"As an artist, you organize your life so you get a chance to paint, a window of time, but that's no guarantee you'll create anything worth all your effort. You're always haunted by the idea you're wasting your life."
- Diary, Chuck Palahniuk
Introduction to Cryptography and
Instructor: Malik Magdon-Ismail
Primary Text: Cryptography and Network Security: Principles and Practice, 2nd Ed.
I undertook this course as an independent study while at
RPI. The intent was to gain an understanding
of the algorithms and protocols underlying various network security
technologies. As these technologies are, in large part, dependent on
cryptography, much of the course detailed the development of cryptographic
systems in general and examined the specifics of numerous algorithms in
particular. The course covered both symmetric and public-key technologies, and concluded with a low-level implementation of the RSA public-key system.
During the study I read sections of the text and then prepared
presentations which I delivered in meetings with Professor Magdon-Ismail.
Below I have included links to the presentations I produced during the study.
Other Cryptography Work
Copyright 2005-2014 R. Conlan