Prof B Buchanan OBE FRSE(@billatnapier) 's Twitter Profileg
Prof B Buchanan OBE FRSE

@billatnapier

Professor of Cryptography. Serial innovator. Believer in fairness, justice & freedom. Based in Edinburgh. Old World Breaker. New World Creator. Building trust.

ID:226900035

linkhttp://asecuritysite.com calendar_today15-12-2010 11:05:15

65,9K Tweets

12,1K Followers

5,5K Following

Prof B Buchanan OBE FRSE(@billatnapier) 's Twitter Profile Photo

Creating a CTF for your students, pupils or employees? Here are hundreds of CTF generators, and each is uniquely generated ... asecuritysite.com/ctf/

Creating a CTF for your students, pupils or employees? Here are hundreds of CTF generators, and each is uniquely generated ... asecuritysite.com/ctf/
account_circle
Prof B Buchanan OBE FRSE(@billatnapier) 's Twitter Profile Photo

OpenSSH supports the SSH protocol, which allows for remote login. One tool it uses is ssh-keygen, which allows for the generation of RSA and elliptic-curve keys. These can be used for user and host authentication, such as for GitHub & Cloud instance login. asecuritysite.com/openssh/

OpenSSH supports the SSH protocol, which allows for remote login. One tool it uses is ssh-keygen, which allows for the generation of RSA and elliptic-curve keys. These can be used for user and host authentication, such as for GitHub & Cloud instance login. asecuritysite.com/openssh/
account_circle
Prof B Buchanan OBE FRSE(@billatnapier) 's Twitter Profile Photo

Zero Knowledge Proofs with Elliptic Curves and Schnorr. With Zero Knowledge Proofs (ZKPs), Peggy can have a signature, and then use this to prove that she still knows her secret. The method we will use is based on Schnorr’s protocol. View more: asecuritysite.com/zero/zkhmac

Zero Knowledge Proofs with Elliptic Curves and Schnorr. With Zero Knowledge Proofs (ZKPs), Peggy can have a signature, and then use this to prove that she still knows her secret. The method we will use is based on Schnorr’s protocol. View more: asecuritysite.com/zero/zkhmac
account_circle
Daniel J. Bernstein(@hashbreaker) 's Twitter Profile Photo

18 months ago NIST suddenly switched to counting memory-access costs in lattice attacks, massively pumping up Kyber-512's claimed security level. New lattice-attack optimization from Zhao, Ding, and Yang makes the memory-access costs practically disappear: eprint.iacr.org/2024/739

account_circle
Prof B Buchanan OBE FRSE(@billatnapier) 's Twitter Profile Photo

For Tahir Elgamal's PhD, he created the ElGamal encryption and signature method. Overall, ElGamal is a public key encryption method, and which has a public key (P,G,Y) and a private key (x). ElGamal for a key of a given bit length: asecuritysite.com/elgamal/elgama…

For Tahir Elgamal's PhD, he created the ElGamal encryption and signature method. Overall, ElGamal is a public key encryption method, and which has a public key (P,G,Y) and a private key (x). ElGamal for a key of a given bit length: asecuritysite.com/elgamal/elgama…
account_circle
Prof B Buchanan OBE FRSE(@billatnapier) 's Twitter Profile Photo

In full disk encryption, we cannot add an IV (Initialization Vector), as we often will want to access specific sectors and blocks without having to read all of the sectors. Here is XTS: asecuritysite.com/golang/go_xts

In full disk encryption, we cannot add an IV (Initialization Vector), as we often will want to access specific sectors and blocks without having to read all of the sectors. Here is XTS: asecuritysite.com/golang/go_xts
account_circle
Prof B Buchanan OBE FRSE(@billatnapier) 's Twitter Profile Photo

Big highlight of this academic year was when Whitfield Diffie came along to speak with our students. But for me, it was just as great as when the mighty Daniel J. Bernstein was our guest. Creator of Curve 25519, ChaCha20, and SipHash.

asecuritysite.com/nacl/nacl_sip

Big highlight of this academic year was when Whitfield Diffie came along to speak with our students. But for me, it was just as great as when the mighty Daniel J. Bernstein was our guest. Creator of Curve 25519, ChaCha20, and SipHash. asecuritysite.com/nacl/nacl_sip
account_circle
Wall Street Silver(@WallStreetSilv) 's Twitter Profile Photo

Imagine bragging about how the government can both track you and control your money ......

This isn't a flex.

🔊 … 🤦‍♂️ 🤡 🌎

account_circle
Rich Macfarlane(@rjmacfarlane) 's Twitter Profile Photo

Opening keynote from our very own Prof B Buchanan OBE FRSE scaring us with AI current research and tools … citing the daily star … and where we might end up …

Opening keynote from our very own @billatnapier scaring us with AI current research and tools … citing the daily star … and where we might end up … #killswitchjobs
account_circle
Prof B Buchanan OBE FRSE(@billatnapier) 's Twitter Profile Photo

How Do I Get Into Cryptography? Almost every day I get asked about how someone can get into cryptography. Well, it can take a while to develop a deep understanding, but here’s my tips:

billatnapier.medium.com/how-do-i-get-i…

How Do I Get Into Cryptography? Almost every day I get asked about how someone can get into cryptography. Well, it can take a while to develop a deep understanding, but here’s my tips: billatnapier.medium.com/how-do-i-get-i…
account_circle
Prof B Buchanan OBE FRSE(@billatnapier) 's Twitter Profile Photo

Would your company sign up to these seven cybersecurity pledges?

Multi-factor authentication (MFA).
Default passwords
Reducing entire classes of vulnerability.
Security patches.
Vulnerability disclosure policy.
CVEs.
Evidence of intrusions.

medium.com/asecuritysite-…

Would your company sign up to these seven cybersecurity pledges? Multi-factor authentication (MFA). Default passwords Reducing entire classes of vulnerability. Security patches. Vulnerability disclosure policy. CVEs. Evidence of intrusions. medium.com/asecuritysite-…
account_circle
Graeme High Computing(@GraemeHighComp) 's Twitter Profile Photo

At Le Tour Du Hack… It was nice meeting Bill Buchanan in person. He is a legend in Cybersecurity and happens to be a former student of Graeme High School. Here he is with current students of Graeme.

At Le Tour Du Hack… It was nice meeting Bill Buchanan in person. He is a legend in Cybersecurity and happens to be a former student of Graeme High School. Here he is with current students of Graeme.
account_circle