PinnedPublished inASecuritySite: When Bob Met AliceIf You Can’t Beat AI, Then Adopt ItIntegrating OpenAI into ApplicationsMar 4, 20241Mar 4, 20241
PinnedPublished inASecuritySite: When Bob Met AliceAssange, Snowden and the Trap DoorJulian Assange being arrested last week brought back the memories of how he leaked Edward Snowden’s memos around the possible existence of…Apr 22, 20193Apr 22, 20193
Piger Fabrica Syndrome: The End of Public Key Encryption?What’s the shortest book in the world?1d ago51d ago5
Xmas Coming Early: OpenSSL Finally Enters a Quantum WorldThere is just one week to go (8 April 2025) for a major cybersecurity software release: OpenSSL 3.5.4d ago4d ago
Get Ready for FN-DSA: Slower Than Dilithium But Smaller Keys/CiphertextCurrently, we have two main digital signature standards for PQC. These are FIPS 204 (Dilithium — ML-DSA) and FIPS 205 (SPHINCS+ — SLH-DSA)…5d ago5d ago
How Public Key Encryption (PKE) Differs From Key Encapsulation Methods (KEMs)I got into a big debate today with someone who just didn’t understand the difference between PKE and KEM, so here’s a basic explanation…Mar 261Mar 261
Published inASecuritySite: When Bob Met AliceTelecoms Goes Post Quantum With Attribute-Based Encryption (ABE)As you may know, some telecoms industries are well behind the rest of the world in terms of cybersecurity, and the GSM network is often…Mar 262Mar 262
A Bluffer’s Guide to FIPSThere are two core things that have driven the Internet: RFCs (Request for Comments) and FIPS standards. Before these, we had slow and…Mar 231Mar 231
It’s Your Cybersecurity Birthday!I love giving live cybersecurity demos, and it’s great when they work well. Apart from hacking dolls, kettles, weighing scales, and CCTV…Mar 22Mar 22