{"id":29946,"date":"2021-10-27T10:20:19","date_gmt":"2021-10-27T15:20:19","guid":{"rendered":"http:\/\/www.discoverclarksville.com\/articles\/?p=29946"},"modified":"2021-10-27T10:20:19","modified_gmt":"2021-10-27T15:20:19","slug":"apsus-november-science-on-tap-to-explore-cryptography-and-you","status":"publish","type":"post","link":"https:\/\/www.discoverclarksville.com\/articles\/2021\/10\/27\/apsus-november-science-on-tap-to-explore-cryptography-and-you\/","title":{"rendered":"APSU&#8217;s November Science on Tap to explore \u2018Cryptography and You\u2019"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-324279\" title=\"Austin Peay State University - APSU\" src=\"https:\/\/www.clarksvilleonline.com\/wp-content\/uploads\/2015\/10\/Austin-Peay-State-University-APSU.jpg\" alt=\"Austin Peay State University - APSU\" width=\"250\" height=\"64\"\/><strong>Clarksville, TN<\/strong> &#8211; Trust is a premium currency. Its value appreciates continuously until one breach causes it to deteriorate. The transfer of data is built on trust. Trust that protocols are upheld and that the systems protecting your information work properly.<\/p>\n<div id=\"attachment_29947\" style=\"width: 490px\" class=\"wp-caption aligncenter\"><a href=\"http:\/\/www.discoverclarksville.com\/articles\/wp-content\/uploads\/2021\/10\/Dr.-Nicholas-Coleman.jpg\"  class=\"thickbox no_icon\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-29947\" class=\"size-medium wp-image-29947\" src=\"http:\/\/www.discoverclarksville.com\/articles\/wp-content\/uploads\/2021\/10\/Dr.-Nicholas-Coleman-480x360.jpg\" alt=\"Austin Peay State University Department of Computer Science and Information Technology associate professor Dr. Nicholas Coleman. (APSU)\" width=\"480\" height=\"360\" srcset=\"https:\/\/www.discoverclarksville.com\/articles\/wp-content\/uploads\/2021\/10\/Dr.-Nicholas-Coleman-480x360.jpg 480w, https:\/\/www.discoverclarksville.com\/articles\/wp-content\/uploads\/2021\/10\/Dr.-Nicholas-Coleman-200x150.jpg 200w, https:\/\/www.discoverclarksville.com\/articles\/wp-content\/uploads\/2021\/10\/Dr.-Nicholas-Coleman-768x576.jpg 768w, https:\/\/www.discoverclarksville.com\/articles\/wp-content\/uploads\/2021\/10\/Dr.-Nicholas-Coleman.jpg 800w\" sizes=\"(max-width: 480px) 100vw, 480px\" \/><\/a><p id=\"caption-attachment-29947\" class=\"wp-caption-text\">Austin Peay State University Department of Computer Science and Information Technology associate professor Dr. Nicholas Coleman. (APSU)<\/p><\/div>\n<p><!--more--><\/p>\n<p>Austin Peay State University (APSU) professor Dr. Nicholas Coleman, an associate professor in the Department of Computer Science and Information Technology, will discuss \u201cCryptography and You\u201d at the next Science on Tap at 5:30pm Tuesday, November 2nd, at <a target=\"_blank\" href=\"https:\/\/www.saaleworks.com\/upstairs\" >Upstairs at Strawberry Alley Ale Works<\/a>.<\/p>\n<p>\u201cI want people to have a basic understanding of how cryptography works,\u201d Coleman said.<\/p>\n<p>The value of cryptography is in everything we do, from browsing secure websites to online transactions. Whenever you swipe your debit card, a cryptographic protocol is being followed.<\/p>\n<h3>Confidentiality, Integrity and Authentication<\/h3>\n<p>The three big things cryptography provides are confidentiality, integrity, and authentication. Confidentiality is maintained through encryption. Say you wanted to send a file securely to your boss. Encryption translates this plain text document, like a Word document, into ciphertext. This ciphertext is then translated back into plain text via a cryptographic key.<\/p>\n<p>There are two types of keys: public and private keys. The public key can be accessed by everyone and is used to encrypt data. Your private key is accessible only by you and is used to decrypt data. This system provides confidentiality.<\/p>\n<p>Integrity ensures that unauthorized users cannot change the data. This can be done in many ways, but a message authentication code confirms that a message received is from the person it says it\u2019s from and the content of the message is intact.<\/p>\n<p>Authentication is maintained, in part, through a system of hash functions. Hash functions map fixed outputs known as hash values to variably sized inputs. This is useful for verifying data. It also ensures that if there is ever a security break, only the hash values are at risk of exposure, not the imputed passwords. It is extremely difficult to take a hash value and figure out the original message.<\/p>\n<p>[470center]<\/p>\n<h3>Ransomware Attacks<\/h3>\n<p>Dr. Coleman\u2019s talk will also touch on ransomware attacks. Ransomware happens when someone gains access to your data, encrypts it, and will only provide the private key necessary for decryption if you pay a certain amount, usually in the form of Bitcoin.<\/p>\n<p>Malware is software designed to harm computers, or, in this case, gain access to sensitive data. It often finds its way on your computer by clicking a bad link or email.<\/p>\n<p>\u201cPeople are a lot easier to hack than computers,\u201d Coleman said.<\/p>\n<p>Ransomware attacks are a form of extortion. Bitcoin is often used by hackers because it is theoretically untraceable, but that isn\u2019t true.<\/p>\n<p>\u201cBitcoin is not 100% untraceable because you have to have an account with some system that manages your Bitcoin that can be traced. Sometimes the money can be recovered,\u201d Coleman said.<\/p>\n<p>Ransomware attacks are often concentrated in industries that require immediate access to data, such as hospitals, law offices, and universities. These institutions are more likely to pay the ransom because they need encrypted data to do their job.<\/p>\n<p>\u201cWe have systems all over the place that are poorly secured,\u201c Coleman said.<\/p>\n<p>[470center]<\/p>\n<h3>Bitcoin and the Value of Money<\/h3>\n<p>Bitcoin has value in the same way paper money does: because we believe it has value. The only way our economy can work is if we believe money is valuable. This requires a large amount of trust. Bitcoin, being a decentralized monetary system, uses cryptography to make the need for trust irrelevant. Everything is backed by protocol, down to how you mine the Bitcoin itself.<\/p>\n<p>\u201cWhat\u2019s to say my bank account has value? That\u2019s just ones and zeroes. But those ones and zeroes represent something,\u201d Coleman said. \u201cThere is a connection between cryptocurrencies and ransomware attacks. These attacks, in my mind, are increasing the value of Bitcoin because those are the people who are really using it to make a profit.\u201d<\/p>\n<p>Science on Tap meets at 5:30pm on the first Tuesday of every month, bringing together two great things: science and local brews. Science on Tap is hosted by Austin Peay State University\u2019s <a target=\"_blank\" href=\"https:\/\/www.apsu.edu\/costem\/\" >College of Science, Technology, Engineering and Mathematics<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Clarksville, TN &#8211; Trust is a premium currency. Its value appreciates continuously until one breach causes it to deteriorate. The transfer of data is built on trust. Trust that protocols are upheld and that the systems protecting your information work properly.<\/p>\n","protected":false},"author":6,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ngg_post_thumbnail":0,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false},"version":2}},"categories":[5],"tags":[23,5990,262,35158,512,825,35156,109,35159,16077,35157,33984,32833],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p4xGYI-7N0","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.discoverclarksville.com\/articles\/wp-json\/wp\/v2\/posts\/29946"}],"collection":[{"href":"https:\/\/www.discoverclarksville.com\/articles\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.discoverclarksville.com\/articles\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.discoverclarksville.com\/articles\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.discoverclarksville.com\/articles\/wp-json\/wp\/v2\/comments?post=29946"}],"version-history":[{"count":1,"href":"https:\/\/www.discoverclarksville.com\/articles\/wp-json\/wp\/v2\/posts\/29946\/revisions"}],"predecessor-version":[{"id":29948,"href":"https:\/\/www.discoverclarksville.com\/articles\/wp-json\/wp\/v2\/posts\/29946\/revisions\/29948"}],"wp:attachment":[{"href":"https:\/\/www.discoverclarksville.com\/articles\/wp-json\/wp\/v2\/media?parent=29946"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.discoverclarksville.com\/articles\/wp-json\/wp\/v2\/categories?post=29946"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.discoverclarksville.com\/articles\/wp-json\/wp\/v2\/tags?post=29946"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}