PinnedProf Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceIf You Can’t Beat AI, Then Adopt ItIntegrating OpenAI into ApplicationsMar 4Mar 4
PinnedProf Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceAssange, Snowden and the Trap DoorJulian Assange being arrested last week brought back the memories of how he leaked Edward Snowden’s memos around the possible existence of…Apr 22, 20193Apr 22, 20193
Prof Bill Buchanan OBE FRSEHomomorphic Encryption for Gray CodesWhen I studied electronic engineering, there was one code that was so simple to implement but could minimise the number of changes that we…1d ago1d ago
Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceMore Maths, PleaseTo me, the countries that will be successful in the future are the ones who will best produce scientists, engineers and mathematicians…5d ago15d ago1
Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceProving Alice is Alice With A Pseudo Random Function (PRF)Let’s say that Bob wants Alice to prove she knows a secret value. For this, we could use a PRNG (Pseudo-random number generator), and which…Sep 12Sep 12
Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceFinally, A Security Framework for Devices: EMB3DIt seems like a dream, but what if we could design systems which were “secure by design”, and not have to fix problems later on. And, the…Sep 11Sep 11
Prof Bill Buchanan OBE FRSEAttribute CertificatesAnyone who knows something about identity and authorisation will know that they are often best separated from each other and where an…Sep 9Sep 9
Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceA True Random Number Generator: Jitter FluctionsThe core of your security is typically explicitly linked to one thing … pseudo-random number generation. While we can integrate with a…Sep 9Sep 9
Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceThe Brainpool CurvesThe P256 curve is used extensively in cybersecurity, and it is likely that it is being used for network connection to this Web page. This…Sep 81Sep 81
Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceThe Wonderful Ring Learning With Errors (RLWE) and Homomorphic EncryptionWe live in a computing world which has really changed much from the computing model defined by Von Numan. Basically all our data bits can…Sep 7Sep 7