Is PGP Bankrupt?

In the last few years, we have seen an increased awareness that PGP/GPG is a dinosaur of 1990s crypto, and it does not satisfy the need of modern users for secure communication. PGP model has many perverse effects: like creating a single point of failure where all sensitive communications are compromised with cracking one single …

Continue reading ‘Is PGP Bankrupt?’ »

Blockchain Privacy – Part 2: Stealth Addresses

Privacy In Part 1 we covered why privacy is essential for widespread cryptocurrency adoption, and concluded that neither Bitcoin nor Ethereum, or even ZCash is suitable for the task we’re wanting to solve: anonymity with efficiency. (Also the bonus property of needing no trusted setup)! COOL THING 1: STEALTH ADDRESSES The benefits of using stealth …

Continue reading ‘Blockchain Privacy – Part 2: Stealth Addresses’ »

D-Day For Z.Cash

Today the first ever truly anonymous crypto currency ZEC went live. The full P2P client can be downloaded from here [Linux only for now]. The total number of ZEC coins will be only 21 million, like in bitcoin. Zerocash also reproduces few other unreasonable properties known from bitcoin: bizarre monetary policy with inelastic monetary supply and block halving every …

Continue reading ‘D-Day For Z.Cash’ »

Controversy Around Profitability of AltCoin Investment

There is a considerable controversy around whether investing in a balanced basket of cryptocoins is a good idea. Two serious sources show that this sort of investment enjoys steady growth without a lot of downturns, cf. DLT10 Index and a recent detailed study which concentrates on a shorter period with excellent returns since Jan 2016 (cf. also …

Continue reading ‘Controversy Around Profitability of AltCoin Investment’ »

Extended Deadline – Blockchain Research Competition – Blockchain Student Paper Competition – Cash Prizes, Job Openings

We encourage students and young researchers to submit their paper or their thesis work to our research competition.   Submissions are extended until 31 October. Cash prizes will be awarded and winners will be invited to present their work at an international blockchain conference. More details here and here and here and here is the submission link (some older and recent …

Continue reading ‘Extended Deadline – Blockchain Research Competition – Blockchain Student Paper Competition – Cash Prizes, Job Openings’ »

How Many 1024-bit Primes Have Backdoors?

So how did the NSA backdoored the Internet or did they??? New ground-breaking paper shows that DSA and DH mod P keys with 1024 bits are vulnerable to practical backdoors which can be exploited to break our secure communications. Few highlights: For such trapdoored primes the DL problem can be solved in 2 months by an academic cluster. The …

Continue reading ‘How Many 1024-bit Primes Have Backdoors?’ »

UCL InfoSec Visit at Bletchley Park – 2 Oct 2016

    Home Work After a bombe demonstration by a WW2 veteran Ruth Bourne and BP bombe experts, students have been asked to further study at home how Enigma was broken, see our hand-out. More details can be found in our teaching materials “Enigma and Block Ciphers – 100 years of cryptanalysis with non-commutative combinations …

Continue reading ‘UCL InfoSec Visit at Bletchley Park – 2 Oct 2016’ »

Bitcoin Block Reward Halving

In a few minutes, cf. countdown, the amount of bitcoins attributed to each block mined will be divided by 2 in one single step. A rare event which happens once approximately every 4 years. This is an artificial shock which is tolerated by the bitcoin community in the name of misplaced ideology that whatever was decided …

Continue reading ‘Bitcoin Block Reward Halving’ »

Comparison of R&D Expenses in Different Countries

We have heard about the CIA/NSA Uber Apple/Google/Facebook, food industry, rampant imperialism which emanates from a handful of countries… and how these forces corrupt politicians and business circles in many other countries. Well actually in many cases it is self-inflicted misery. In many cases it is politicians and business people who run these countries do not …

Continue reading ‘Comparison of R&D Expenses in Different Countries’ »

Is Computer Security a Pseudo Science?

A major paper trying to explain why security experts have so frequently failed.    Cormac Herley: The Unfalsifiability of Security Claims paper /slides. It starts with a great classic, Karl Popper philosophy of science which would be the basis to say “security” is some sort of pseudo-science. We read that “there is no empirical test that allows us …

Continue reading ‘Is Computer Security a Pseudo Science?’ »