ASecuritySite: When Bob Met Alice

This publication brings together interesting articles related to cyber security.

1,138 4 Followers
Editors
Prof Bill Buchanan OBE

Prof at Napier. Serial innovator. Crypto Punk. Believer in fairness, justice & freedom. EU Citizen. Auld Reekie native. Old World Breaker. New World Creator.

Latest Posts

The Fall of Trust and the Rise of Silicon Valley …

Today was a special day for us. In the morning we hosted Bruce Schneier, and then in the evening it was Andreas Antonopoulos. Both…

The Backdoor in your Living Room

I had to smile the other day when I saw this headline:

Alice Whispers To Bob: At the core of privacy in the 21st Century is Extended Triple…

Our old digital world of insecure methods is coming to an end. Basically, we took protocols which had little in the way of security, and…

In 2020: Get Ready for Day 0 of the World of Tokenization

While our governments and public sector have often shown resistance to a world which is based on tokens, it is Facebook who are truly…

Forget AES and ChaCha20, Here’s Encryption, Hashing and Integrity With a Sponge

Well. Just when you thought that symmetric key encryption was all about AES and ChaCha20, message signing (MAC) was all about HMAC, and…

One of the greatest advancements in Cybersecurity: The Sponge Function (Keccak and SHAKE)

I think that the Sponge function, as used by IOTA, SHA-3, and SHAKE, is one of the greatest enhancement in cybersecurity within the last…

SHAKE Stirs-up Crypto

When I teach cryptography, I normally define the hashing methods (MD5, SHA-1, SHA-256, and so on), the symmetric key methods (AES, 3DES…

Multi-bit public key encryption with Learning With Errors (LWE)

Learning With Errors (LWE) is a quantum robust method of cryptography. Initially we create a secret value (s) and which is our private key…

Eve The Magician Does A Quantum Robust Trick — Learning With Errors

Eve takes to the stage for another cyber magic show.

Frame Feng Shui … Hammering Memory and RAMBleed

So what are the keys to your castle? Well, often it is your SSH keys, as these are the ones that are used to gain access to your cloud and…

Reviews

No reviews, submit yours below.
Add review

Login to submit your review.