Description/Abstract/Artist Statement
The functioning of our modern digital world relies heavily on the security of modern encryption algorithms and their resistance to systematic attempts to access secure information. For the 2020 Department of Computer Science’s Raspberry Pi Programming Competition, I decided to explore encryption and decryption techniques available to any user with some programming knowledge and a desire to secure information from unwanted access.
I developed a program which allows a user to select between three types of encryption algorithms: a Caesar Cipher, a Vigenère Cipher, and a Stream Cipher. I also gave the user the option to further secure their encrypted message using the practice of steganography: hiding information in digital media. Specifically, a user could encode their encrypted message securely into a picture file, which is then suitable for sharing, posting, or sending without risking third-party access to that information. A recipient with the same program could then decode an encrypted photograph, and together with the code for whichever encryption method was used, access the original message.
Faculty Advisor/Mentor
Ayman Elmesalami
College Affiliation
College of Engineering & Technology (Batten)
Presentation Type
Oral Presentation
Disciplines
Information Security
Session Title
Computer Science and its Impact in Science and Engineering
Location
Zoom Room S
Start Date
3-20-2021 12:00 PM
End Date
3-20-2021 12:55 PM
Upload File
wf_yes
Included in
Encryption and Decryption with a Raspberry Pi Device
Zoom Room S
The functioning of our modern digital world relies heavily on the security of modern encryption algorithms and their resistance to systematic attempts to access secure information. For the 2020 Department of Computer Science’s Raspberry Pi Programming Competition, I decided to explore encryption and decryption techniques available to any user with some programming knowledge and a desire to secure information from unwanted access.
I developed a program which allows a user to select between three types of encryption algorithms: a Caesar Cipher, a Vigenère Cipher, and a Stream Cipher. I also gave the user the option to further secure their encrypted message using the practice of steganography: hiding information in digital media. Specifically, a user could encode their encrypted message securely into a picture file, which is then suitable for sharing, posting, or sending without risking third-party access to that information. A recipient with the same program could then decode an encrypted photograph, and together with the code for whichever encryption method was used, access the original message.