.

Friday, December 8, 2023

Applied Cryptography – Part 2

 


Cryptography is the practice of secure communication in the presence of adversaries. It involves techniques and methods to protect information from unauthorized access and ensure its confidentiality, integrity, and authenticity. In today's digital world, where sensitive data is constantly being transmitted and stored, cryptography plays a vital role in maintaining privacy and security.


Basic Concepts: Building Blocks of Cryptography

  1. Encryption and Decryption: Encryption is the process of converting plaintext (readable data) into ciphertext (encoded data) using an algorithm and a secret key. Decryption is the reverse process of converting ciphertext back to plaintext using the same algorithm and key.
  2. Symmetric Cryptography: In this approach, the same key is used for both encryption and decryption. It's efficient but requires a secure way to share the key.
  3. Asymmetric Cryptography: Also known as public-key cryptography, it uses a pair of keys: public key for encryption and private key for decryption. It's secure for communication over insecure channels but is computationally intensive.


Common Cryptographic Techniques and Algorithms

  1. Hash Functions: Hashing converts input data into a fixed-size string of characters, typically for data verification or password storage. Even a small change in input leads to a significantly different output. Examples include MD5, SHA-256.
  2. AES (Advanced Encryption Standard): A widely used symmetric encryption algorithm. It operates on fixed-size blocks of data and supports key lengths of 128, 192, or 256 bits.
  3. RSA: A widely used asymmetric encryption algorithm. It's based on the difficulty of factoring large composite numbers into their prime factors. RSA is often used for secure key exchange and digital signatures.


Applications of Cryptography

  1. Secure Communication: Cryptography ensures that messages exchanged between parties remain confidential and tamper-proof. This is crucial for online banking, email communication, and instant messaging.
  2. Data Integrity: Cryptographic techniques like hashing can verify whether data has been altered during transmission or storage.
  3. Authentication and Digital Signatures: Digital signatures use asymmetric cryptography to prove the authenticity of a message or document and the identity of the sender.
  4. Secure Transactions: Cryptography underpins secure online transactions by protecting credit card information and personal data.


Best Practices and Considerations

  1. Key Management: Proper key generation, distribution, storage, and rotation are essential to maintain the security of encrypted data.
  2. Algorithm Choice: Use well-established and widely recognized cryptographic algorithms. Avoid creating homemade encryption methods.
  3. Security Updates: Keep software and systems up to date to guard against known vulnerabilities.
  4. Quantum Computing: As quantum computers advance, they could potentially break some current encryption methods. Post-quantum cryptography is an active area of research to develop algorithms resistant to quantum attacks.


Conclusion: Embracing the Power of Cryptography

Cryptography is a cornerstone of digital security, ensuring that our sensitive information remains private and secure. By understanding its fundamental concepts, common techniques, and best practices, newcomers to the field can navigate the world of applied cryptography and contribute to building a safer digital environment for everyone.


Explore our Applied Cryptography module in POLITEMall to have a foundation understanding of it!


Image By vecstock

Tuesday, October 31, 2023

Applied Cryptography – Part 1


In the world of applied cryptography, you'll learn the art of safeguarding information in the digital age. Imagine being able to send messages that only the intended recipient can read, protect your private data from prying eyes, and ensure the integrity of online transactions. This is the power of applied cryptography – it's like learning the language of secrets for the digital realm.

What is Applied Cryptography?

At its core, cryptography is about turning ordinary information into a secret code to keep it safe from unauthorized eyes. Applied cryptography takes this idea and turns it into practical tools that you can use in your everyday digital life. It's like having a set of superpowers to defend your data and communication from cyber threats.


Why Learn Applied Cryptography?

1. Digital Privacy: You'll discover how to have private conversations online, where only you and the person you're talking to can understand what's being said.

2. Secure Transactions: Ever wondered how your credit card details stay safe when you shop online? Applied cryptography is the answer, making sure your financial transactions are shielded from hackers.

3.  Identity Protection: Learn how to prove you are who you say you are in the digital world, preventing imposters from pretending to be you.

4.  Future-Proofing: Stay ahead of emerging technologies. With quantum computing on the horizon, learning about post-quantum cryptography ensures your skills remain relevant.


What Will You Learn?

1. Encryption and Decryption: Discover how to lock and unlock digital secrets using secret codes.

2. Digital Signatures: Learn how to "sign" digital documents to prove they came from you and haven't been tampered with.

3. Key Management: Master the art of managing the keys that unlock these digital secrets – a crucial skill for any cryptography practitioner.

4. Real-World Examples: Explore how applied cryptography protects everything from your WhatsApp messages to the sensitive data in hospitals.


No Superpowers Needed

Don't worry if you're not a tech genius. Applied cryptography is about understanding and using simple yet powerful techniques. Whether you're an aspiring cybersecurity professional, a curious tech enthusiast, or someone who simply wants to navigate the digital world safely, applied cryptography has something for everyone.

 

Embark on this journey to becoming a digital guardian. Applied cryptography will empower you to secure your digital life, communicate privately, and embrace the future of cybersecurity. Let's unlock the secrets together!

Explore our Applied Cryptography module in POLITEMall to have a foundation understanding of it!

Look out for our Applied Cryptography - Part 2 in the coming week to know how it is applied in practice.

Image By vecstock

Wednesday, October 25, 2023

SP signed MOU with AISP on QISA/QISP Certification Exam

23 Oct 2023. Singapore Polytechnic (SP) and Association of Information Security Professionals (AiSP) signed a Memorandum of Understanding (MOU) to promote professional certification examinations in cybersecurity. 

In this MOU, SP will provide a platform to the students to participate in the following cyber security professional exams, namely:

  1. Qualified Information Security Associate (QISA); and
  2. Qualified Information Security Professional (QISP).

More information on QISA/QISP can be found in this link.

SP will conduct its own training to their students to prepare for the QISA/QISP exams. 

To date, 17 DISM students have attained the QISP credentials and more training sessions are planned during the vacation period for students to prep them for the exam. This is part of the effort from School of Computing (SOC) to support the development of personnel in this demanding profession in cybersecurity domain.

Friday, October 20, 2023

Singapore Cyber Conquest 2023

The 13th Singapore Cyber Conquest competition was held on 17 Oct at the GovWare 2023.

DSIM students, Zavier Lee and Liew Wen Yu, Gryphons' President and Vice President, participated in the event.

(From L to R): Zavier Lee and Liew Wen Yu

They had done us proud by securing third place in the competition. This is definitely an outstanding achievement and this reflects the expertise and commitment of Gryphons' members to the cyber security field.

Once again, Congratulations to the students for their achievement in the Singapore Cyber Conquest competition.

Wednesday, October 18, 2023

Python Programming

 


Are you intrigued by the world of coding? Our Python Programming module is your gateway to the exciting universe of programming. We teach Python and Python isn't just any programming language; it's your friendly guide into the realms of creativity, problem-solving, and innovation.

Why Python?

Python isn't just a programming language; it's a versatile tool that empowers you to bring your ideas to life. Here's why Python is the perfect choice for beginners:

1.    Beginner-Friendly: Python boasts a clean and readable syntax, making it easy for newcomers to understand and write code. No more intimidating jargon – Python speaks your language.

2.    Versatile Applications: Whether you're keen on web development, data analysis, artificial intelligence, or game creation, Python has your back. It's like having a Swiss Army knife for your coding needs.

3.    Rapid Development: Python's simplicity means you can transform your ideas into functional code faster than you ever imagined. Get ready to see your projects take shape swiftly.

4.    Strong Community: You're never alone in your coding journey. Python's vast and welcoming community is always ready to help you overcome challenges and share in your successes.

5.    Endless Learning: Learning Python isn't just about writing code; it's about acquiring a mindset of continuous exploration. As you grow, Python grows with you, unveiling new libraries, frameworks, and possibilities.

What Can You Do with Python?

With Python as your ally, the possibilities are limitless. Here are just a few things you can accomplish:

  • Create Websites: Develop interactive web applications using frameworks like Django and Flask. From personal blogs to dynamic e-commerce sites, Python has you covered.
  • Analyse Data: Dive into the world of data analysis using libraries like Pandas and NumPy. Uncover insights from large datasets and make data-driven decisions.
  • Automate Tasks: Tired of repetitive tasks? Python can automate them, freeing up your time for more meaningful work.
  • Build Games: Dream of crafting your own games? Python's simplicity makes game development an exciting adventure for beginners.
  • Explore AI and Machine Learning: Step into the future by creating machine learning models and AI algorithms with libraries like TensorFlow and scikit-learn.
  • Solve Real-World Problems: Use Python to tackle challenges in fields like finance, science, and engineering. Your code can have a tangible impact on the world around you.

Remember, your journey with Python is a marathon, not a sprint. Embrace every challenge, celebrate your victories, and never stop learning. Python is your passport to a world of endless possibilities. Explore our Python Programming module in POLITEMall to have a foundation understanding in Python. Happy coding! 🚀🐍

Photo by Chris Ried on Unsplash

  

Monday, October 16, 2023

Organizational Systems Security Analyst (OSSA) Exam - Sep 2023

Congratulations to the following students who had completed the ThinkSECURE's Organizational Systems Security Analyst (OSSA) course conducted from 25 Sep to 28 Sep. They took the OSSA exam on 29 Sep and successfully met the passing criteria in obtaining the OSSA credential.

These students are:

    1. ALDEN CHIA YU XIANG
    2. AMMAR ABDUL JABAR
    3. CHIA AI CHING ANGELINE ELEEN
    4. FOO GENG HAO
    5. GHERNIE LORENZ MILLANES ENCINAS
    6. JADEN TENG YU JAY
    7. JIMMY LIAW CHIN YONG
    8. JING QIHANG
    9. LENNON SU CHEE
    10. LIEW YU HENG JARED
    11. NG YU RAY
    12. TANG LEE HUNG IGNATIUS
                        Once again, Congratulations to all the students who have attained the OSSA credential.

                        Saturday, October 7, 2023

                        WorldSkills Singapore National Competition 2023

                        6 Oct 2023. The WorldSkills Singapore National Competition 2023 (Phase 2) was officially launched on Fri 4 Aug 2023 and was held from Wed 27 Sep to Sat 30 Sep 2023 at the 5 Polytechnics.

                        DISM students, Tong Yew Ching Kelvin and Ling Zhi En, took park in the WSS Cybersecurity category.

                        The Closing Ceremony was held at Temasek Polytechnic on Fri 6 Oct 2023.

                        The 2 students have done SP proud by winning the third place in the WSS competition.

                        Form L to R: Kelvin Tong, Mr Boris Choo (Senior Lecturer, DCDF), Lim Zhi En.

                        Congratulations to the 2 students for winning the WSS Bronz medal in Cybersecurity category.