PinnedProf Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceIf You Can’t Beat AI, Then Adopt ItIntegrating OpenAI into ApplicationsMar 4Mar 4
PinnedProf Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceAssange, Snowden and the Trap DoorJulian Assange being arrested last week brought back the memories of how he leaked Edward Snowden’s memos around the possible existence of…Apr 22, 20193Apr 22, 20193
Prof Bill Buchanan OBE FRSEOil and Vinegar and Multivariate Cryptography Methods Come to the ForeHere’s my 6 am doodles from this morning on multivariate cryptography:3h ago3h ago
Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceThe Real Minority Report?I attended the excellent INTERPOL Digital Forensics Experts Group (DFEG) 2024 last week, and the use of AI was top of the agenda. Its use…3h ago3h ago
Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceWhen the Power of Hash-based and Symmetric-key Methods Combine for PQC Signatures: Ascon-SignAnd, so, Dilithium, FALCON and SPHINCS+ have become NIST standards for digital signatures, and with an aim to remove RSA, ECDSA and EdDSA…4h ago4h ago
Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceThe Masked Defender: Meet RaacoonThere’s a Python library that is defined as Hazmat (Hazardous Material). Why? Because doing cryptography in the correct way is not an easy…2d ago2d ago
Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceSide Channels in Post Quantum CryptographyThe security community has produced some wonderful encryption algorithms, which are ultra secure, but eventually, all the bits end up in…3d ago3d ago
Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceStar Trek or Raccoon for the Battle of the Post Quantum SignaturesAnd, so, sometime in the near future, we need to remove RSA, ECDSA and EdDSA signatures. This is because quantum computers will break the…4d ago4d ago
Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceA Sneaky Post Quantum Raccoon Betters Exising NIST Standards for PQC Signatures?I attended the Crypto Day at the University of Edinburgh yesterday and saw some great presentations. One that really stood out was the…5d ago5d ago
Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceCryptographic Range Proofs: From Damgård to BulletproofsA range proof is one of the methods that can be used to create a Zero-Knowledge Proof (ZKP), and creates a proof that a value of between…5d ago5d ago