Explorations and Applications of Modern Cryptology

Document Type

Oral Presentation

Campus where you would like to present

Ellensburg

Event Website

https://digitalcommons.cwu.edu/source

Start Date

16-5-2021

End Date

22-5-2021

Keywords

Cryptology, Mathematics, Encryption

Abstract

From as early as 400 BC, civilizations have been using cryptography; the art of creating codes. Often utilized among military personal, encrypted messages contributed a significant amount to the success of a nation or region in wars and battles. Today, cryptology is used to secure our data, keeping our private information hidden from unwanted eyes. As mathematics and sciences advance, new methods for cryptology arise. In this project, we researched a variety of encryption methods. From lower level algebra to upper level abstract algebra, these methods vary in complexity which affect how difficult the resulting ciphers are to break. After an exploration of these methods, we made an attempt to decrypt a journal from the 1800s that has never been deciphered before. This presentation will provide a summary of this journey from learning to applying cryptology.

Faculty Mentor(s)

Stuart Boersma

Department/Program

Mathematics

Additional Mentoring Department

https://cwu.studentopportunitycenter.com/explorations-and-applications-of-modern-cryptology/

Share

COinS
 
May 16th, 12:00 PM May 22nd, 12:00 PM

Explorations and Applications of Modern Cryptology

Ellensburg

From as early as 400 BC, civilizations have been using cryptography; the art of creating codes. Often utilized among military personal, encrypted messages contributed a significant amount to the success of a nation or region in wars and battles. Today, cryptology is used to secure our data, keeping our private information hidden from unwanted eyes. As mathematics and sciences advance, new methods for cryptology arise. In this project, we researched a variety of encryption methods. From lower level algebra to upper level abstract algebra, these methods vary in complexity which affect how difficult the resulting ciphers are to break. After an exploration of these methods, we made an attempt to decrypt a journal from the 1800s that has never been deciphered before. This presentation will provide a summary of this journey from learning to applying cryptology.

https://digitalcommons.cwu.edu/source/2021/COTS/67