Homepage
Open in app
Sign in
Get started
ASecuritySite
When Bob Met Alice
Follow
Creating Your Own Symmetric Key Cipher in a Web Page
Creating Your Own Symmetric Key Cipher in a Web Page
JavaScript is both wonderful and a nightmare. So, let’s use it to create a simple symmetric key cipher using AES GCM. First, open up a…
Prof Bill Buchanan OBE FRSE
Feb 2
In Cybersecurity, What is GREASE?
In Cybersecurity, What is GREASE?
I do a good deal of analysis of the TLS stack, as it is fundamental for the trust and security of virtually every connection that we make…
Prof Bill Buchanan OBE FRSE
Jan 30
So What Does an RSA Signing Key Look Like?
So What Does an RSA Signing Key Look Like?
The Web Cryptography integration gives us a range of cryptographic methods we can use, including for RSA-PSS signing. With this, we can…
Prof Bill Buchanan OBE FRSE
Jan 27
Wrapping Encryption
Wrapping Encryption
Don’t you love (and hate) JavaScript? For one, it has little to do with Java, and, for two, it can be a nightmare to test. For testing, we…
Prof Bill Buchanan OBE FRSE
Jan 26
Diffie-Hellman Key Exchange in a Quantum World
Diffie-Hellman Key Exchange in a Quantum World
In 1976, the foundations of our modern cybersecurity infrastructure were created with the publication of the Diffie-Hellman key exchange…
Prof Bill Buchanan OBE FRSE
Jan 24
The Foundation of Cybersecurity: D3FEND™ 1.0
The Foundation of Cybersecurity: D3FEND™ 1.0
The New “Bible of Cybersecurity”
Prof Bill Buchanan OBE FRSE
Jan 20
Explaining RSA PKCS#1.5, RSA OAEP or RSA PSS
Explaining RSA PKCS#1.5, RSA OAEP or RSA PSS
Let me start. RSA can be used to encrypt or sign.
Prof Bill Buchanan OBE FRSE
Jan 12
About ASecuritySite: When Bob Met Alice
Latest Stories
Archive
About Medium
Terms
Privacy
Teams