Multi-Party Computation is getting more and more traction in various areas. Take for example, a new education bill was introduced into the House and Senate of the United States. The bill aims to provide better data to would be students, and policy makers, of the various benefits of having a higher education. But to obtain this […]
Read More
For better or for worse, hackers/hacking/cyber security have become a main staple for many popular movies and TV shows. Some of these shows depict computer hacking somewhat accurately, if not for the added dramatic effects to draw in viewers. Other depictions are so outlandish that they don’t even adhere to the most basic rules of technology […]
Read More
Ever wondered what the difference between public key vs. private key cryptography actually means? Furthermore, why is quantum cryptography even important? Prof. Smart answers all of your questions, and also explains how cryptography has changed in the past five years. In the ‘Ask the Professor’ video series, Professor Nigel Smart, world-renowned expert in applied cryptography, […]
Read More
Last Monday, Amazon Web Services (AWS) published a new set of security enhancements in a blog. The new features include: Default Encryption – possibility to define that all objects in a bucket must be stored encrypted Permission Checks – displays a prominent indicator next to the S3 buckets that are publicly accessible Cross-Region Replication ACL Overwrite – during […]
Read More
I was fortunate to attend the ACM CCS 2017 conference last week; this is one of the top academic computer security conferences (if not the top). There were many fantastic works, both in the attack and defense realms, and I found myself in talks from the morning to the evening, with only once skipping a […]
Read More
Professor Nigel Smart answers the internet most interesting questions about encryption! The Internet challenges Prof. Nigel Smart with questions such as: “Is it possible to use MPC to compute the outcome with two or more secret inputs from a number of entities while keeping the inputs private? ” “What does it mean to have a mathematical […]
Read More
The importance of protecting infrastructures has dramatically increased in recent years. Critical infrastructures (CIs) include those physical resources, services, and information technology facilities, networks, and infrastructure assets which, if disrupted or destroyed, would have a severe impact on the health, safety, security, or economic well-being of citizens or the efficient functioning of governments and/or economies. These […]
Read More
The recently published ROCA (Return of Coppersmith’s Attack) vulnerability continues to generate shock waves in the crypto and security community. This severe vulnerability, besides the immediate implications, serves as a wakeup call that highlights some of the underlying issues in today’s typical crypto architectures. The vulnerability stems from a flawed implementation of RSA key generation […]
Read More
We can already see a glimpse of what tomorrow’s internet will bring. I book a train or plane ticket, and my email provider scans the receipt that is emailed tome. Then on the day of travel, my phone alerts me that I need to leave for the train or airport at a specific time, as […]
Read More
Whether you are a large or small business, academic institution, non-profit, or a government agency—cybersecurity in the workplace is everyone’s business. In honor of National Cyber Security Awareness Week, and this week’s theme, we’ve put together a few tips on how organizations can instill a culture of cybersecurity awareness, and how to protect themselves against […]
Read More