PinnedProf Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceIf You Can’t Beat AI, Then Adopt ItIntegrating OpenAI into Applications·3 min read·Mar 4, 2024----
PinnedProf Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceAssange, Snowden and the Trap DoorJulian Assange being arrested last week brought back the memories of how he leaked Edward Snowden’s memos around the possible existence of…·5 min read·Apr 22, 2019--3--3
Prof Bill Buchanan OBE FRSEOil and Vinegar and Multivariate Cryptography Methods Come to the ForeHere’s my 6 am doodles from this morning on multivariate cryptography:5 min read·4 hours ago----
Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceThe Real Minority Report?I attended the excellent INTERPOL Digital Forensics Experts Group (DFEG) 2024 last week, and the use of AI was top of the agenda. Its use…5 min read·4 hours ago----
Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceWhen the Power of Hash-based and Symmetric-key Methods Combine for PQC Signatures: Ascon-SignAnd, so, Dilithium, FALCON and SPHINCS+ have become NIST standards for digital signatures, and with an aim to remove RSA, ECDSA and EdDSA…4 min read·4 hours ago----
Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceThe Masked Defender: Meet RaacoonThere’s a Python library that is defined as Hazmat (Hazardous Material). Why? Because doing cryptography in the correct way is not an easy…4 min read·2 days ago----
Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceSide Channels in Post Quantum CryptographyThe security community has produced some wonderful encryption algorithms, which are ultra secure, but eventually, all the bits end up in…5 min read·3 days ago----
Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceStar Trek or Raccoon for the Battle of the Post Quantum SignaturesAnd, so, sometime in the near future, we need to remove RSA, ECDSA and EdDSA signatures. This is because quantum computers will break the…5 min read·4 days ago----
Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceA Sneaky Post Quantum Raccoon Betters Exising NIST Standards for PQC Signatures?I attended the Crypto Day at the University of Edinburgh yesterday and saw some great presentations. One that really stood out was the…11 min read·5 days ago----
Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceCryptographic Range Proofs: From Damgård to BulletproofsA range proof is one of the methods that can be used to create a Zero-Knowledge Proof (ZKP), and creates a proof that a value of between…4 min read·5 days ago----