ASecuritySite Podcast
Episodes
Bill Buchanan - Only 51 Have Been Found - Here's Mersenne Primes
06 Aug 2023
Contributed by Lukas
Blog post: https://medium.com/asecuritysite-when-bob-met-alice/only-51-have-been-found-heres-mersenne-primes-4c296a3d8091 And, so what's the next num...
Bill Buchanan - A Bluffers Guide To Symmetric Key Encryption Modes
06 Aug 2023
Contributed by Lukas
Blog: https://medium.com/asecuritysite-when-bob-met-alice/a-bluffers-guide-to-symmetric-key-encryption-modes-f7882881f6d Symmetric key encryption inv...
Bill Buchanan - Lesson 1 in Secure Programming: Don't Reuse Your IVs
06 Aug 2023
Contributed by Lukas
Blog: https://medium.com/asecuritysite-when-bob-met-alice/lesson-1-in-secure-programming-dont-reuse-your-ivs-5666ddfa9a1c I wrote up an article on a ...
Bill Buchanan - The Art of the Backdoor
06 Aug 2023
Contributed by Lukas
Blog: https://medium.com/asecuritysite-when-bob-met-alice/the-art-of-the-backdoor-e39f001ea8b9 Do you ever worry that your locksmith may take a copy ...
Bill Buchanan - My Bluffer's Guide to Spin-out Success
05 Aug 2023
Contributed by Lukas
I often get asked about what makes a successful university spin-out, so here are my observation for any budding academic team looking to spin out: Yo...
Bill Buchanan - Just Git ... and Smashing Windows
05 Aug 2023
Contributed by Lukas
There's one little program that I could not do my work without … Git. And, so, our digital world needs to say a great thanks to the wonderful Linus ...
Leaders in Digital Identity and Blockchain: Chris Were
02 Aug 2023
Contributed by Lukas
Chris Were is the CEO of the Verdia network. More details here. YouTube video: here.
Cryptography Fundamentals 10: ElGamal Encryption and Signatures
01 Aug 2023
Contributed by Lukas
Blog: https://billatnapier.medium.com/cryptography-fundamentals-elgamal-encryption-and-signature-2de5f16b1127 ElGamal methods: https://asecuritysit...
Bill Buchanan - TETRA:BURST
01 Aug 2023
Contributed by Lukas
Blog: https://medium.com/asecuritysite-when-bob-met-alice/tetra-burst-42773a490b35 Introduction Anyone can create a cipher. Basically, Bob and Alic...
Bill Buchanan - Passion, Leadership and Responsibility
01 Aug 2023
Contributed by Lukas
Blog: https://medium.com/asecuritysite-when-bob-met-alice/passion-leadership-and-responsibility-ded697c73c76 Introduction I have been involved in ent...
Bill Buchanan - A Bluffers Guide To JWTs
31 Jul 2023
Contributed by Lukas
Related blog: https://medium.com/asecuritysite-when-bob-met-alice/tokens-jwt-and-google-tink-c6b915d387e8 And: https://billatnapier.medium.com/hmac-...
Bill Buchanan - Noyce, Moore and Grove — A Template for Spin-out/Start-up Success?
31 Jul 2023
Contributed by Lukas
Blog post: https://medium.com/asecuritysite-when-bob-met-alice/noyce-moore-and-grove-a-template-for-spin-out-start-up-success-b67d9795154a Introductio...
Bill Buchanan - A Soft Target: Are Higher Education Infrastructures At Risk?
30 Jul 2023
Contributed by Lukas
Blog: https://medium.com/asecuritysite-when-bob-met-alice/a-soft-target-are-higher-education-infrastructures-at-risk-4ff323fd73c5 They helped build t...
Cryptography Fundamentals 9: Commutative Encryption
30 Jul 2023
Contributed by Lukas
Related blog post: https://billatnapier.medium.com/cryptography-fundamentals-commutative-encryption-19ba4c4c2173 Introduction What's at the core of cr...
Research: Can Privacy and Traceability Exist Together: Tracing Keys and Jurisdictions?
30 Jul 2023
Contributed by Lukas
Blog: https://medium.com/asecuritysite-when-bob-met-alice/can-privacy-and-traceability-exist-together-tracing-keys-and-jurisdictions-bfc395d502a Intr...
Bill Buchanan: Did You Buy A Ring Doorbell From 2015 to 2019 - Then You Could Get Compensation?
30 Jul 2023
Contributed by Lukas
Blog: https://medium.com/asecuritysite-when-bob-met-alice/did-you-buy-a-ring-doorbell-from-2015-to-2019-then-you-could-get-compensation-c8434916b2da ...
Prof Alan Woodward - Quantum Computing and Impact On Public Key Encryption
24 Jul 2023
Contributed by Lukas
A guest talk on Quantum Computing and Impact On Public Key Encryption by Professor Alan Woodward.
World-leading Computer Scientists: Lenstra, Lenstra and Lenstra
24 Jul 2023
Contributed by Lukas
Related blog: https://medium.com/asecuritysite-when-bob-met-alice/mathematics-in-the-blood-the-lenstra-family-bf188c686e74 Introduction I know it's ...
World-leading Computer Scientists: Leslie B Lamport (Clocks, LaTeX, Byzantine Generals and Post Quantum Crypto)
24 Jul 2023
Contributed by Lukas
Related page: https://medium.com/asecuritysite-when-bob-met-alice/clocks-latex-byzantine-generals-and-post-quantum-crypto-meet-the-amazing-leslie-b-l...
Cryptography Fundamentals 8: RSA (Rivest, Shamir And Adleman)
23 Jul 2023
Contributed by Lukas
Related material Main page: https://billatnapier.medium.com/cryptography-fundamentals-8-rsa-rivest-shamir-and-adleman-445b91932bd0 RSA: https://asec...
Bill Buchanan: Cybersecurity Cloud Lesson 1 - Rule Book in Key Management
23 Jul 2023
Contributed by Lukas
Cybersecurity Cloud Lesson 1 rule book in key management for companies: Your encryption keys are the keys to your castle. So protect them with your l...
Cryptography Fundamentals 7: Quadratic residues Mod N
23 Jul 2023
Contributed by Lukas
Demos These are: Quadratic residues: https://asecuritysite.com/primes/q_res Jacobi symbol: https://asecuritysite.com/primes/jac Jacobi and Legendre s...
Cryptography Fundamentals 6: Chinese Remainder Theorem (CRT)
22 Jul 2023
Contributed by Lukas
Please note, I slippled up a little in the podcast, and where the army size if 187,000. I have updated below. Web page: https://billatnapier.medium.c...
Cryptography Fundamentals 5: GCD, Extended GCD and Base Generators
22 Jul 2023
Contributed by Lukas
Cryptography Fundamentals 5: GCD, Extended GCD and Group Generators This podcast will outline a few building blocks of cryptography: GCD (Greatest com...
Bill Buchanan - The UK Pound: CBDC (Central Bank Digital Currency)
22 Jul 2023
Contributed by Lukas
We live in a legacy world of money. Our transactions are often still based on moving paper money around, and we have basically scaled this into a digi...
An Interview with Scott Helme
21 Jul 2023
Contributed by Lukas
Scott Helme is a Security Researcher, Entrepreneur and International Speaker. He is the creator of the Report URI and Security Headers Web site. More ...
Cryptography Fundamentals 4: Finite Fields (aka Galois Fields)
21 Jul 2023
Contributed by Lukas
I will bet you, that you have a memory of school where you had the "pleasure" or, most likely, the "nightmare" of performing long addition or long sub...
Cryptography Fundamentals 3: Elliptic Curve Fundamentals
20 Jul 2023
Contributed by Lukas
In previous podcasts, I outlined the usage of discrete logarithms in the form of a=g^x (mod p). Unfortunately, we now need a relatively large prime nu...
Cryptography Fundamentals 2: Groups operations (Add, Subtract, Multiply, Divide and Exponentiation)
20 Jul 2023
Contributed by Lukas
A fundamental element in cryptography is the mapping of one group to another and then being able to map back again. In this, there should be no confus...
Cryptography Fundamentals 1: Groups, Rings and Discrete Logs
20 Jul 2023
Contributed by Lukas
The problem with cryptography is that many miss some fundamental knowledge that will allow them to fully understand the key operations that are used. ...
Bill Buchanan - Six Questions
19 Jul 2023
Contributed by Lukas
How did you get started in this industry? What are the three key tech/software tools that you depend on the most? What is your favouriate book or podc...
Professor Steven Furnell: Spear Phishing and Cyber Skills
19 Jul 2023
Contributed by Lukas
Steve is a Professor of Cyber Security in the School of Computer Science at the University of Nottingham, as well as an Adjunct Professor at Edith Cow...
World Leaders in Cryptography: Bruce Schneier
17 Jul 2023
Contributed by Lukas
Never in the history of humankind have we advanced so fast. In just 40 years, we have built a new era and have said goodbye to the industry age. But w...
Bill Buchanan - Why Is AES GCM Good (and Not So Good) for Cybersecurity
17 Jul 2023
Contributed by Lukas
We live in a strange world of cybersecurity. An auditor might ask a company if they encrypt their data? And the company may reply that they do, and so...
Bill Buchanan - Those Tables With Password Cracking Times That Scare You And Peddle Snake Oil — Are Mostly Wrong!
17 Jul 2023
Contributed by Lukas
In cybersecurity, you get those who pedal snake oil, and others that just try to scare you. The gap is that the advice is not given in an educated way...
Bill Buchanan - Doh! Rust Takes Years To Learn!
17 Jul 2023
Contributed by Lukas
The worm is turning! C and C++ have ruled the core of our digital world for a long time and still do. But, they do not handle memory well, where we ge...
Bill Buchanan - Does AI Lie?
17 Jul 2023
Contributed by Lukas
We are human, and, like it or not, we lie. Why? Because we might not want to admit to some truth, or where we might want to seem knowledgeable. It is ...
Bill Buchanan - When A Typo Matters … Sending Sensitive Military Information to Mali
17 Jul 2023
Contributed by Lukas
I receive a good deal of incorrect emails on my Gmail account. Most of it relates to the gathering of war veterans in the US or church events in Illin...
Bill Buchanan - Sweet are the uses of adversity
17 Jul 2023
Contributed by Lukas
Rock singers often say that it was their adversity that drove them to create their classics, such as heartache, sorrow, or losing something in their l...
Bill Buchanan - Jon Postel: Editor of the Internet
17 Jul 2023
Contributed by Lukas
So while there is much debate around people like Tim Berners-Lee and Vint Cerf, we should also include "The Editor of the Internet": Jon Postel. Jon w...
Bill Buchanan - The Bluffers Guide to Discrete Logarithms
17 Jul 2023
Contributed by Lukas
Preface We should all have a magic switch that pushes aside our worries and replaces them with something that takes our woes away. So, when I've had a...
Bill Buchanan - That Pesky dBm!
14 Jul 2023
Contributed by Lukas
I love wireless (wi-fi) communications. In fact, I did my PhD around the propagation of radio waves using Maxwell's equations. The beauty and perfecti...
Bill Buchanan - The Beauty and Power of Elliptic Curve Cryptography (ECC)
13 Jul 2023
Contributed by Lukas
I have a secret. And you have a secret. And together, we can merge our secret into another secret. What I am outlining here is the beauty of the Ellip...
Harry McLaren: Modern Security Operations
13 Jul 2023
Contributed by Lukas
Here Harry McLaren talks with Rich Macfarlane and Bill Buchanan. What's the key to finding a job within Cybersecurity? A balance of technical compe...
Bill Buchanan - Building Trust: Part 1 (Introduction)
13 Jul 2023
Contributed by Lukas
This is a basic introduction to the Building Trust podcast.
Bill Buchanan - The Patents That Built the Security of the Internet
13 Jul 2023
Contributed by Lukas
In this episode Professor William Buchanan OBE takes us back through the patents that gave rise to the security for the internet as we know it.
Bill Buchanan - The Cryptography of Bitcoin: The Hashing Methods for the Keys
13 Jul 2023
Contributed by Lukas
In this podcast, we will outline some of the design choices that Satoshi Nakamoto made for the hashing of the private key to the public ID, especially...
World Leaders in Cryptography: Torben P Pedersen
12 Jul 2023
Contributed by Lukas
So how do we create a world where we can store our secrets in a trusted and then reveal them when required? Let's say I predict the outcome of an elec...
A Talk With A Scammer - Don't Get Tricked
11 Jul 2023
Contributed by Lukas
Note: TeamViewer is not a malicious piece of software when normally used. The scammer wanted to install a remote desktop on my machine with it.
World-leaders in Cryptography: Jean-Philippe (JP) Aumasson
11 Jul 2023
Contributed by Lukas
Jean-Philippe (JP) Aumasson is a true innovator in cryptography, and especially in the creation of fast, secure and light-weight hashing methods. He c...
World-leaders in Cryptography: Neal Koblitz
11 Jul 2023
Contributed by Lukas
Neal I. Koblitz is a Professor of Mathematics at the University of Washington. He is a co-inventor of Elliptic Curve Cryptography (ECC). His original ...
World Leaders in Cryptography: Keith Martin
11 Jul 2023
Contributed by Lukas
In this episode Professor William Buchanan OBE talks with Professor Keith Martin, from the Royal Holloway, about the intersection of information secur...
World Leaders in Cryptography: Tahir ElGamal
11 Jul 2023
Contributed by Lukas
In research, we build on the shoulders of giants, and Taher Elgamal is one the giants of cybersecurity. His work on Netscape led to the creation of ...
World leaders in Cryptography: Dan Shumow
11 Jul 2023
Contributed by Lukas
In this episode Professor William Buchanan OBE talks with by Dan Shumow, Senior Software Development Engineer in the Security and Cryptography group, ...
World Leaders in Cryptography: Len Adleman
11 Jul 2023
Contributed by Lukas
Len is a co-creator of the RSA encryption algorithm [1] and received the 2002 Turing Award (often defined as the Nobel Prize of Computer Science). The...
World Leaders in Cryptography: Marty Hellman
11 Jul 2023
Contributed by Lukas
In this episode Professor William Buchanan OBE talks with Professor Martin Hellman, a world-renowned cryptologist and a founder of public key encrypti...
RSA and Privacy: Leonard Adleman
10 Jul 2023
Contributed by Lukas
In this episode Professor William Buchanan OBE talks with Professor Leonard Adleman, from the University of Southern California, about the endurance o...
World Leaders in Cryptography: Alan Woodward
14 Apr 2022
Contributed by Lukas
In this episode Professor William Buchanan OBE talks with Professor Alan Woodward from University of Surrey about his illustrious career as a Physicis...
Public Key Encryption and a Post-Quantum Future: Nick Sullivan
07 Apr 2022
Contributed by Lukas
In this episode Professor William Buchanan OBE is joined by Nick Sullivan, head of research at Cloudflare, to discuss the mathematics of cryptography,...
Federico Charosky: Education, Innovation and Entrepreneurship in Information Security
31 Mar 2022
Contributed by Lukas
In this Episode Professor William Buchanan OBE talks with Federico Charosky about the past, present and future of the information security industry, w...