An Efficient and Secure Key Exchange Method: X25519 and Blake2b

Well, it all started in 1976, when Diffie and Hellman proposed the Diffie-Hellman key exchange method. And we are still using it today. The discrete log methods have been replaced by elliptic curve methods, and we have added in more authentication of the public key, but it’s still roughly the same method. For this Alice generates a, and Bob generates b, and they compute their…

This publication brings together interesting articles related to cyber security.

Recommended from Medium

{UPDATE} Pipe Cube Hack Free Resources Generator

How To Manage USDT On Ledger With MyEtherWallet

Would You Put Your Security in the Hands of a Guess?

When Fast Just Isn’t Enough: Nobody inspects the spammish repetition

Big news! 100000 Members & 22% token claimed.

Basically IoT Bluetooth Security is Rubbish!

Security Incident response framework

Story About Stop 10000+ users to get Their job notification

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Prof Bill Buchanan OBE

Prof Bill Buchanan OBE

Professor Cryptography. Serial innovator. Believer in fairness, justice & freedom. EU Citizen in heart. Living by the sea. Old World Breaker. New World Creator.

More from Medium

When Distributed Ledgers and Trust Infrastructures Just Become As Natural As Ethernet and SQL…

Doing What It Says on The Crypto Tin: Verified Cryptography Code For Everyone

Cracking Elliptic Curves Using Pairing and Kryptology

Taher Elgamal —One of the Fathers of SSL and Creator of ElGamal Encryption