Week 7 | 8 Learning Log

This is my entry for the week 7 and week 8 learning log our first week, week 7, we only learned a few things since it was College Week XD but i remembered some things that Sir Justin said. It was about Cryptography. In the week 7, it was briefly said but after College Week, it was discussed. Its about the art of securing messages, data, anything for unwanted eyes.


Basically speaking, its about protecting information by using techniques which are made specifically for hiding information. Its being used by companies, the military, any organization which doesn’t want anybody to see their information. There are many variations of techniques to hide that information. We have the RSA technique which uses two prime numbers that can be used to result into a public key and by using the public key, it will become a private key. These keys hold the power to encrypt data and to decrypt it.encryption

Before moving on to the next technique that i have learned, I was reminded of the two important things that can help to improve the encryption of the data. Its diffusion and confusion, and with those two, you can create an encryption which is hard to decrypt or to crack. Diffusion is when the plaintext is disperse and confusion is about randomizing the order so that decrypting the data will be much harder. Plaintext is the data which holds the information. It is used from the start to be encrypted and when you decrypt it, it results into the plaintext. I also learned that there is no unbreakable encryption and a public access encryption is much stronger than a private one because if the encryption code of the public access is cracked, it would be improved so that it won’t be cracked again.

The other encryption technique is the Diffie Hellman technique, which I think that its awesome, because eventhough some third party character is listening on your conversation with another person, you can still create a key by the end of the conversation without the third party character knowing it. Isn’t that awesome? Shocked

With this technique, the information is more secured because the hacker cannot get the keys, but it has a problem. Its about the authentication issue that sir mentioned, but its not really a problem because its just the third party character listening to the other end of the conversation, portraying as the other person. The people who started the conversation could just start all over again, creating another set of keys. Overall, I think that the discussion about cryptography really explained how things work in the encryption of data 🙂 Thanks for reading!! 🙂


Week 5 | 6

Waah! We’re here now! For me these weeks seems like very relaxing. Why? Because in our class time, you’re not forced to attend class because every group has designated time to report and it’s up to you if you want to listen or attend class. It seems like that there’s no activities to do… BUT these weeks are super duper INTENSE to the highest level. 😛Shocked

As what I’ve said earlier, there’s designated time to report your partial Machine Project and your Case Study about your group’s topic. These was really intense because our group pass our Case Study at 11:58pm I think. Because we’re really revising and revising and revising our paper. We’re not that confident to pass our case study saying “Ipasa na natin, Ayan na lang, Malalate na bahala na”. Our group is not like that. Haha that’s why muntik na kaming malate sa mismong time ng pasahan. Our group is really not a ‘perfect’ group. Because we really have mistakes, arguments all the time and sometimes were ‘tamad’ to finish our project 😛 But after all this time, we did our very best to present our case study!  Yay! Thank you Lord!


Well, we discuss about the Machine Project of our group just the partial. Migs talk about it and show what is to be discussed. Reporting in front of Sir Infosec was very nakakakaba even though he’s the only one watching 😛 haha all of the members of our group was discussed about every points that is ask in the criteria. Woooh! AJA! Our case study is about, driverless car. Honestly, I am not really familiar of this. Haha but these kinds of cars exist na pala. And I didn’t know about it 😦 Thank God to this Case Study 🙂 I learned a lot!! Well, we point out hacking in this study. And each of us, elaborate what is about this kinds of car.


After all this efforts and puyats, yay! We finished reporting!! Yay!! FINALS NA 🙂


The end…