PinnedPublished inASecuritySite: When Bob Met AliceIf You Can’t Beat AI, Then Adopt ItIntegrating OpenAI into ApplicationsMar 4, 20241Mar 4, 20241
PinnedPublished inASecuritySite: When Bob Met AliceAssange, Snowden and the Trap DoorJulian Assange being arrested last week brought back the memories of how he leaked Edward Snowden’s memos around the possible existence of…Apr 22, 20193Apr 22, 20193
A Bluffer’s Guide to FIPSThere are two core things that have driven the Internet: RFCs (Request for Comments) and FIPS standards. Before these, we had slow and…2d ago12d ago1
It’s Your Cybersecurity Birthday!I love giving live cybersecurity demos, and it’s great when they work well. Apart from hacking dolls, kettles, weighing scales, and CCTV…3d ago3d ago
Published inASecuritySite: When Bob Met AliceAre There More Electrons in the Universe Than 512-bit Prime Numbers?The answer is No!3d ago43d ago4
Published inASecuritySite: When Bob Met AliceWhen the Cipher Equals The Message: Message Concealing in RSAImagine you created a cipher, and sometimes when you ciphered, the cipher is actually the original message. This could happen, for example…4d ago4d ago
Published inASecuritySite: When Bob Met AliceProvable Secure Public Key Encryption with the Rabin MethodWell, the RSA public key encryption method is nearly 50 years old, and it still does not have a formal proof of its security. It has done…4d ago4d ago
Cracking A Nearly One-Way FunctionFor our standard maths, we have a function f(x), and then are able to reverse it to find f^{-1}(x). This could be:4d ago4d ago
NCSC Guidelines on PQCToday, the NCSC published a document on key milestones on the migration towards Post Quantum Cryptography (PQC) [here]:4d ago4d ago
Published inASecuritySite: When Bob Met AliceHP Release a Quantum-robust PrinterSo, get ready for devices supporting a label of, “Quantum-robust” as a marketing tool. Recently, Samsung released its new S25 smartphone…5d ago5d ago