Description/Abstract/Artist Statement

The functioning of our modern digital world relies heavily on the security of modern encryption algorithms and their resistance to systematic attempts to access secure information. For the 2020 Department of Computer Science’s Raspberry Pi Programming Competition, I decided to explore encryption and decryption techniques available to any user with some programming knowledge and a desire to secure information from unwanted access.

I developed a program which allows a user to select between three types of encryption algorithms: a Caesar Cipher, a Vigenère Cipher, and a Stream Cipher. I also gave the user the option to further secure their encrypted message using the practice of steganography: hiding information in digital media. Specifically, a user could encode their encrypted message securely into a picture file, which is then suitable for sharing, posting, or sending without risking third-party access to that information. A recipient with the same program could then decode an encrypted photograph, and together with the code for whichever encryption method was used, access the original message.

Presenting Author Name/s

Taylor Powell

Faculty Advisor/Mentor

Ayman Elmesalami

College Affiliation

College of Engineering & Technology (Batten)

Presentation Type

Oral Presentation

Disciplines

Information Security

Session Title

Computer Science and its Impact in Science and Engineering

Location

Zoom Room S

Start Date

3-20-2021 12:00 PM

End Date

3-20-2021 12:55 PM

Upload File

wf_yes

Share

COinS
 
Mar 20th, 12:00 PM Mar 20th, 12:55 PM

Encryption and Decryption with a Raspberry Pi Device

Zoom Room S

The functioning of our modern digital world relies heavily on the security of modern encryption algorithms and their resistance to systematic attempts to access secure information. For the 2020 Department of Computer Science’s Raspberry Pi Programming Competition, I decided to explore encryption and decryption techniques available to any user with some programming knowledge and a desire to secure information from unwanted access.

I developed a program which allows a user to select between three types of encryption algorithms: a Caesar Cipher, a Vigenère Cipher, and a Stream Cipher. I also gave the user the option to further secure their encrypted message using the practice of steganography: hiding information in digital media. Specifically, a user could encode their encrypted message securely into a picture file, which is then suitable for sharing, posting, or sending without risking third-party access to that information. A recipient with the same program could then decode an encrypted photograph, and together with the code for whichever encryption method was used, access the original message.