PinnedProf Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceIf You Can’t Beat AI, Then Adopt ItIntegrating OpenAI into Applications·3 min read·Mar 4, 2024----
PinnedProf Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceAssange, Snowden and the Trap DoorJulian Assange being arrested last week brought back the memories of how he leaked Edward Snowden’s memos around the possible existence of…·5 min read·Apr 22, 2019--3--3
Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceNostr Identification Protocol-06 (NIP-06)Nostr (Notes and Other Stuff Transmitted by Relays) uses clients and relays, and where users run clients, and where anyone can be a relay…2 min read·7 hours ago----
Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceNostr: Notes and Other Stuff Transmitted by RelaysJust like in 1984, our world of communications is often controlled by centralised authorities. This can, of course, be a good thing, as it…4 min read·17 hours ago----
Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceQuadratic Roots for a Modulo of a Prime of 5 (mod 8)Public key encryption has a range of number theoretic problems, of which there is no actual proof of security [1]:4 min read·19 hours ago--1--1
Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceAre Your Lucky?Read Euler, Read Euler. The master of us all. — Pierre−Simon Laplace6 min read·1 day ago----
Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceIntractable Problems in Public Key: SQUARINGPublic key encrytion has a range of number theoretic problems, of which there is no actual proof of security [1]:4 min read·2 days ago----
Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceThe Pohlig-Hellman AttackCurve 25519 is a little bit of a problem — in that it has a subgroup with a co-factor of 8. This means that we have an eighth of the total…4 min read·4 days ago----
Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceLand Mines, Dragons and Dinosaurs with Laser GunsCofactors in Prime Groups6 min read·6 days ago----
Prof Bill Buchanan OBE FRSEThe Lizard Method of Point ReversalA common operation on elliptic curves is to hash data onto a point onto the curve. But can we reverse the point back to the hashed data…2 min read·Apr 28, 2024----