Is Cryptography the Ohm’s Law of Cyber Security?

For some reason, cryptography seems to be the weakest area of understanding in the Cyber Security profession. I’ve lost count of the number of times I’ve debated with a cyber security professional that public key encryption is not actually used to encrypt things, and it’s only used to sign for identity and in key exchange. No-one actually needs to know a great deal about the actual mechanics of…

This publication brings together interesting articles related to cyber security.

Recommended from Medium

Old With New … ElGamal and Elliptic Curve Cryptography

The Magical Bike Lock Unscrambler and Other Thoughts on Security

{UPDATE} The Ultimate Video Poker Pocket Book Hack Free Resources Generator

Threat Intelligence

Apple Mail Stores Encrypted Emails in Plain Text Database, fix included!

{UPDATE} Fairy Tale Coloring Book Game Hack Free Resources Generator

GamyFi is delighted to announce the first ever dual chain Quad IDO.

Where is my ID?

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Prof Bill Buchanan OBE

Prof Bill Buchanan OBE

Professor Cryptography. Serial innovator. Believer in fairness, justice & freedom. EU Citizen in heart. Living by the sea. Old World Breaker. New World Creator.

More from Medium

Patents: Changing the World, Or Not?

What’s At The Core of Cybersecurity on the Internet? Well, it probably includes ECDH

The Wonderful BLS12 Curves … Just Ready For a Privacy-Respecting World

HVZK (Honest Verifier Zero Knowledge) For Paillier and Using Kryptology