Differences between revisions 9 and 11 (spanning 2 versions)
Revision 9 as of 2013-04-27 20:29:01
Size: 2667
Editor: ?OliverHamm
Comment:
Revision 11 as of 2013-05-01 12:22:37
Size: 2668
Editor: ?OliverHamm
Comment:
Deletions are marked like this. Additions are marked like this.
Line 6: Line 6:
 * '''Background''': I'm a 24 year old, third year student at Paris-Diderot University in Paris, France. I've studied and coded, among other languages, in C, Java, Ocaml, Python, the whole "internet package" (PHP, HTML, CSS, JavaScript, MySQL/PostgreSQL) and I have just started to learn C++ but I shouldn't have any problems with it since it looks like the offspring of Java and C to me, and I can already code in both. As for cryptography I've followed the Coursera courses ([[https://www.coursera.org/course/crypto|Here]]) a couple of months ago and I have the "Handbook of Applied Cryptography" from Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone on my nightstand so I can read about the magical universe of encryption and decryption every night.
 I have also been a member of [[http://www.hackthissite.org/| Hack This Site]] and [[http://www.enigmagroup.org/ |Enigma Group]] for over a year now, to get to learn about how penetration testing works ( they also have some cryptography exercises ). Why you say? Because I intend on working in computer security later on, and this is a good opportunity for me to acquire experience in that domain.
 * '''Background''': I'm a 24 year old, third year student at Paris-Diderot University in Paris, France. I've studied and coded, among other languages, in C, Java, Ocaml, Python, the whole "internet package" (PHP, HTML, CSS, JavaScript, SQL) and I have just started to learn C++ but I shouldn't have any problems with it since it looks like the offspring of Java and C to me, and I can already code in both. As for cryptography I've followed the Coursera courses ([[https://www.coursera.org/course/crypto|Here]]) a couple of months ago and I have the "Handbook of Applied Cryptography" from Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone on my nightstand so I can read about the magical universe of encryption and decryption every night.
 I have also been a member of [[http://www.hackthissite.org/| Hack This Site]] and [[http://www.enigmagroup.org/ |Enigma Group]] for over a year now, to get to know more about how penetration testing works ( they also have some cryptography exercises ). Why you say? Because I intend on working in computer security later on, and this is a good opportunity for me to acquire experience in that domain.
Line 13: Line 13:
 * '''Project schedule''': Brushing up on my cryptography and learning more C++ if needed, getting familiar with the different authentication protocols and figuring out how they can be added to the existing ones.  * '''Project schedule''': Brushing up on my cryptography and learning more C++ if needed, getting close and familiar with the different authentication protocols and figuring out how they can be added to the existing ones.

Application Form

  • Name: Oliver Hamm.

  • Contact/Email: Oliver.C.Hamm@gmail.com

  • Background: I'm a 24 year old, third year student at Paris-Diderot University in Paris, France. I've studied and coded, among other languages, in C, Java, Ocaml, Python, the whole "internet package" (PHP, HTML, CSS, ?JavaScript, SQL) and I have just started to learn C++ but I shouldn't have any problems with it since it looks like the offspring of Java and C to me, and I can already code in both. As for cryptography I've followed the Coursera courses (Here) a couple of months ago and I have the "Handbook of Applied Cryptography" from Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone on my nightstand so I can read about the magical universe of encryption and decryption every night. I have also been a member of Hack This Site and Enigma Group for over a year now, to get to know more about how penetration testing works ( they also have some cryptography exercises ). Why you say? Because I intend on working in computer security later on, and this is a good opportunity for me to acquire experience in that domain.

  • Project title: One-time-password (token) based authentication and transactions

  • Project details: To be added soon! ( Contacting the Mentors )

  • Synopsis: Enhancing/creating some authentication and transaction protocols based on the one-time pass protocol.

  • Benefits to Debian: Simply put: you can have walls as thick and high as you want, but if anyone can get the key that opens the door, your castle will fall.

  • Deliverables: To be added soon! ( Contacting the Mentors )

  • Project schedule: Brushing up on my cryptography and learning more C++ if needed, getting close and familiar with the different authentication protocols and figuring out how they can be added to the existing ones.

  • Exams and other commitments: I have exams until the end of May, and possibly in June depending on the circumstances.

  • Other summer plans: Apart from turning my keyboard into a steaming pile of burnt plastic and my brain to mush? No.

  • Why Debian?: "Kali", which is the codename for a Linux distro that evolved from the "Backtrack" series built around computer security testing, is mostly based on Debian, and since I'll be using it for work soon enough I want to know how it really works.

  • Are you applying for other projects in SoC?: I will be applying to a couple of Wireshark and Crypto Stick projects.