Homepage
Open in app
Sign in
Get started
ASecuritySite
When Bob Met Alice
Follow
Telecoms Goes Post Quantum With Attribute-Based Encryption (ABE)
Telecoms Goes Post Quantum With Attribute-Based Encryption (ABE)
As you may know, some telecoms industries are well behind the rest of the world in terms of cybersecurity, and the GSM network is often…
Prof Bill Buchanan OBE FRSE
Mar 26
Are There More Electrons in the Universe Than 512-bit Prime Numbers?
Are There More Electrons in the Universe Than 512-bit Prime Numbers?
The answer is No!
Prof Bill Buchanan OBE FRSE
Mar 21
When the Cipher Equals The Message: Message Concealing in RSA
When the Cipher Equals The Message: Message Concealing in RSA
Imagine you created a cipher, and sometimes when you ciphered, the cipher is actually the original message. This could happen, for example…
Prof Bill Buchanan OBE FRSE
Mar 21
Provable Secure Public Key Encryption with the Rabin Method
Provable Secure Public Key Encryption with the Rabin Method
Well, the RSA public key encryption method is nearly 50 years old, and it still does not have a formal proof of its security. It has done…
Prof Bill Buchanan OBE FRSE
Mar 20
HP Release a Quantum-robust Printer
HP Release a Quantum-robust Printer
So, get ready for devices supporting a label of, “Quantum-robust” as a marketing tool. Recently, Samsung released its new S25 smartphone…
Prof Bill Buchanan OBE FRSE
Mar 19
Mobile Phone Networks, RFID and TETRA: The Weakest Links?
Mobile Phone Networks, RFID and TETRA: The Weakest Links?
KUSAMI: Cracked 21 days with 2400 RTX 4090 GPUs with Time-Memory-Trade-Off tables, and 38 hours on 2400 RTX GPUs for a brute force attack.
Prof Bill Buchanan OBE FRSE
Mar 9
Watch Out For TgToxic
Watch Out For TgToxic
Trend Micro are reporting a particularly bad Android malware going around Southeast Asia for the past few years, and which has been…
Prof Bill Buchanan OBE FRSE
Mar 1
About ASecuritySite: When Bob Met Alice
Latest Stories
Archive
About Medium
Terms
Privacy
Teams