Decentralized Dilemmas: A Blockchain Jeopardy Challenge

Group: Angelica Hizsa, Teddy Kalp, Lisa Muli The practice of securing communication by transforming plaintext into unreadable ciphertext, and vice versa, using mathematical algorithms and secret keys…What is Cryptography? Introduction So… Let’s talk about the exciting world of Cryptography, demystify the belief of its complexity, build on fundamental knowledge and challenge you to learn more …

Instant Messaging Applications & Cryptography

“Communication is the essence of human life” ~Janice Light[1] Instant messaging is a set of technologies that facilitate real-time communication. Also known as I.M., social messengers, messaging apps or chat apps, it is a quick, accessible, and convenient mode of communication. Instant messaging pre-dates the modern internet and has existed since the early 1990s. However, …

A heart for WirelessHART

by Stephen Penner, Ben Etukudoh, Oluchi Henry-Ucheonwu, Julie Stiehl (edited) Introduction  This is our first attempt to explore the world of WirelessHART, to have a clearer perspective of what it is and how it works with a focus on data integrity and security. We also examine this protocol with reference to Wi-Fi alliances latest standards …

An Introductory Guide to Private PKI Implementation for Secure Internal Server Communication

Group 1: Leo Choi, David St Louis, Nina Undug, Janelle Wiebe & Jamie Wong Many business operations employ public-key cryptography to uphold client privacy rights during the transportation of sensitive data. In public-key cryptography, messages are encrypted using the receiver’s public key, which is publicly available. Consider the following man-in-the-middle attack that may result from …

Integration of homomorphic encryption to the voting system  

Group: Mehedi Hasan, Jagadeesh Somepalli, Prajwal Thippeswamy, Moein Ghavi Introduction Every day, we need to encounter a lot of sensitive and valuable digital data that needs to be encrypted when it is being transmitted from source to destination so that, eavesdroppers can’t extract the information during the transmission. At the same time, we need to …