Published in ASecuritySite: When Bob Met Alice·PinnedThe Strange Tale of Dual_EC_DRBGJulian Assange being arrested recently brought back memories of how he leaked Edward Snowden’s memos around the possible existence of an NSA-sourced cryptographic backdoor — the Dual EC standard (Dual_EC_DRBG). So let’s dive into the method and the trap door, and see the “magic” behind it. With Elliptic Curve methods…Security5 min read
Published in ASecuritySite: When Bob Met Alice·20 hours agoProving I Know Alice, Bob, Carol and DaveWe release too much of our information to others. Every time we enter our password into a system, we are revealing it for others to see. So, why can’t we just prove some knowledge of our secrets, in order that we know our secret? Well, this is the objective of…Cybersecurity2 min read
Published in ASecuritySite: When Bob Met Alice·2 days agoOde To The IEEE Protocols … Here’s 802.1Q and 802.1XAround the turn of the century, I wrote two major books ... The Handbook of The Internet and the Handbook of Data Communications. These were written in the days before the large-scale access to information on the Web, so I used to spend hours reading books, and sourcing them wherever…Cybersecurity4 min read
Published in ASecuritySite: When Bob Met Alice·2 days agoOne Of The Greatest Protocols — and One of The Greatest Weaknesses — of the Internet … Meet The Mighty BGPSo the Internet isn’t the large-scale distributed network that DARPA tried to create, and which could withstand a nuclear strike on any part of it. At its core is a centralised infrastructure of routing devices and of centralised Internet services. The protocols its uses are basically just the ones that…Cybersecurity9 min read
Published in ASecuritySite: When Bob Met Alice·3 days agoVoice, Video and QoSThe Internet was designed for computer traffic. This traffic has the characteristic of requiring to be error-free (and where an error will typically cause a retransmission of data or could corrupt the received data), and not that sensitive to delays. Overall, theInternet we have created has these characteristics, and where…Cisco3 min read
Published in ASecuritySite: When Bob Met Alice·4 days agoOur Research Impact“Mighty oaks from little acorns grow” — In innovation and research, one quote sticks out … “Mighty oaks from little acorns grow”. And so, it is one little seed that you plant in the ground, that eventually becomes the world-leading company, or the great scientific breakthrough. It was the seed of the BBC Micro that created ARM…Edinburgh Napier11 min read
4 days agoOde To Network SwitchesWell, routers built the Internet, but it was network switches that scaled it. So, before we start, let’s get our terms correct. The transmission of data over Ethernet is defined at Layer 2 (Data Link Layer), and where we have a data frame. This data frame encapsulates a data packet…Network2 min read
Published in ASecuritySite: When Bob Met Alice·5 days agoThe Device That Built The InternetWe take our technological world so much for granted, and we seem to forget all of the things that make it work. The protocols that scaled the Internet have been ARP, IP, TCP, and UDP, along with the application layer protocols (HTTP, FTP, TELNET and so on). But the device…Cybersecurity3 min read
Published in ASecuritySite: When Bob Met Alice·6 days agoGo Learn Cisco …We have built a very successful MSc course, and at its core is the strong understanding of networking, network protocols and network security. Why? Because, these topics are the core foundation of cybersecurity. If you understand how IP and TCP work, and how the application layer protocols operation, you have…Cisco2 min read
Published in ASecuritySite: When Bob Met Alice·May 9Dig Out Your Patents, And Watch What You Use … $1.1 billion for a Patent BreachAnd Robert J McEliece, RIP — I have a number of patents to my name. We did these patents to protect our spin-out companies from entering the market and did not have any intention to go after others who breached it. But, the California Institute of Technology (Caltech) has shown the power of patents by winning…Cybersecurity3 min read