Difference between revisions of "Cybersecurity"
(Cryptography: SHA & post-quantum) |
|||
Line 24: | Line 24: | ||
===Protocols=== | ===Protocols=== | ||
Modern websites use HTTPS, a descendant of the Hypertext Transport Protocol (HTTP) that incorporates encryption through Transport Layer Security (TLS). | Modern websites use HTTPS, a descendant of the Hypertext Transport Protocol (HTTP) that incorporates encryption through Transport Layer Security (TLS). | ||
+ | |||
+ | ==Programming== | ||
+ | Primality algorithm: | ||
==Resources== | ==Resources== |
Revision as of 07:40, 23 October 2020
![]() | This page is incomplete. |
- Not to be confused with Data Science.
Cybersecurity | |
---|---|
Type | Inquiry |
Category | Lab |
Cybersecurity is a Division B and Division C event that was first run as a trial event at the 2021 BEARSO Invitational to replace Ping Pong Parachute. The event consists of two parts: a written test on Cryptography and Web Architecture, and a hands on task on Cryptography and Programming.
Contents
Cryptography
Hash algorithms
One-way functions. The most famous family is NIST's Secure Hash Algorithms (SHA).
Post-quantum
Quantum computers can break some cryptographic functions (e.g. prime factorization through Shor's algorithm). Post-quantum cryptography uses properties of quantum mechanics, such as entanglement, to protect against quantum computer attacks.
Web architecture
HTML/CSS/JS
Mozilla's web docs tend to be the most up-to-date repository for web technologies information. W3C Schools and Stack Overflow often don't follow industry best practices.
Protocols
Modern websites use HTTPS, a descendant of the Hypertext Transport Protocol (HTTP) that incorporates encryption through Transport Layer Security (TLS).
Programming
Primality algorithm: