Homepage
Open in app
Sign in
Get started
ASecuritySite
When Bob Met Alice
Follow
Length Extension Attacks with MD5, SHA-1 and SHA-256
Length Extension Attacks with MD5, SHA-1 and SHA-256
The foundation of trust in cybersecurity is laid by the simple concept of data hashing, and where we take data and create a fixed-length…
Prof Bill Buchanan OBE FRSE
May 23
Reusable Hash Collisions
Reusable Hash Collisions
The basis of trust in data is typically focused on a cryptographic hash. With this, we can tell if two data elements are the same or not…
Prof Bill Buchanan OBE FRSE
May 23
When Your Paper Is Critized … Have Faith In Your Work
When Your Paper Is Critized … Have Faith In Your Work
As an academic, we receive feedback that can be quite brutal. In fact, there’s often a “third reviewer syndrome”, and where two of the…
Prof Bill Buchanan OBE FRSE
May 23
Verifiable Delay Function (VDF) using Modular Square Roots
Verifiable Delay Function (VDF) using Modular Square Roots
Verifiable Delay Function (VDFs) were first proposed by Dan Bohen et al [3], but it was Pietrzak [1] and Wesolowski [2] who then proposed…
Prof Bill Buchanan OBE FRSE
May 22
The Seven Cybersecurity Commandments
The Seven Cybersecurity Commandments
And Whatever Happened To “Secure By Design”?
Prof Bill Buchanan OBE FRSE
May 10
The Slow Adoption of Cryptography in .NET
The Slow Adoption of Cryptography in .NET
And, so, .NET 9.0 preview is here, and it’s all a bit of a dissapointment:
Prof Bill Buchanan OBE FRSE
May 10
Best Friends: OpenAI and Stack Overflow
Best Friends: OpenAI and Stack Overflow
I must admit, I have learnt a good deal from using Stack Overflow. It is there that true experts often post excellent responses to…
Prof Bill Buchanan OBE FRSE
May 8
About ASecuritySite: When Bob Met Alice
Latest Stories
Archive
About Medium
Terms
Privacy
Teams