"Cryptography Essentials" Course Project: Instructions
"Cryptography Essentials" Course Project: Instructions
"Cryptography Essentials" Course Project: Instructions
Cornell Tech
Instructions:
Complete this project and submit it to your instructor. See the assignment page for
information about the grading rubric. Do not hesitate to contact your instructor if you
have any questions about the project.
This course project consists of three parts, each of which corresponds to concepts that
you will learn throughout the course. Complete each project part as you progress
through the course. Wait until all three parts are complete before submitting the project.
Begin your course project by completing Part One below.
1
© 2018 eCornell. All rights reserved. All other copyrights, trademarks, trade names, and logos are the sole property of their respective owners.
CTECH202: Cryptography Essentials
Cornell Tech
Answer the following questions. Please limit your answers to 100 words or less.
In this sample
scheme, how do
you decrypt
messages given
the secret key
provided above?
Is this a good
encryption
scheme? Why or
why not?
2
© 2018 eCornell. All rights reserved. All other copyrights, trademarks, trade names, and logos are the sole property of their respective owners.
CTECH202: Cryptography Essentials
Cornell Tech
Think of a business-related
data privacy problem or
challenge. Describe how
you might use public and
private keys to solve the
problem.
Think of the Top two tools used for communication:
communication tools used
in your own work
environment. Then, list the
top two most frequently Type of encryption they rely on:
used tools or applications.
Do some research, both
internally and on the web,
to see what kind of Was it easy to find information on the kind of encryption
encryption scheme the that the tools rely on to secure communications?
tools use to protect
messages (private-key
encryption or public-key
encryption). Consider
sending a message to
someone in your
technology department to
help you answer the
questions to the right.
3
© 2018 eCornell. All rights reserved. All other copyrights, trademarks, trade names, and logos are the sole property of their respective owners.
CTECH202: Cryptography Essentials
Cornell Tech
Think of a commodity that could be traded online via a public ledger. For the purposes
of this project, you can imagine that this public ledger is equivalent to a public Facebook
wall; anyone can see what is posted to the profile. Although it will be missing some key
properties to make it secure (i.e. you have to put your trust that Facebook will not
tamper with the transactions posted to the public wall), it will be good enough for your
fledgling commodity exchange. Below, you will describe how you would use digital
signatures to ensure the integrity of the exchange. Please limit your answers to 100
words or less.
Give an informal
definition of a digital
signature scheme. We
recommend that you re-
watch the videos in this
module several times
before attempting to
answer this question. In
your definition, be sure
to include the purposes
of a public key and a
secret key.
4
© 2018 eCornell. All rights reserved. All other copyrights, trademarks, trade names, and logos are the sole property of their respective owners.