Difference between revisions of "Cybersecurity"

From Wiki - Scioly.org
Jump to: navigation, search
(decrease heading levels)
(Cryptography: SHA & post-quantum)
Line 12: Line 12:
  
 
===Hash algorithms===
 
===Hash algorithms===
One-way functions.
+
One-way functions. The most famous family is NIST's Secure Hash Algorithms (SHA).
 +
 
 +
===Post-quantum===
 +
Quantum computers can break some cryptographic functions (e.g. prime factorization through Shor's algorithm). Post-quantum cryptography uses properties of quantum mechanics, such as entanglement, to protect against quantum computer attacks.
  
 
==Web architecture==
 
==Web architecture==

Revision as of 07:36, 23 October 2020

Not to be confused with Data Science.


Cybersecurity is a Division B and Division C event that was first run as a trial event at the 2021 BEARSO Invitational to replace Ping Pong Parachute. The event consists of two parts: a written test on Cryptography and Web Architecture, and a hands on task on Cryptography and Programming.

Cryptography

Hash algorithms

One-way functions. The most famous family is NIST's Secure Hash Algorithms (SHA).

Post-quantum

Quantum computers can break some cryptographic functions (e.g. prime factorization through Shor's algorithm). Post-quantum cryptography uses properties of quantum mechanics, such as entanglement, to protect against quantum computer attacks.

Web architecture

HTML/CSS/JS

Mozilla's web docs tend to be the most up-to-date repository for web technologies information. W3C Schools and Stack Overflow often don't follow industry best practices.

Protocols

Modern websites use HTTPS, a descendant of the Hypertext Transport Protocol (HTTP) that incorporates encryption through Transport Layer Security (TLS).

Resources

Rules in the BEARSO Invitational