"I do not know what I may appear to the world, but to myself I seem to have been only like a boy playing on the sea-shore, and diverting myself in now and then finding a smoother pebble or a prettier shell than ordinary, whilst the great ocean of truth lay all undiscovered before me."
- Isaac Newton
Introduction to Cryptography and
Instructor: Malik Magdon-Ismail
Primary Text: Cryptography and Network Security: Principles and Practice, 2nd Ed.
I undertook this course as an independent study while at
RPI. The intent was to gain an understanding
of the algorithms and protocols underlying various network security
technologies. As these technologies are, in large part, dependent on
cryptography, much of the course detailed the development of cryptographic
systems in general and examined the specifics of numerous algorithms in
particular. The course covered both symmetric and public-key technologies, and concluded with a low-level implementation of the RSA public-key system.
During the study I read sections of the text and then prepared
presentations which I delivered in meetings with Professor Magdon-Ismail.
Below I have included links to the presentations I produced during the study.
Other Cryptography Work
Copyright 2005-2014 R. Conlan