The Telegraph Problem, MACS
Integrity of messages is a problem that is as old as messengers. In the old days, people would seal a message, they knew they couldn’t
Join me as I undertake my Masters of Cyber Security
Integrity of messages is a problem that is as old as messengers. In the old days, people would seal a message, they knew they couldn’t
Risk is something we deal with all of the time, and humans are good at assessing some risks and bad at assessing others. But, we
A long post today, we’ll recap of classic ciphers, look at the history of modern symmetric ciphers. Finally we’ll look at entropy, a way of
Now that we covered asymmetric cryptography and and how RSA works, there’s nothing like working through equations to understand them. So let’s do some practice
We learnt about the basics of cryptography when we learnt about ciphers and secrets. These involve symmetrical cryptography, meaning that the person doing the enciphering
Merkle puzzles are the first publicly recorded example of asymmetric cryptography. It was devised by Ralph Merkle, he was trying to work out a way
The start of a new course this week – Intro to Security Engineering, where we look at applying engineering principles to security. Although cyber security
There has been a fair bit of conjecture in the press about Chinese backed cyber attacks in recent times, but there has been no evidence
© Copyright 2021, Luke Hally