PinnedProf Bill Buchanan OBEinASecuritySite: When Bob Met AliceIf You Can’t Beat AI, Then Adopt ItIntegrating OpenAI into Applications·3 min read·Mar 4, 2024----
PinnedProf Bill Buchanan OBEinASecuritySite: When Bob Met AliceAssange, Snowden and the Trap DoorJulian Assange being arrested last week brought back the memories of how he leaked Edward Snowden’s memos around the possible existence of…·5 min read·Apr 22, 2019--3--3
Prof Bill Buchanan OBEinASecuritySite: When Bob Met AliceCrazy Crypto: Meet CVE-2024–31497Straight from the School of Cook Your Own Crypto3 min read·1 day ago--1--1
Prof Bill Buchanan OBE2x2TB USB Disks for £58!I received this advert for a 2TB USB on Microsoft Start:·3 min read·2 days ago--2--2
Prof Bill Buchanan OBEinASecuritySite: When Bob Met AliceDES, AES, SHA-3, LWC and PQC: Are Cryptography Competitions a Good Idea?We are so lucky to have Daniel J Bernstein coming along for a chat [here], and he has a great new paper on cryptographic competitions for…·4 min read·3 days ago----
Prof Bill Buchanan OBENational Quantum Day: A Bluffers Guide to PQCYesterday was National Quantum Day, and which aimed to increase awareness of the rise of quantum computers. One of the most significant…·9 min read·3 days ago----
Prof Bill Buchanan OBEinASecuritySite: When Bob Met AliceWhen Fiat and Shamir Changed The World of Cybersecurity and PrivacyWith Zero-Knowledge Proofs (ZKPs), I can prove I have knowledge of my data, without revealing it. This might relate to my password, my face…·3 min read·5 days ago----
Prof Bill Buchanan OBEinASecuritySite: When Bob Met Alicebcrypt or Argon 2?We were so priviledged to have the mighty Troy Hunt come along to speak to our students, and he talked about companies moving their hash…·4 min read·6 days ago----
Prof Bill Buchanan OBETraditional trust mechanisms no longer work?As we become more dependent on the Internet, we can never be 100% sure that everything is correct and as it should be. This might relate to…·10 min read·6 days ago--1--1
Prof Bill Buchanan OBEinASecuritySite: When Bob Met AliceCreating Trust and Replacing Public Key Encryption: The Needham Schroeder ProtocolWhat’s one of the most difficult things to do in cybersecurity? Ans: Key management and in the creation of a trust infrastructure. Well…·4 min read·6 days ago----