₦airaland Forum

Welcome, Guest: Join Nairaland / LOGIN! / Trending / Recent / New
Stats: 2,157,868 members, 4,699,647 topics. Date: Wednesday, 16 January 2019 at 11:55 AM

Career Thread For Cybersecurity Experts: Meetups - Career - Nairaland

Nairaland Forum / Nairaland / General / Career / Career Thread For Cybersecurity Experts: Meetups (601 Views)

I Am A Nigerian Cybersecurity expert In The US, Ask Me Anything / Thread For Aspiring Lecturers / Thread For Teachers, Educators, Academicians, Lecturers And Educationists (2) (3) (4)

(1) (Reply) (Go Down)

Career Thread For Cybersecurity Experts: Meetups by walexzee11(m): 8:28am On Mar 05, 2018
Hey All,

I believe Nairaland have many experts in various fields but I've not come across any Career thread about CyberSecurity. So, I'm curious to know more people in this great Profession.

This Thread is meant for discussing salient issues in this field and also allowing people like me have Career mentors, As it is said that Mentor-ship is shortcut to success.
Re: Career Thread For Cybersecurity Experts: Meetups by addictiv(m): 10:19pm On Jul 02, 2018
Nice
Re: Career Thread For Cybersecurity Experts: Meetups by emmaxman(m): 5:58am On Jul 17, 2018
I look forward to this thread as I am a great fan of this career
Re: Career Thread For Cybersecurity Experts: Meetups by CaptainStephen(m): 7:25am On Jul 17, 2018
cool, following....
Re: Career Thread For Cybersecurity Experts: Meetups by adeleks: 2:05pm On Jul 17, 2018
You have my support
Re: Career Thread For Cybersecurity Experts: Meetups by lynkyinka(m): 12:56pm On Jan 10
walexzee11:
Hey All,

I believe Nairaland have many experts in various fields but I've not come across any Career thread about CyberSecurity. So, I'm curious to know more people in this great Profession.

This Thread is meant for discussing salient issues in this field and also allowing people like me have Career mentors, As it is said that Mentor-ship is shortcut to success.

walexzee11

we could do this on Telegram/whatsapp if you dont mind
Re: Career Thread For Cybersecurity Experts: Meetups by jesmond3945: 3:26pm On Jan 10
I am currently an expert but in the area of post quantum cryptography.

2 Likes

Re: Career Thread For Cybersecurity Experts: Meetups by TheOtherRoom: 4:01pm On Jan 10
.. Seen
Re: Career Thread For Cybersecurity Experts: Meetups by FlyingTOMATOE(m): 4:19pm On Jan 10
Ayodejioak
Re: Career Thread For Cybersecurity Experts: Meetups by Ayodejioak(m): 6:19pm On Jan 10
FlyingTOMATOE:
Ayodejioak

Here! Thanks!!

1 Like

Re: Career Thread For Cybersecurity Experts: Meetups by walexzee11(m): 1:16am On Jan 11
That's a whole new level in Cybersecurity not many people know about that. I envy your knowledge, would you like to share some with me?
jesmond3945:
I am currently an expert but in the area of post quantum cryptography.
Re: Career Thread For Cybersecurity Experts: Meetups by jesmond3945: 12:51pm On Jan 11
walexzee11:
That's a whole new level in Cybersecurity not many people know about that. I envy your knowledge, would you like to share some with me?
you know the present security prevalent in our time, used all over the world to secure all 'securable' based on RSA and the Elliptic curve cryptography would be broken in polynomial time by a Quantum computer once it comes on board. Right now the quantum computer only computes quantum annealing but not the real computing. So a hacker with a quantum computer can bring down the whole of CBN but there are some crypto primitives that can resist the attack of a quantum computer which is called post quantum cryptography.

1 Like

Re: Career Thread For Cybersecurity Experts: Meetups by walexzee11(m): 11:54pm On Jan 11
jesmond3945:
you know the present security prevalent in our time, used all over the world to secure all 'securable' based on RSA and the Elliptic curve cryptography would be broken in polynomial time by a Quantum computer once it comes on board. Right now the quantum computer only computes quantum annealing but not the real computing. So a hacker with a quantum computer can bring down the whole of CBN but there are some crypto primitives that can resist the attack of a quantum computer which is called post quantum cryptography.
Right now all quantum computers should be locked away and the production and its distribution restricted. If Naija bad guys have access to it, Africa is doom!
Re: Career Thread For Cybersecurity Experts: Meetups by Possessedchild: 2:57am On Jan 12
jesmond3945:
you know the present security prevalent in our time, used all over the world to secure all 'securable' based on RSA and the Elliptic curve cryptography would be broken in polynomial time by a Quantum computer once it comes on board. Right now the quantum computer only computes quantum annealing but not the real computing. So a hacker with a quantum computer can bring down the whole of CBN but there are some crypto primitives that can resist the attack of a quantum computer which is called post quantum cryptography.

Read on Semantic Security.

Though I'm not so familiar with post quantum cryptography but I know Semantic Security and it's potency to deliver security against quantum attacks through Indistinguishability.
Re: Career Thread For Cybersecurity Experts: Meetups by jesmond3945: 7:00am On Jan 12
Possessedchild:


Read on Semantic Security.

Though I'm not so familiar with post quantum cryptography but I know Semantic Security and it's potency to deliver security against quantum attacks through Indistinguishability.
loool semantic security is the same thing as provable security and not based on any primitive whatsoever but a general framework to analyze how strong any construction is. Please don't confuse things.
Re: Career Thread For Cybersecurity Experts: Meetups by jesmond3945: 7:01am On Jan 12
walexzee11:

Right now all quantum computers should be locked away and the production and its distribution restricted. If Naija bad guys have access to it, Africa is doom!
abi you know but won't be possible because manufacturers might phase out your presebt computers gradually.
Re: Career Thread For Cybersecurity Experts: Meetups by Possessedchild: 7:52am On Jan 12
jesmond3945:
loool semantic security is the same thing as provable security and not based on any primitive whatsoever but a general framework to analyze how strong any construction is. Please don't confuse things.

I am not confusing thing, What you do not understand kills. grin

Firstly, Wikipedia 'A semantically secure cryptosystem is a system where strictly the negligible information about the plaintext can be feasibly extracted from the ciphertext'.

Read the mathematics model of security, there are models you develop crypto systems with, for example developing Hybrid Crypto, Hybrid Crypto is a mode of encryption but you have Hybrid Algorithms now. Hence, there algorithmic models developed on it.

Now what I meant is that, Mathematical algorithms developed from semantic security models are capable of militating against attacks from quantum computers.

I mean do you think all this Bluechip companies like Walmart, Microsoft, IBM etc use conventional Public Key ish that is susceptible to quantum computer oriented attacks. Capital No shocked. They design there algorithm on mathematical models and the model is strictly a classified information between the mathematicians and the engineers with high ethics. Now there are few studies on initiating semantic security for Quantum stuff. So technically, I am right that semantically secured models are a good way up.

There is only one paper recently that spoke of the Semantic security in Quantum... "Semantic Security and Indistinguishability in the Quantum World June 1, 2016"

1 Like

Re: Career Thread For Cybersecurity Experts: Meetups by jesmond3945: 2:25pm On Jan 12
Possessedchild:


I am not confusing thing, What you do not understand kills. grin

Firstly, Wikipedia 'A semantically secure cryptosystem is a system where strictly the negligible information about the plaintext can be feasibly extracted from the ciphertext'.

Read the mathematics model of security, there are models you develop crypto systems with, for example developing Hybrid Crypto, Hybrid Crypto is a mode of encryption but you have Hybrid Algorithms now. Hence, there algorithmic models developed on it.

Now what I meant is that, Mathematical algorithms developed from semantic security models are capable of militating against attacks from quantum computers.

I mean do you think all this Bluechip companies like Walmart, Microsoft, IBM etc use conventional Public Key ish that is susceptible to quantum computer oriented attacks. Capital No shocked. They design there algorithm on mathematical models and the model is strictly a classified information between the mathematicians and the engineers with high ethics. Now there are few studies on initiating semantic security for Quantum stuff. So technically, I am right that semantically secured models are a good way up.

There is only one paper recently that spoke of the Semantic security in Quantum... "Semantic Security and Indistinguishability in the Quantum World June 1, 2016"

You make me laugh you go to wikipaedia to read about a highly technical field as cryptography, i hope you know the people who post stuffs on wiki are not experts. if you want to read about it go to ieeeexplore or eurocrypt and download good papers.
if a cryptosystem is secure then how can you now extract information about the plaintext from the ciphertext.
Now let me coach you, the concept of semantic security or provable security is to show that it with a negligible advantage for an attacker or eve to distinguish between two encrypted messages to know the one that has the plaintext message.
It takes on a series of games with a challenger either in the standard model or the random oracle model. The random oracle model are more of using hash functions which are called oracles but they are idealized and not practical so security is usually proved in the standard model.
Now this game is between the adversary and a challenger. The adversary makes a series of queries while the challenger responds if the adversary can be able to distinguish the two messages then he wins and breaks the algorithm to get the key.
There is nothing like hybrid cryptography, all crypto algorithms are based on the hardness of solving a mathematical problem which has underlying theories which is specific for example RSA- Factoring large integers, ECC- discrete logarithm problem IBE-Dffie Hellman problem and so forth.
All algorithms are semantic because they are provable against indinstinguishability but I want to school you that all algorithms can be broken by a quantum computer except post quantum primitives thats why they are called post quantum.
Let me tell what you don't know All algorithms follow the standard set by NIST they regulate the standard in the industry. If you like design a proprietary algorithm once it is broken the first thing they would ask you is whether you followed NIST specifications if you say no, you are in big trouble. The only thing you would say that their choice of key length and primes differ.
Which useless paper is that? A paper that was not peer reviewed.

1 Like 1 Share

Re: Career Thread For Cybersecurity Experts: Meetups by velmajdennis: 3:08pm On Jan 12
I recently found a resource https://esportzbet.com/ on the Internet that helps to make money on bets. These bets can be desired by e-sports fans. You can bet on your favorite team and win quick money.
Re: Career Thread For Cybersecurity Experts: Meetups by Possessedchild: 3:50pm On Jan 12
jesmond3945:


You make me laugh you go to wikipaedia to read about a highly technical field as cryptography, i hope you know the people who post stuffs on wiki are not experts. if you want to read about it go to ieeeexplore or eurocrypt and download good papers.
if a cryptosystem is secure then how can you now extract information about the plaintext from the ciphertext.
Now let me coach you, the concept of semantic security or provable security is to show that it with a negligible advantage for an attacker or eve to distinguish between two encrypted messages to know the one that has the plaintext message.
It takes on a series of games with a challenger either in the standard model or the random oracle model. The random oracle model are more of using hash functions which are called oracles but they are idealized and not practical so security is usually proved in the standard model.
Now this game is between the adversary and a challenger. The adversary makes a series of queries while the challenger responds if the adversary can be able to distinguish the two messages then he wins and breaks the algorithm to get the key.
There is nothing like hybrid cryptography, all crypto algorithms are based on the hardness of solving a mathematical problem which has underlying theories which is specific for example RSA- Factoring large integers, ECC- discrete logarithm problem IBE-Dffie Hellman problem and so forth.
All algorithms are semantic because they are provable against indinstinguishability but I want to school you that all algorithms can be broken by a quantum computer except post quantum primitives thats why they are called post quantum.
Let me tell what you don't know All algorithms follow the standard set by NIST they regulate the standard in the industry. If you like design a proprietary algorithm once it is broken the first thing they would ask you is whether you followed NIST specifications if you say no, you are in big trouble. The only thing you would say that their choice of key length and primes differ.
Which useless paper is that? A paper that was not peer reviewed.

You are a funny being.

I quoted Wikipedia, doesn't mean I went there to read. Logic should tell you that I have started the subject before you replied and I wanted to reinforce my view hence quoting a source.

My dear, 90% of Wikipedia is not only referenced, they as well don't just accept any stuff. Unlike your random Google searches where you said Semantic Security is a provable security, mere meaning gave the word Provable out without searching(which I later did to learn more). Semantic Security is a concept and It has requirements and proofs are needed to prove the mathimatical model behind the Semantically secured systems so it is not a provable security itself as stated by you like "semantic security or provable". I mean i have never heard that before semantic security or provable security. No excuses for misuse of choice of words, it is complacency or zero. Dont tell me a self acclaimed coach lagged at a heat of debate. This is not a typo error, not semantic error. It is syntactic type of technical error. And if it is syntactically wrong, it means you don't know what you are doing. grin I have gone into theory of programming now. I refuse to be tempted kiss

Mr coach,

grin So I need to repeat what you said, there is nothing like Hybrid Cryptography. My guy, you are confusing yourself. You don't understand the concept of Cryptography. Infact all what you wrote lacked coherency, meaning it is mere Google searches. But you were not able to know what Hybrid Cryptography is still. Don't tell me you are not wrong again.

Well, I know Tope Aladenusi(supposedly most decorated IT security consultant in Nigeria, that is you know him)wrote something on that while I was in university. And that was it. I started following him bumper to bumper. If you know anyone more decorared than him, OYA HIT ME grin

I know a friend as well, who worked on broadcast encryption and he employed Hybrid Cryptography. So you are lost in the shadows.

You are now funny again, so every stuff that is not peer reviewed lacked relevance. You are not a scientist. You are not objective enough to widen your horizon. You should research on what you have vast experience in and debate with your subordinates.

So please enough of unresourceful and incoherent coaching grin grin

I am a fulfilled...

I know my onions that...

You said and I quote, "

Let me tell what you don't know All algorithms follow the standard set by NIST they regulate the standard in the industry. If you like design a proprietary algorithm once it is broken the first thing they would ask you is whether you followed NIST specifications if you say no, you are in big trouble.

"

You are so wrong. It is a non regulatory agency for the standards and technologies in for
Department of commerce in the USA. I don't see a reason why a Russia bluechip company would not use any proprietary algorithm, or German bluechip companies not to talk of there military, Oh! Military arm of China will send there algorithms to them.

Now, tables turned, let me school you. In United state of America, I can bet on my left fat cheek that not all coys in USA even use or send there algorithms to be passed through the standards as professed.

Look, coach, NSIT are just go-to organization to know how your cryptography is and how fit is it not to constitute nuisance to the populace. E.g a new bank may go to them for regulating data security algorithm because if the bank goes ahead out of self confidence in its algorithm and it later caused havoc to the customer's, this will not only wreck the bank but alot of people would fall into depression hence the need for standard by weaklings of a company.

If a companies know it's onion, spare me the story, they don't need to pass through them.

Mind you, you forgot that even NSA in US would not subject itself to the standards like you said. Classified information is classified, no story. And as secured as NSA is, EternalBlue was leaked by hackers. So what are you saying. You don't know the central system of operation of hackers.

Google search or read from your IEEE cheesy, if chevron or Exxonmobil are using post quantum...for the oil rigs data communication or scada or HMI. You are a confused but funny being, I like you though. You think those oil companies operation is not more essential to the Country's economy as well.

Even Microsoft that implemented quantum crypto some years ago, hackers break the codes for most of there products, don't argue this with me. I know for sure...Don't tell me they implemented the post quantum for research purpose alone and not using it for there softwares. What are you now saying, Mr coach. You don't know anything about hackers.

They live to unleash there capabilities. They train hard and fight easy.

So what are you saying from Google searches without deeply rooted in the world of IT.

Please do your assignments well. And stop misleading your sheeples.

1 Like 1 Share

Re: Career Thread For Cybersecurity Experts: Meetups by jesmond3945: 1:16pm On Jan 13
Possessedchild:


You are a funny being.

I quoted Wikipedia, doesn't mean I went there to read. Logic should tell you that I have started the subject before you replied and I wanted to reinforce my view hence quoting a source.

My dear, 90% of Wikipedia is not only referenced, they as well don't just accept any stuff. Unlike your random Google searches where you said Semantic Security is a provable security, mere meaning gave the word Provable out without searching(which I later did to learn more). Semantic Security is a concept and It has requirements and proofs are needed to prove the mathimatical model behind the Semantically secured systems so it is not a provable security itself as stated by you like "semantic security or provable". I mean i have never heard that before semantic security or provable security. No excuses for misuse of choice of words, it is complacency or zero. Dont tell me a self acclaimed coach lagged at a heat of debate. This is not a typo error, not semantic error. It is syntactic type of technical error. And if it is syntactically wrong, it means you don't know what you are doing. grin I have gone into theory of programming now. I refuse to be tempted kiss

Mr coach,

grin So I need to repeat what you said, there is nothing like Hybrid Cryptography. My guy, you are confusing yourself. You don't understand the concept of Cryptography. Infact all what you wrote lacked coherency, meaning it is mere Google searches. But you were not able to know what Hybrid Cryptography is still. Don't tell me you are not wrong again.

Well, I know Tope Aladenusi(supposedly most decorated IT security consultant in Nigeria, that is you know him)wrote something on that while I was in university. And that was it. I started following him bumper to bumper. If you know anyone more decorared than him, OYA HIT ME grin

I know a friend as well, who worked on broadcast encryption and he employed Hybrid Cryptography. So you are lost in the shadows.

You are now funny again, so every stuff that is not peer reviewed lacked relevance. You are not a scientist. You are not objective enough to widen your horizon. You should research on what you have vast experience in and debate with your subordinates.

So please enough of unresourceful and incoherent coaching grin grin

I am a fulfilled...

I know my onions that...

You said and I quote, "

Let me tell what you don't know All algorithms follow the standard set by NIST they regulate the standard in the industry. If you like design a proprietary algorithm once it is broken the first thing they would ask you is whether you followed NIST specifications if you say no, you are in big trouble.

"

You are so wrong. It is a non regulatory agency for the standards and technologies in for
Department of commerce in the USA. I don't see a reason why a Russia bluechip company would not use any proprietary algorithm, or German bluechip companies not to talk of there military, Oh! Military arm of China will send there algorithms to them.

Now, tables turned, let me school you. In United state of America, I can bet on my left fat cheek that not all coys in USA even use or send there algorithms to be passed through the standards as professed.

Look, coach, NSIT are just go-to organization to know how your cryptography is and how fit is it not to constitute nuisance to the populace. E.g a new bank may go to them for regulating data security algorithm because if the bank goes ahead out of self confidence in its algorithm and it later caused havoc to the customer's, this will not only wreck the bank but alot of people would fall into depression hence the need for standard by weaklings of a company.

If a companies know it's onion, spare me the story, they don't need to pass through them.

Mind you, you forgot that even NSA in US would not subject itself to the standards like you said. Classified information is classified, no story. And as secured as NSA is, EternalBlue was leaked by hackers. So what are you saying. You don't know the central system of operation of hackers.

Google search or read from your IEEE cheesy, if chevron or Exxonmobil are using post quantum...for the oil rigs data communication or scada or HMI. You are a confused but funny being, I like you though. You think those oil companies operation is not more essential to the Country's economy as well.

Even Microsoft that implemented quantum crypto some years ago, hackers break the codes for most of there products, don't argue this with me. I know for sure...Don't tell me they implemented the post quantum for research purpose alone and not using it for there softwares. What are you now saying, Mr coach. You don't know anything about hackers.

They live to unleash there capabilities. They train hard and fight easy.

So what are you saying from Google searches without deeply rooted in the world of IT.

Please do your assignments well. And stop misleading your sheeples.
How can you quote what you didnt read? Or the quote came by inspiration?
You are just contradicting yourself, you started a subject by quoting a source that is not peer reviewed and even claiming more knowledge than an expert, how can you reinforce your knowledge from a source that has not been tetsted under a peer reviewed process?
Didnt you see IEEE transactions to quote from? or you don't have money to subscribe?
Can semantic security stand without mathematical proof? What do you understand by the word proof? I hope you know proof is noun and provable is adjective?
Programming and mathematics are two different subjects. In mathematics we have proofs while in programming we have syntax we are just language formats unilke proof in mathematics which are logical mathematical based reasoning. Reasoning which depend on laws and theories proven over time.
Just look at you there is nothing like hybrid cryptography my friend, show me where you saw hybrid cryptography. You think coding is cryptography thats where your problem lies. And that your IT guy knows coding doesnt mean he knows cryptography. Send me your mail i would send you the paper I am working. In 100 years you can never understand it.

You know a friend lool. My boy i dont employ cryptography i design it myself. I am a cryptanalyst. I design and give your friends to code for me lol.

Do you know Dan Boneh? Do you know Chris Piekert, oded regev? Do you know thomas prest, bruce scheiner? How many books on cryptography have you read? Do you Prof Said Boussakta, Prof Buchnan who wrote 1000 pages book on post quantum cryptography

You think cryptography is all this useless inbuilt funtions and libraries built inside matlab and c++. Go and use it to encrypt all your data would be wiped out.

Yes anything not peer reviewed is not valid, my mind is telling me you might just be a university student who is just curious about cybersecurity but dont know much about it because from your write up I can see how tall your arguments are. Complete novice!!

Imagine the rubbish and nonsense you are saying how can you say NIST is non regulatory let no engineering student see you and stone you there nonsense. You are talking like a market woman. Do you know how powerful NIST is? So you will encrypt your product and bring into the biggest market in the world; USA to sell withoust NIST approval, are you kidding me? If the germans are doing the encryption then why are their cars that use MBUX employ apple play by apple inc a US company?

Thats why your left fat cheek is swollen with ignorance because you know nada. You think US is your zoonigeria?

What business does a bank have with NIST? when they have SWIFT. You are just making me angry, I thought you were knowledgeable about how these things operate I can see you are a troll.

That an information was leaked doesnt mean it was only hacked. Somebody might steal an information and leak it to the public. Also most hacked data are because of the weak hash algorithm used and not the encryption algorithm.

What is the difference between hash and encryption?

The reason why the companies are not using it is because quantum computers have not yet come on stream. I know you don't even know what is a quantum computer? And besides these companies loose a lot of money from data losses than your militancy, thats why exxonmobil is not employing iot in their operations.

Nobody has implemented any quantum poo, your OS still uses AES. Quantum crypto and post quantum crypto are two different things. Quantum crypto you use light to generate keys while post quantum is crypto primitives that can withstand the brute force attavk from quantum computation. Please can you explain what I just said now.

I would say it again your confused heas would not allow you to know the difference between programming and cryptography? That you are an IT expert doesnt mean you are a crypto expert. You just know how to implement and not how to design.

1 Like 2 Shares

Re: Career Thread For Cybersecurity Experts: Meetups by akj26(m): 10:55am On Jan 14
Corporate training on CISSP, CHFI V9, CISA, CISM, CRISC, CGEIT, CEH V10, CCNA CYBER OPS, CySA+, and Security+ at affordable price

Exam vouchers and word for word valid exam dumps also available.

VISERION TRAINING CENTER CAN ALSO ASSIST YOU WITH YOUR EXAMS!

VISERION CYBERSECURITY TRAINING CENTER

Left wing, Ground floor, Nigeria Reinsurance Building, Opposite Unity Bank Tower, not far from NNPC Towers, Central Area, FCT Abuja.

Call or Whatsapp: 08167044626 for details.

www.viseriontrainingcenter.com

NOTE: Training cost include exam fee, official materials, breakfast and lunch with word for word valid exam dumps, certificate of completion of training and installation of hacking tools.

1 Like

Re: Career Thread For Cybersecurity Experts: Meetups by walexzee11(m): 11:57pm On Jan 14
akj26:
Corporate training on CISSP, CHFI V9, CISA, CISM, CRISC, CGEIT, CEH V10, CCNA CYBER OPS, CySA+, and Security+ at affordable price

Exam vouchers and word for word valid exam dumps also available.

VISERION TRAINING CENTER CAN ALSO ASSIST YOU WITH YOUR EXAMS!

VISERION CYBERSECURITY TRAINING CENTER

Left wing, Ground floor, Nigeria Reinsurance Building, Opposite Unity Bank Tower, not far from NNPC Towers, Central Area, FCT Abuja.

Call or Whatsapp: 08167044626 for details.

www.viseriontrainingcenter.com

NOTE: Training cost include exam fee, official materials, breakfast and lunch with word for word valid exam dumps, certificate of completion of training and installation of hacking tools.
I'm base in Ilorin presently, studying for the Comptia Sec+. Exam to be taken mid 2019.
Is your center pearson VTU certified to take exams, if Yes, can I take the exam at your centre if I present an Exam Voucher. And What are the requirements? Thanks.
Re: Career Thread For Cybersecurity Experts: Meetups by Possessedchild: 1:03am On Jan 15
jesmond3945:

How can you quote what you didnt read? Or the quote came by inspiration?
You are just contradicting yourself, you started a subject by quoting a source that is not peer reviewed and even claiming more knowledge than an expert, how can you reinforce your knowledge from a source that has not been tetsted under a peer reviewed process?
Didnt you see IEEE transactions to quote from? or you don't have money to subscribe?
Can semantic security stand without mathematical proof? What do you understand by the word proof? I hope you know proof is noun and provable is adjective?
Programming and mathematics are two different subjects. In mathematics we have proofs while in programming we have syntax we are just language formats unilke proof in mathematics which are logical mathematical based reasoning. Reasoning which depend on laws and theories proven over time.
Just look at you there is nothing like hybrid cryptography my friend, show me where you saw hybrid cryptography. You think coding is cryptography thats where your problem lies. And that your IT guy knows coding doesnt mean he knows cryptography. Send me your mail i would send you the paper I am working. In 100 years you can never understand it.

You know a friend lool. My boy i dont employ cryptography i design it myself. I am a cryptanalyst. I design and give your friends to code for me lol.

Do you know Dan Boneh? Do you know Chris Piekert, oded regev? Do you know thomas prest, bruce scheiner? How many books on cryptography have you read? Do you Prof Said Boussakta, Prof Buchnan who wrote 1000 pages book on post quantum cryptography

You think cryptography is all this useless inbuilt funtions and libraries built inside matlab and c++. Go and use it to encrypt all your data would be wiped out.

Yes anything not peer reviewed is not valid, my mind is telling me you might just be a university student who is just curious about cybersecurity but dont know much about it because from your write up I can see how tall your arguments are. Complete novice!!

Imagine the rubbish and nonsense you are saying how can you say NIST is non regulatory let no engineering student see you and stone you there nonsense. You are talking like a market woman. Do you know how powerful NIST is? So you will encrypt your product and bring into the biggest market in the world; USA to sell withoust NIST approval, are you kidding me? If the germans are doing the encryption then why are their cars that use MBUX employ apple play by apple inc a US company?

Thats why your left fat cheek is swollen with ignorance because you know nada. You think US is your zoonigeria?

What business does a bank have with NIST? when they have SWIFT. You are just making me angry, I thought you were knowledgeable about how these things operate I can see you are a troll.

That an information was leaked doesnt mean it was only hacked. Somebody might steal an information and leak it to the public. Also most hacked data are because of the weak hash algorithm used and not the encryption algorithm.

What is the difference between hash and encryption?

The reason why the companies are not using it is because quantum computers have not yet come on stream. I know you don't even know what is a quantum computer? And besides these companies loose a lot of money from data losses than your militancy, thats why exxonmobil is not employing iot in their operations.

Nobody has implemented any quantum poo, your OS still uses AES. Quantum crypto and post quantum crypto are two different things. Quantum crypto you use light to generate keys while post quantum is crypto primitives that can withstand the brute force attavk from quantum computation. Please can you explain what I just said now.

I would say it again your confused heas would not allow you to know the difference between programming and cryptography? That you are an IT expert doesnt mean you are a crypto expert. You just know how to implement and not how to design.






You are lost in the blues Cryptanalysis guy that doesn't understand that Cryptography and mathematics go in hand because most cryptography algorithms are written from exponential mathematical knowledge of numbers. Without mathematics how do you want to derive an efficient and secured crypto algorithm.

"Didnt you see IEEE transactions to quote from? or you don't "have money to subscribe?"

You know this is an insult . But i will laugh it off. grin grin grin You mean you have money to suscribe and you saying gibberish that Semantic Security is Provable Computing.

You said I quoted without reading, you must be joking you went to school without reading my tenses. Maybe because I'm convinced I'm possessed by spirit of wisdom and intellect and can easily ace the sciences and different subject...Now I rarely miss the point. And you shall remain my surbodinate in IT security. grin grin grin

Technically, with all due respect what I know in Cryptography without doing Google searches, you can't stand the line.

Now, what I'm worth, financially, grin Topic for another day. But very unfortunate I have no reason to register on IEEE because I can get anything i want from the University database. But my bad! I could not see a thing on relationship between Semantic Security and quantum cryptography on IEEE. The first research was probably 2016 according to what I know. So what's the fuss about your IEEE.

You are just funny to me.

My cute little thing. kiss
Re: Career Thread For Cybersecurity Experts: Meetups by akj26(m): 12:15pm On Jan 15
walexzee11:
I'm base in Ilorin presently, studying for the Comptia Sec+. Exam to be taken mid 2019.
Is your center pearson VTU certified to take exams, if Yes, can I take the exam at your centre if I present an Exam Voucher. And What are the requirements? Thanks.
Yes. You dont need any requirements to write security+. Since you are in Ilorin, on pearson choose a center close to you. We are based in Abuja.
We have word for word valid exam dumps available for security+ at affordable price.
Re: Career Thread For Cybersecurity Experts: Meetups by Maths125: 4:08pm On Jan 15
Good day, sholars in the house, I want to go for further study(M.sc) in Security of Information in Malaysia. Please advise me, I studied Industrial Mathematics at my undergraduate level. Thanks

(1) (Reply)

Fedex Redstar, Its Urgent! / Sign Up Free And Start Making Money Today. / Proffessional Experience

(Go Up)

Sections: politics (1) business autos (1) jobs (1) career education (1) romance computers phones travel sports fashion health
religion celebs tv-movies music-radio literature webmasters programming techmarket

Links: (0) (1) (2) (3) (4) (5) (6) (7) (8) (9)

Nairaland - Copyright © 2005 - 2019 Oluwaseun Osewa. All rights reserved. See How To Advertise. 282
Disclaimer: Every Nairaland member is solely responsible for anything that he/she posts or uploads on Nairaland.