Future of Account Sign-in and Website Identification Using Cryptography

Filipp Gorodkov|Valentine Adjei|Enyu Ma|Ishak Lutalo Nkonge|Kelvin Onome Otuagoma The usage of usernames and passwords for authentication has become a critical vulnerability within the cybersecurity landscape. Despite substantial efforts by different organizations and cybersecurity experts to improve the security of usernames and passwords for authentication, data breaches keep happening. In addition to this, the mental cost …

Lightweight Cryptography: The go-to Cryptography for IoT Security 

Charles Odunaiya, Dev Patel, Harsh Patel, Nina Onwuachi, Saniya Jabir Internet of Things (IoT)   Buzzwords like Smart cities, Smart homes, and Smart Wearables have recently gained popularity on all fronts, both on social media and traditional platforms. The technical description of these words is the Internet of Things (IoT). According to Thakor et al. …

Decentralized Dilemmas: A Blockchain Jeopardy Challenge

Group: Angelica Hizsa, Teddy Kalp, Lisa Muli The practice of securing communication by transforming plaintext into unreadable ciphertext, and vice versa, using mathematical algorithms and secret keys…What is Cryptography? Introduction So… Let’s talk about the exciting world of Cryptography, demystify the belief of its complexity, build on fundamental knowledge and challenge you to learn more …

Instant Messaging Applications & Cryptography

“Communication is the essence of human life” ~Janice Light[1] Instant messaging is a set of technologies that facilitate real-time communication. Also known as I.M., social messengers, messaging apps or chat apps, it is a quick, accessible, and convenient mode of communication. Instant messaging pre-dates the modern internet and has existed since the early 1990s. However, …

A heart for WirelessHART

by Stephen Penner, Ben Etukudoh, Oluchi Henry-Ucheonwu, Julie Stiehl (edited) Introduction  This is our first attempt to explore the world of WirelessHART, to have a clearer perspective of what it is and how it works with a focus on data integrity and security. We also examine this protocol with reference to Wi-Fi alliances latest standards …

An Introductory Guide to Private PKI Implementation for Secure Internal Server Communication

Group 1: Leo Choi, David St Louis, Nina Undug, Janelle Wiebe & Jamie Wong Many business operations employ public-key cryptography to uphold client privacy rights during the transportation of sensitive data. In public-key cryptography, messages are encrypted using the receiver’s public key, which is publicly available. Consider the following man-in-the-middle attack that may result from …

Integration of homomorphic encryption to the voting system  

Group: Mehedi Hasan, Jagadeesh Somepalli, Prajwal Thippeswamy, Moein Ghavi Introduction Every day, we need to encounter a lot of sensitive and valuable digital data that needs to be encrypted when it is being transmitted from source to destination so that, eavesdroppers can’t extract the information during the transmission. At the same time, we need to …