Develop a new algorithm to encrypt online credit card transactions
Help the government decode secret messages sent by terrorists
Test existing encryption algorithms for weaknesses
Ensure that electronic messages like emails cannot be intercepted and read by unauthorized parties
Overview
Listen to this section
Cryptographers, also called cryptologists and cryptanalysts, develop the encryption algorithms that keep our modern online transactions, like emails and credit card purchases, safe from prying eyes. Even if information or a message is stolen, as long as it is encrypted, the person who stole it cannot read it! Cryptographers also work to test and break these algorithms, to check them for weaknesses and vulnerabilities. They even analyze and decipher codes used by terrorists and foreign governments, to provide valuable information to the U.S. military and intelligence agencies.
Writing:?Communicating effectively in writing as appropriate for the needs of the audience.
Active Listening:?Giving full attention to what other people are saying, taking time to understand the points being made, asking questions as appropriate, and not interrupting at inappropriate times.
Judgment and Decision Making:?Considering the relative costs and benefits of potential actions to choose the most appropriate one.
Systems Analysis:?Determining how a system should work and how changes in conditions, operations, and the environment will affect outcomes.
Learning Strategies:?Selecting and using training/instructional methods and procedures appropriate for the situation when learning or teaching new things.
Core Tasks
Think about if you'd like the typical tasks a Cryptographer might do:
Make sure sensitive information is properly encrypted and only accessible to authorized parties
Help ensure that online credit card transactions are secure
Design an app that allows users to send each other encrypted text messages
Study existing industry-standard encryption algorithms and probe them for weaknesses or try to crack them
Use mathematical theories to design newer, more secure encryption algorithms
Decode secret messages intercepted by military, law enforcement, and intelligence agencies
Tasks 1/3
Salary & Job Openings
Steps to Get There: Becoming a Cryptographer
Try it Out with an Activity or Project
On the Job
More Information
Please create a free account to view this career and access our full library of over 160 STEM careers.
With a free account you will have access to our full library of over 160 STEM careers. Each career profile includes detailed information to help you learn about a career and the requirements to get there. You can explore:
salary information by state
recommended high school coursework
fun projects and activities to test out a career
videos and interviews with professionals in the field
We use cookies and those of third party providers to deliver the best possible web experience and to compile statistics.
By continuing and using the site, including the landing page, you agree to our
Privacy Policy and
Terms of Use.