PinnedProf Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceIf You Can’t Beat AI, Then Adopt ItIntegrating OpenAI into ApplicationsMar 4Mar 4

PinnedProf Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceAssange, Snowden and the Trap DoorJulian Assange being arrested last week brought back the memories of how he leaked Edward Snowden’s memos around the possible existence of…Apr 22, 20193Apr 22, 20193

Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceThe Smallest and Fastest PQC Digital Signature?And, so, NIST want an alternative to Dilithium, Falcon and SPHINCS+ for quantum robust digital signatures, and are now assessing a range of…21h ago21h ago

Prof Bill Buchanan OBE FRSEFinally, Multivariate Cryptography Should Take Centre StageIn cryptography, we like finite fields. Why? Because they constrain our outputs and make our computations much simpler than having an…2d ago2d ago

Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceProvable Security With Oil and VinegarOverall, quantum computers will be able to break our existing public key methods, such as discrete logs, RSA and elliptic curves.4d ago4d ago

Prof Bill Buchanan OBE FRSEWe Will, We Will, Rock You, 2024In my teaching of hashing methods, we use the RockYou dataset, and which contains a common set of passwords from a company named RockYou…4d ago4d ago

Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AlicePermuted Kernel Problem — An NP-Hard ProblemAdi Shamir is one of the greatest researchers in computer computer science, and, in 1989, he proposed a public key encryption method that…6d ago6d ago

Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceHuFu (Hash-and-Sign Signatures From Powerful Gadgets)There are two main approaches to lattice-based signatures: Fiat-Shamir and Hash-and-sign. Overall, Dilithium uses a Fiat-Shamir approach…Jul 8Jul 8

Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceLattice Encryption and SigningI’m working on lattice encryption and signing and investigating NTRUEncrypt and NTRUSign. Overall, both of these methods are based on the…Jul 7Jul 7

Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceThe ChatGPT Backdoor and New PersonalitiesIn cybersecurity, the usage of a backdoor key has been seen many times, and where a developer slips in a way to reveal something secret or…Jul 61Jul 61