Homepage
Open in app
Sign in
Get started
ASecuritySite
When Bob Met Alice
Follow
The Great Security Protocol That Has Just Not Happened: Meet DNSSEC
The Great Security Protocol That Has Just Not Happened: Meet DNSSEC
And, so we have flaws in our Internet protocols that need to be fixed. But is “just enough” security enough for something that provides the…
Prof Bill Buchanan OBE FRSE
May 27
Your Whole Life Recorded
Your Whole Life Recorded
“If you want to keep a secret, you must also hide it from yourself.” ― George Orwell, 1984
Prof Bill Buchanan OBE FRSE
May 26
Length Extension Attacks with MD5, SHA-1 and SHA-256
Length Extension Attacks with MD5, SHA-1 and SHA-256
The foundation of trust in cybersecurity is laid by the simple concept of data hashing, and where we take data and create a fixed-length…
Prof Bill Buchanan OBE FRSE
May 23
Reusable Hash Collisions
Reusable Hash Collisions
The basis of trust in data is typically focused on a cryptographic hash. With this, we can tell if two data elements are the same or not…
Prof Bill Buchanan OBE FRSE
May 23
When Your Paper Is Critized … Have Faith In Your Work
When Your Paper Is Critized … Have Faith In Your Work
As an academic, we receive feedback that can be quite brutal. In fact, there’s often a “third reviewer syndrome”, and where two of the…
Prof Bill Buchanan OBE FRSE
May 23
Verifiable Delay Function (VDF) using Modular Square Roots
Verifiable Delay Function (VDF) using Modular Square Roots
Verifiable Delay Function (VDFs) were first proposed by Dan Bohen et al [3], but it was Pietrzak [1] and Wesolowski [2] who then proposed…
Prof Bill Buchanan OBE FRSE
May 22
The Seven Cybersecurity Commandments
The Seven Cybersecurity Commandments
And Whatever Happened To “Secure By Design”?
Prof Bill Buchanan OBE FRSE
May 10
About ASecuritySite: When Bob Met Alice
Latest Stories
Archive
About Medium
Terms
Privacy
Teams