Comparison of R&D Expenses in Different Countries

We have heard about the CIA/NSA Uber Apple/Google/Facebook, food industry, rampant imperialism which emanates from a handful of countries… and how these forces corrupt politicians and business circles in many other countries. Well actually in many cases it is self-inflicted misery. In many cases it is politicians and business people who run these countries do not …

Continue reading ‘Comparison of R&D Expenses in Different Countries’ »

Is Computer Security a Pseudo Science?

A major paper trying to explain why security experts have so frequently failed.    Cormac Herley: The Unfalsifiability of Security Claims paper /slides. It starts with a great classic, Karl Popper philosophy of science which would be the basis to say “security” is some sort of pseudo-science. We read that “there is no empirical test that allows us …

Continue reading ‘Is Computer Security a Pseudo Science?’ »

Researchers in Cryptography vs. Big Brother

For decades the dominant paradigm in crypto and security research would be: to claim that security vulnerabilities occur accidentally, ignoring major questions such as why there are so many of them and why the “bad scenarios” repeat so many times, concentrate security research on topics of secondary importance, or those which have no importance whatsoever and …

Continue reading ‘Researchers in Cryptography vs. Big Brother’ »

Press Release: Student Thesis/Paper Blockchain Security Research Competition 2016

DEADLINE EXTENDED 15 OCT 2016. ============================ We have created a fund for research prizes for beginning researchers in bitcoin and blockchain security and financial cryptography.           In 2016 we are going to award prizes for student thesis and student paper work. Here is our press release. Submissions will be accepted until …

Continue reading ‘Press Release: Student Thesis/Paper Blockchain Security Research Competition 2016’ »

Record Breaking DAO Token Sale

In the last 2 weeks it was possible to buy DAO tokens, a major new form of distributed business constructed to run on ETH blockchain. Until Friday 12 May 2016 some 50 M$ were invested. Then the price of these tokens has started raising [following the pre-determined rule] for the last 2 weeks of token …

Continue reading ‘Record Breaking DAO Token Sale’ »

UCL Code Breaking Competition Winners Announced

On the V-Day and the 71st anniversary of defeating the Nazi Germany, we should remember how much the victory is owed to code breakers at Bletchley Park and elsewhere. 2016 UCL Code Breaking Competition (part of GA18). On this day it is my pleasure to announce the winners of the 2016 UCL Code Breaking competition. The winners …

Continue reading ‘UCL Code Breaking Competition Winners Announced’ »

RNG – Do Not Stop Worrying About Linux urandom

I have spend a few recent days at 2015 CCC congress in Hamburg. CCC is the biggest security conference in Europe with 12,000 participants, and potentially more [tickets were sold out]. Most talks I have attended were really good! 90% are really excellent. CCC is IMHO also the best security conference in Europe. A place like …

Continue reading ‘RNG – Do Not Stop Worrying About Linux urandom’ »

Super Fast Elliptic Curve Cryptography

Microsoft have released a new free ECC library which is up to 5x faster than with the traditional elliptic curve P-256 (which was so far the most commonly used curve in practical applications) and a also up to 3x faster than a well-known alternative Curve25519.   Bitcoin elliptic curve belongs to the category “special therefore suspicious” and have been …

Continue reading ‘Super Fast Elliptic Curve Cryptography’ »

Stop Using Passwords, Now!

Edward Lucas wrote a nice piece on how businesses can dramatically improve their cyber-security. He says that: “Well-run organisations will stop using passwords and logins in 2016. Instead they will use identifiers that are harder to copy, fake, steal or guess […] Security questions will stop being […] “mother’s maiden name”. Instead they will ask …

Continue reading ‘Stop Using Passwords, Now!’ »