. In this project, we researched a variety of encryption methods. From lower level algebra to upper level abstract algebra, these methods vary in complexity which affect how difficult the resulting ciphers are to break. After an exploration of these methods, we made an attempt to decrypt a journal from the 1800s that has never been deciphered before. This presentation will provide a summary of this journey from learning to applying cryptology.
https://digitalcommons.cwu.edu/source/2021/COTS/67
Faculty Mentor(s)
Stuart Boersma