Cyber Security

Luke Hally

Blog

Join me as I undertake my Masters of Cyber Security

Latest Posts

Security engineering

The Telegraph Problem, MACS

Integrity of messages is a problem that is as old as messengers. In the old days, people would seal a message, they knew they couldn’t

Read More »
Security engineering

Risk

Risk is something we deal with all of the time, and humans are good at assessing some risks and bad at assessing others. But, we

Read More »
Security engineering

Symmetric Ciphers

A long post today, we’ll recap of classic ciphers, look at the history of modern symmetric ciphers. Finally we’ll look at entropy, a way of

Read More »
Security engineering

RSA Practice

Now that we covered asymmetric cryptography and and how RSA works, there’s nothing like working through equations to understand them. So let’s do some practice

Read More »
Security engineering

Asymmetric Cryptography

We learnt about the basics of cryptography when we learnt about ciphers and secrets. These involve symmetrical cryptography, meaning that the person doing the enciphering

Read More »
Security engineering

Merkle Puzzles

Merkle puzzles are the first publicly recorded example of asymmetric cryptography. It was devised by Ralph Merkle, he was trying to work out a way

Read More »
Security engineering

Security Engineering

The start of a new course this week – Intro to Security Engineering, where we look at applying engineering principles to security. Although cyber security

Read More »