My 2,000th Blog Post on Medium

That’s one a day for five years!

My 2,000th Blog Post on Medium

That’s one a day for five years!

Here are the blog posts [here].

If I estimate that I have spent around 30 minutes on each article — I think I have spend around 1,000 hours (41.67 days) writing articles over the past five years. And, I don’t regret a single second of my time. For my teaching, I lecture up to 200 students in a year, but through a blog, I can reach over 1 million people a year.

Why do I write?

Well, I love my research and teaching area — especially cryptography — and I offer others the chance to see the beauty that I see. In cybersecurity, too, we are often not very good at engaging with others outside our field, and we end up with dull and boring articles about the latest threats that have been dumbed down to the level of a slug or just full of jargon and acronyms.

Overall, I work in an amazing and dynamic field, and every day, new things are discovered. We help secure our world more than possibly anything else, but still, we struggle to tell people about what it is we do, and why it is so special. And, so, I write for these reasons, along with it helping me layout fairly complex things — such as cryptography — in an easier-to-understand way. It, too, documents a timeline of events — and what happened, and when.

The Invisible Man

In 2017, I twice managed to get myself removed from LinkedIn for over a week. People wondered what had happened to me. And, so how did this happen? Well, it was because a few of my LinkedIn posts became too popular and LinkedIn thought I was a bot —note: I appreciate that some people actually think I am a bot, but I can assure you I am not.

At first, I wondered if the NSA had contacted LinkedIn and asked that my blog posts be taken offline — as I was posting things that breached national security. For someone in cybersecurity, this can be a common feeling, as you just don’t know that you may have said something that someone thinks is a threat to national security. But, after quite a delay, they finally got in contact with me, and, after many delayed messages, they admitted that I had triggered their bot detector threshold. and reinstated my profile.

And, so, I was then worried that all of my articles would be lost, but, luckily, they were all recovered — and I did exist again in LinkedIn space.

My first Medium article

I had, though, been struggling to post articles on LinkedIn as the formating was not nice at all. It was difficult to archive these posts, and where LinkedIn basically owned the content of the posting. The search facility was also poor, and where I had to use Google to find previous articles.

And, so, on 5 April 2018, I decided to move my main blog posts away from LinkedIn, I published:

Why? Because it was John Napier’s birthday, and I do discrete logs! I also published it on LinkedIn — just to be safe. On 1 April 2019, I eventually wrote about becoming the invisible man on LinkedIn [here]:

And, so, I have had a bit of fun along the way, and where I tricked quite a few people into thinking this was real [here]:

Some media outlets even picked it up, and contacted me, but I had to admit to my little trick. But for many, the article seemed believable at first:

If you are interested, I get between 1K and 4K reads per day (and an average of around 2K reads per day), and between 60K and 80K reads per month. This equates to around one million reads in a year:

With a click of a link, I can download the complete HTML of my article, and where I can then move it to another platform, and not be locked-in like LinkedIn (sorry this sounds like jingle!).

An article a day

And, so, I think that is 1,991 days in total, and which is 1.0045 pages per day — and in plain terms: one post per day. Why? Because it’s a bit like a diary of my thoughts on a specific day or what I see in the news — it also allows me to quickly find a method that I have written about in the past. Typically, I will draft something for a new cryptography method for ASecuritySite.com, and then try to write it up properly in a form that others can understand.

And, so, here are all the articles (note: some of these are paywalled — please contact me if you want them unpaywalled) [here]:

  • Bob The Investigator Uses Oblivious Transfer To Investigate Alice. [Here]. Date published: 16 September 2023.
  • Oblivious Transfer 1 from N. [Here]. Date published: 16 September 2023.
  • Our World Is Returning To Normal. [Here]. Date published: 16 September 2023.
  • The True Power on the Internet to fork or not to fork . [Here]. Date published: 16 September 2023.
  • Typewriters Tipex and Pen. [Here]. Date published: 16 September 2023.
  • Attending a Zero Knowledge Ceremony. [Here]. Date published: 15 September 2023.
  • Go On Admit it Microsoft Windows Has A Terrible Legacy That It Still Carries With It. [Here]. Date published: 15 September 2023.
  • My Name is Holly and I Break Into Computers For a Living. [Here]. Date published: 15 September 2023.
  • Be like Bob. [Here]. Date published: 11 September 2023.
  • Crypto Props In Talks. [Here]. Date published: 10 September 2023.
  • Ransomware Exploits a Cisco Zero Day. [Here]. Date published: 10 September 2023.
  • How Do I Get Into Cryptography. [Here]. Date published: 9 September 2023.
  • Don t settle . [Here]. Date published: 9 September 2023.
  • 100 Myth Busters in Cybersecurity. [Here]. Date published: 8 September 2023.
  • ASCON Rust and AEAD. [Here]. Date published: 6 September 2023.
  • As Light As A Cryptographic Feather . [Here]. Date published: 5 September 2023.
  • Building successful spin out companies is a matter of patience. [Here]. Date published: 4 September 2023.
  • My Memories in Networking VAX NetWare and Turbo Pascal. [Here]. Date published: 4 September 2023.
  • Recreating Keys In An Oblivious Way In Breakglass and Transform Encryption. [Here]. Date published: 3 September 2023.
  • Which People Have Secured Our Digital World More Than Any Other. [Here]. Date published: 3 September 2023.
  • Rejoice in what you learn and spray it. [Here]. Date published: 2 September 2023.
  • Test of Time ToT for Research Papers Some Papers Rocket Some Papers Crash and But Most Never . [Here]. Date published: 2 September 2023.
  • Hashing Data To a Curve. [Here]. Date published: 30 August 2023.
  • PQC Gets A Tombstone Notice. [Here]. Date published: 29 August 2023.
  • A Humble Cipher Helped To Stop Prying Eyes on Email Meet CAST5. [Here]. Date published: 28 August 2023.
  • PKI Is For Machines and Not Humans Key Event Receipt Infrastructure KERI . [Here]. Date published: 28 August 2023.
  • How To Lose A Market In One Easy Lesson Happy Birthday IE 6. [Here]. Date published: 27 August 2023.
  • The Undergraduate Who Secured The Internet Loren Kohnfelder. [Here]. Date published: 27 August 2023.
  • Slaves to the Machine Kraftwerk Metropolis and Fritz Lang. [Here]. Date published: 26 August 2023.
  • Smashing Windows and Closed Spaces Happy Birthday Linux. [Here]. Date published: 26 August 2023.
  • Vint Cerf and Bob Kahn The Sparks That Ignited The Internet. [Here]. Date published: 26 August 2023.
  • A Lesson To Any ECR Innovator or SME Be More BBN and Less IBM. [Here]. Date published: 25 August 2023.
  • All Change in Cybersecurity . [Here]. Date published: 23 August 2023.
  • If The Internet Had Been Created By Committee We Would Possibly Still Be Waiting and Need A . [Here]. Date published: 23 August 2023.
  • The Bridge Builders and Fixers of the Cyber Age. [Here]. Date published: 23 August 2023.
  • For Innovation Be More Like Larry and Less Like AT T. [Here]. Date published: 22 August 2023.
  • SSL TLS The Dinosaur Protocols Meet Message Layer Security MLS . [Here]. Date published: 22 August 2023.
  • TCP TLS IPSec and OpenSSL The Old Dinosaurs Need Replaced Meet WireGuard. [Here]. Date published: 22 August 2023.
  • A Bluffer s Guide To Encryption In The Cloud Top 100. [Here]. Date published: 21 August 2023.
  • Edinburgh s Path to a Tech Driven Future. [Here]. Date published: 21 August 2023.
  • Like It Or Not Cloud Storage Is Here To Stay It Just Has To Be Secured. [Here]. Date published: 20 August 2023.
  • Is Computer Science at School a Science . [Here]. Date published: 19 August 2023.
  • Two Of The Greatest Computer Scientists Ever Blum and Goldwasser. [Here]. Date published: 19 August 2023.
  • Finding A Base For a Hard Problem In Cybersecurity. [Here]. Date published: 18 August 2023.
  • For Cybersecurity Chinese Remainder Theory CRT is a Blessing and aThorn In Our Side. [Here]. Date published: 18 August 2023.
  • My 101 Tips for PhD Students and ECRs. [Here]. Date published: 18 August 2023.
  • Your Online Security Is Fundamentally Based on x x x x 1. [Here]. Date published: 17 August 2023.
  • 100 Interesting Things to Learn About Cryptography. [Here]. Date published: 16 August 2023.
  • A Vision For The NHS A Citizen Wallet. [Here]. Date published: 15 August 2023.
  • The Mighty Code That Saved Lives Meet The QR Code. [Here]. Date published: 15 August 2023.
  • Being Couragous Success Is Not Final Failure Is Not Fatal. [Here]. Date published: 14 August 2023.
  • For the PSNI Data Breach Let s Talk About Spreadsheets. [Here]. Date published: 14 August 2023.
  • My Top 70 Rules of Data Protection of Senstive Data. [Here]. Date published: 14 August 2023.
  • Which is One of the Most Powerful Programming Languages But Hardly Talked About . [Here]. Date published: 14 August 2023.
  • A Bluffer s Guide to Blockchain 100 Knowledge Snippets. [Here]. Date published: 13 August 2023.
  • Dead Man s PLC DM PLC . [Here]. Date published: 13 August 2023.
  • Gender biases Practical Subjects and Computer Science at School. [Here]. Date published: 12 August 2023.
  • Safe Primes M LeBlanc and Sophie Germain. [Here]. Date published: 12 August 2023.
  • As an AI and Predatory Journals The Sad State of Some Academic Publishing. [Here]. Date published: 11 August 2023.
  • Small Leaks Billions of Dollars. [Here]. Date published: 11 August 2023.
  • How Milk Sad Exploited Wallets Seed To Bitcoin ID Explained. [Here]. Date published: 10 August 2023.
  • Lesson 1 in Secure Architecture and Development Understanding Entropy. [Here]. Date published: 10 August 2023.
  • The 100 Basic Rules of Cryptography and Secure Programming . [Here]. Date published: 10 August 2023.
  • A Novice Mistake Meet Milk Sad And The 32 bit Key . [Here]. Date published: 9 August 2023.
  • Meet New PQC Signature Contenders. [Here]. Date published: 9 August 2023.
  • When The Government Can t Even Protect and Encrypt Our Data What Chance The Rest . [Here]. Date published: 9 August 2023.
  • ASecuritySite A Decade in Crypto. [Here]. Date published: 8 August 2023.
  • Towards Big Brother or a Storm in A Teacup Zoom and T Cs. [Here]. Date published: 8 August 2023.
  • For Speed Go For 12 Kangaroos. [Here]. Date published: 7 August 2023.
  • My Five Favouriate Least Favouriate Computer Programming Language. [Here]. Date published: 7 August 2023.
  • Smash The Orbs . [Here]. Date published: 7 August 2023.
  • The Wacky World of JavaScript and npm Protecting The Software Supply Chain Not. [Here]. Date published: 7 August 2023.
  • Simply IBE Identity Based Encryption . [Here]. Date published: 6 August 2023.
  • Look Beyond the Horizon Crypto FinTech Seminar 6 Oct 2023 . [Here]. Date published: 5 August 2023.
  • Weak Cryptography Implementations Fiat Shamir Attacks On Modern Proofs. [Here]. Date published: 5 August 2023.
  • Implicitly Certified Identity based Public keys Meet G nther s Method. [Here]. Date published: 4 August 2023.
  • Removing PKI with Self certified Public Keys. [Here]. Date published: 4 August 2023.
  • Dead Simple Signing Envelopes DSSE . [Here]. Date published: 3 August 2023.
  • Just Git and Smashing Windows. [Here]. Date published: 3 August 2023.
  • Cryptography Fundamentals ElGamal Encryption and Signature. [Here]. Date published: 1 August 2023.
  • Open The Podbay Doors HAL Will Health Care Will Struggle To Adopt AI . [Here]. Date published: 1 August 2023.
  • Recovering A Message From Just A Signature. [Here]. Date published: 1 August 2023.
  • Apple The Three Trillion Dollar Company. [Here]. Date published: 31 July 2023.
  • HMAC or Public Key Signing of JWTs . [Here]. Date published: 31 July 2023.
  • Bluffers Guide To JWTs. [Here]. Date published: 30 July 2023.
  • Can Privacy and Traceability Exist Together Tracing Keys and Jurisdiction. [Here]. Date published: 30 July 2023.
  • Cryptography Fundamentals Commutative Encryption. [Here]. Date published: 30 July 2023.
  • Did You Buy A Ring Doorbell From 2015 to 2019 Then You Could Get Compensation . [Here]. Date published: 30 July 2023.
  • A Soft Target Are Higher Education Infrastructures At Risk . [Here]. Date published: 29 July 2023.
  • Abstraction Words and Detail Grayson Perry. [Here]. Date published: 29 July 2023.
  • Byzantine Secret Share Resiliance No Need For a Dealer When A Participant Goes Bad. [Here]. Date published: 29 July 2023.
  • Let s get back to innovating. [Here]. Date published: 27 July 2023.
  • My Bluffer s Guide to Spin out Success. [Here]. Date published: 26 July 2023.
  • Noyce Moore and Grove A Template for Spin out Start up Success . [Here]. Date published: 26 July 2023.
  • Unveiling The Future of E governmen. [Here]. Date published: 26 July 2023.
  • New Vulnerability for OpenSSH CVE 2023 38408. [Here]. Date published: 25 July 2023.
  • TETRA BURST. [Here]. Date published: 25 July 2023.
  • The Mighty Cloudflare Finding the people who do want to believe and be championed and stop over . [Here]. Date published: 24 July 2023.
  • Cryptography Fundamentals 7 Quadratic residues Mod N. [Here]. Date published: 23 July 2023.
  • Cryptography Fundamentals 8 RSA Rivest Shamir and Adleman. [Here]. Date published: 23 July 2023.
  • Cybersecurity Cloud Lesson 1 Rule Book in Key Management. [Here]. Date published: 23 July 2023.
  • The Fundamental Cloud Decisions. [Here]. Date published: 23 July 2023.
  • Cryptography Fundamentals 5 GCD Extended GCD and Group Generators. [Here]. Date published: 22 July 2023.
  • Cryptography Fundamentals 6 Chinese Remainder Theory CTR . [Here]. Date published: 22 July 2023.
  • Losing The Keys To The Castle Azure Key Breach Should Worry Every Organisation. [Here]. Date published: 22 July 2023.
  • Passion Leadership and Responsibility. [Here]. Date published: 22 July 2023.
  • Cryptography Fundamentals 4 Finite Fields aka Galious Fields . [Here]. Date published: 21 July 2023.
  • Cryptography Fundamentals 2 Mapping Groups Adding Subtracting Multiplying Dividing and . [Here]. Date published: 20 July 2023.
  • Cryptography Fundamentals 3 Elliptic Curve Fundamentals. [Here]. Date published: 20 July 2023.
  • Dreaming Thinking Communicating With Light. [Here]. Date published: 20 July 2023.
  • Kevin Mitnick RI. [Here]. Date published: 20 July 2023.
  • Yes Thank you You re right I have updated the article . [Here]. Date published: 20 July 2023.
  • Cryptography Fundamentals Part 1 Groups Rings and Discrete Log. [Here]. Date published: 19 July 2023.
  • In The Future ChatGPT Could Be The Cloud The Future of AI based Virtualisation. [Here]. Date published: 18 July 2023.
  • Does AI Lie . [Here]. Date published: 17 July 2023.
  • When A Typo Matters Send Sensitive Military Information to Mali. [Here]. Date published: 17 July 2023.
  • AI Cyber Warfare and The Digital Battle Field. [Here]. Date published: 16 July 2023.
  • Would You Take On A 1 Million Bet For The Cracking of Elliptic Curve Cryptography ECC By 2050 . [Here]. Date published: 16 July 2023.
  • Yes Most hashed passwords are now salted so rainbow tables are not much use . [Here]. Date published: 16 July 2023.
  • Spin outs Reinvestment and Universities. [Here]. Date published: 15 July 2023.
  • Why Is AES GCM Good and Not So Good for Cybersecurity. [Here]. Date published: 15 July 2023.
  • That Pesky dBm . [Here]. Date published: 14 July 2023.
  • Tracking The Identity of Devices By Their Bluetooth Signal Footprint. [Here]. Date published: 14 July 2023.
  • My Bike and A Podcast We Take Our Digital World For Granted. [Here]. Date published: 13 July 2023.
  • The Beauty and Power of Elliptic Curve Cryptography. [Here]. Date published: 13 July 2023.
  • How Do You Change Pounds Into Dollars within Encrypted Messages . [Here]. Date published: 12 July 2023.
  • How To Double Your Money with Python and AES CTR. [Here]. Date published: 12 July 2023.
  • GCM XTS and CCM Stream Ciphers. [Here]. Date published: 11 July 2023.
  • Why is 128 bit AES Insecure for a Quantum Computer But 256 bit Is Not . [Here]. Date published: 11 July 2023.
  • Let s Ask Satoshi Three Questions Why Two Hashes Why RIPEMD160 and SHA 256 Why RIPEMD160 . [Here]. Date published: 9 July 2023.
  • Steebog and Cybersecurity. [Here]. Date published: 9 July 2023.
  • A Bluffers Guide To Symmetric Key Encryption Mode. [Here]. Date published: 8 July 2023.
  • Can You Trust AES Encryption . [Here]. Date published: 8 July 2023.
  • Eve The Magician Breaks AES Again . [Here]. Date published: 8 July 2023.
  • Libre OpenSSL The OpenSSL Alterative. [Here]. Date published: 8 July 2023.
  • Beware of Sandwich Attacks. [Here]. Date published: 7 July 2023.
  • Homomorphic Multiplication and Division with RSA. [Here]. Date published: 7 July 2023.
  • How Many Things Can You Count To on Your Fingers . [Here]. Date published: 7 July 2023.
  • Two Sides of the Quantum Coin. [Here]. Date published: 7 July 2023.
  • UWS Cyber Breach. [Here]. Date published: 7 July 2023.
  • What s The Fastest Symmetric Cipher and Mode . [Here]. Date published: 7 July 2023.
  • Having X Ray Eyes In Cybersecurity Debugging with OpenSSL and ASN 1. [Here]. Date published: 6 July 2023.
  • ASN 1 and DE. [Here]. Date published: 5 July 2023.
  • Everything You Ever Wanted To Know About Authenticated Encryption With Additional Data AEAD But . [Here]. Date published: 5 July 2023.
  • Open Letter from Security and Privacy Researchers in relation to the Online Safety Bil. [Here]. Date published: 5 July 2023.
  • scrypt The Memory Hard GPU Cruncher. [Here]. Date published: 4 July 2023.
  • Those Tables Password Cracking Times That Scare You Are Mostly Wrong. [Here]. Date published: 4 July 2023.
  • China and the SM Ciphers Here s SM4. [Here]. Date published: 3 July 2023.
  • How The Mighty Have Fallen RC4 Fast Compact and Insecur. [Here]. Date published: 3 July 2023.
  • Sweet are the uses of adversity. [Here]. Date published: 3 July 2023.
  • Camellia Where Horst Feistel Meets Rijndael AES . [Here]. Date published: 2 July 2023.
  • CAST5. [Here]. Date published: 2 July 2023.
  • Could DES 3DES Please Leave the Stage Before The End of the Year if possible. [Here]. Date published: 2 July 2023.
  • Edinburgh This Magestic City The mix old and modern tradition and innovation was intoxicating . [Here]. Date published: 2 July 2023.
  • Which Encryption Method Can Support a 448 bit Encryption Key and Its Derivative Nearly Became AES . [Here]. Date published: 2 July 2023.
  • In Innovation Success Is Often The Best Revenge. [Here]. Date published: 1 July 2023.
  • Moving Payments to the Cloud. [Here]. Date published: 1 July 2023.
  • Physical Unclonable Functions PUFs . [Here]. Date published: 29 June 2023.
  • Doh Rust Takes Years To Learn . [Here]. Date published: 28 June 2023.
  • Finding Your OpenSSH Private Keys. [Here]. Date published: 28 June 2023.
  • So What Modes Can You Have For Symmetric Key . [Here]. Date published: 28 June 2023.
  • Standing on the Horizon of One of the Greatest Advancements in Science The Quantum Computer. [Here]. Date published: 27 June 2023.
  • The Bluffers Guide to Discrete Logarithms And How They Protected and Changed Our World. [Here]. Date published: 27 June 2023.
  • Everything You Ever Wanted To Know About ECDSA But Were Afraid To Ask. [Here]. Date published: 26 June 2023.
  • Machine Learning in Digital Forensic. [Here]. Date published: 26 June 2023.
  • Everything You Ever Wanted To Know About RSA Signatures But Were Afraid To Ask. [Here]. Date published: 25 June 2023.
  • So What Is Ed25519 and What Does It Have To Do With Curve 25519 . [Here]. Date published: 25 June 2023.
  • SolarWinds What Happened And How Can We Stop It In The Future . [Here]. Date published: 25 June 2023.
  • BRUTEPRINT Brute Forcing Fingerprint Authentication. [Here]. Date published: 24 June 2023.
  • Jon Postel The Editor of the Internet. [Here]. Date published: 24 June 2023.
  • 1 Detects a Prime Number. [Here]. Date published: 23 June 2023.
  • DSA and OpenSSH It s Legacy But Still Great. [Here]. Date published: 22 June 2023.
  • So What s So Important About Your OpenSSH Keys . [Here]. Date published: 22 June 2023.
  • Your LEDs Could Be Leaking Your Encryption Keys . [Here]. Date published: 22 June 2023.
  • Tokenization and The Future of Money Improving the old Enabling the new. [Here]. Date published: 21 June 2023.
  • What Files What A Hacker Look For In Order to Breach Trust. [Here]. Date published: 21 June 2023.
  • Your RSA Keys Are Likely To Be So Important For The Security of Your Organisation especially . [Here]. Date published: 20 June 2023.
  • They Killed Kenny Meet The Kenny Cipher. [Here]. Date published: 19 June 2023.
  • Towards Zero Trust and Citizen Rights. [Here]. Date published: 19 June 2023.
  • AI Aims For Perfect Coding And With Multiple Solutions. [Here]. Date published: 18 June 2023.
  • Cloud Cyber Insurance Getting Good Lower Premiums For Good Practic. [Here]. Date published: 18 June 2023.
  • Having Fun With Ciphers Bitwise Rotations and the Rotate Cipher. [Here]. Date published: 18 June 2023.
  • How Do Ratchets Protect Your Data . [Here]. Date published: 18 June 2023.
  • GPT 4 Is The Perfect Student Will Education As We Know It Come Crumbling Down . [Here]. Date published: 17 June 2023.
  • The NSA NIST and Crypto in Court. [Here]. Date published: 16 June 2023.
  • CTF Cracking a Faulty Signature. [Here]. Date published: 14 June 2023.
  • Cracking RSA With Only A Few Known Bits. [Here]. Date published: 13 June 2023.
  • Making Cybersecurity Fun. [Here]. Date published: 12 June 2023.
  • Paranoid Cryptography Factoring RSA keys from certified smart cards Coppersmith in the wild. [Here]. Date published: 11 June 2023.
  • Paranoid Cryptography Pollard s p 1 method and Powersmooth. [Here]. Date published: 11 June 2023.
  • Paranoid Cryptography and the Return of the Coppersmith Attack ROCA . [Here]. Date published: 11 June 2023.
  • Stop Confusing Cryptocurrency with Digital Currency The Move Towards 21st Century Finance. [Here]. Date published: 11 June 2023.
  • Why Doesn t Code Have a Pen Test When Compiling . [Here]. Date published: 11 June 2023.
  • AI Detectors The Ethical Dilemma of Bias Towards Native English Speakers. [Here]. Date published: 10 June 2023.
  • MOVEit and HR Systems Who Is Responsible For the Cybersecurity of our SAS . [Here]. Date published: 10 June 2023.
  • Provable Secure Signatures with RSA. [Here]. Date published: 10 June 2023.
  • Step by Step RSA Decryption using dQ dP and Qinv. [Here]. Date published: 10 June 2023.
  • RSA Boxer Of Our Online World. [Here]. Date published: 9 June 2023.
  • Reactable Signatures using A Naive Approach and The Johnson Merkle Method. [Here]. Date published: 8 June 2023.
  • Inspiring The Next Generation into Maths Coding and Cybersecurity and many other things . [Here]. Date published: 7 June 2023.
  • For Security Go Hybrid Hybrid Public Key Encryption HPKE and RFC 9180. [Here]. Date published: 6 June 2023.
  • The MOVEit Zero Day and The Payroll Hack. [Here]. Date published: 6 June 2023.
  • The UK Digital Pound. [Here]. Date published: 5 June 2023.
  • Crypt For Password. [Here]. Date published: 4 June 2023.
  • HMAC and HKDF. [Here]. Date published: 4 June 2023.
  • The Next Great Technology Frontier The Cybersecurity of Vehicles. [Here]. Date published: 3 June 2023.
  • Why Did NIST Pick Dilithium and FALCON . [Here]. Date published: 1 June 2023.
  • ElGamal Encryption with Elliptic Curve. [Here]. Date published: 29 May 2023.
  • Embedding Data In Point on a Graph The Beauty and Power Of Elliptic Curves. [Here]. Date published: 28 May 2023.
  • ElGamal Applying Multiple Public Key Operations ECC . [Here]. Date published: 27 May 2023.
  • Proof of Shuffle Using Homomorphic Encryption and ElGamal Encryption . [Here]. Date published: 27 May 2023.
  • The Most Important Area of Cybersecurity Perhaps Identity and Access Management . [Here]. Date published: 26 May 2023.
  • Slow And Steady Wins The Light weight Race Meet ASCON. [Here]. Date published: 25 May 2023.
  • kth root of n mod p . [Here]. Date published: 22 May 2023.
  • M LeBlanc and Safe Primes. [Here]. Date published: 22 May 2023.
  • What s So Special About 79be667ef9dcbbac55a06295ce870b07029bfcdb2dce28d959f2815b16f81798 . [Here]. Date published: 22 May 2023.
  • Blum Integers. [Here]. Date published: 21 May 2023.
  • Proving I Have the Private Key for a Given Public Key Without Giving It Away. [Here]. Date published: 21 May 2023.
  • Cracking Wifi With Sleep Mode. [Here]. Date published: 20 May 2023.
  • Proof of Square Free For Paillier. [Here]. Date published: 20 May 2023.
  • Cisco ASA Devices on the Naughty Step Again . [Here]. Date published: 18 May 2023.
  • Psalm 46 and Shakespeare. [Here]. Date published: 18 May 2023.
  • The Buzz of Real World Crypto PQC Goes Into Production. [Here]. Date published: 18 May 2023.
  • Norman and Bad AI. [Here]. Date published: 17 May 2023.
  • Veracity The Most Important V in Big Data. [Here]. Date published: 16 May 2023.
  • Ratcheting Trees and Building A Secure Messaging Platform. [Here]. Date published: 15 May 2023.
  • Security By Design Meet Near Perfect Message Security Messaging Layer Security MLS . [Here]. Date published: 15 May 2023.
  • How Private Is Your Browser . [Here]. Date published: 14 May 2023.
  • The Previous Experiments With AI Bots Didn t Go Well Here s Tay and Norman. [Here]. Date published: 14 May 2023.
  • When The Web Was Command Lin. [Here]. Date published: 14 May 2023.
  • Full Homomorphic Encryption FHE and CSAM. [Here]. Date published: 13 May 2023.
  • Meet Snake Perseus and Uroboros A Lesson In Cryptography. [Here]. Date published: 13 May 2023.
  • Inform Debate and Listen and Engage . [Here]. Date published: 12 May 2023.
  • Four Basic Rules of ECDSA Signatures. [Here]. Date published: 9 May 2023.
  • Lesson 1 in Secure Programming Don t Reuse Your IVs. [Here]. Date published: 9 May 2023.
  • McEliece and Rust Edging Slowly To A NIST Standard for PQC. [Here]. Date published: 7 May 2023.
  • The Cybersecurity of ChatGPT. [Here]. Date published: 6 May 2023.
  • Building A New World of Security With Zero Trust Trusted Attributes and Claims. [Here]. Date published: 5 May 2023.
  • Where You See Difficulty I See Opportunity . [Here]. Date published: 4 May 2023.
  • Great Update but TL DR Don t Turn It On . [Here]. Date published: 4 May 2023.
  • Thank Diophantus and Mordell For Your Online Security. [Here]. Date published: 4 May 2023.
  • What Have Tweedledee and Tweedledum Got To Do With Cybersecurity . [Here]. Date published: 2 May 2023.
  • Elliptic Curve Integrated Encryption Scheme ECIES Encrypting Using Elliptic Curve. [Here]. Date published: 30 April 2023.
  • In a Post Quantum World We Need to Eliminate The State. [Here]. Date published: 30 April 2023.
  • Find Your Fire. [Here]. Date published: 29 April 2023.
  • From Zero To Hero With a Bit More Detail. [Here]. Date published: 29 April 2023.
  • Software Supply Chain Attacks The NCSC and the NCSC Concur That They Are A Major Risk in our World. [Here]. Date published: 29 April 2023.
  • Baby Kyber Part 2 Encryption and Decryption. [Here]. Date published: 25 April 2023.
  • Blue Ticks or A Proper Digital Identity System . [Here]. Date published: 24 April 2023.
  • Baby Kyber Part 1 Generating the Private and Public Keys. [Here]. Date published: 23 April 2023.
  • I Lattices. [Here]. Date published: 22 April 2023.
  • Code Whisperering and Coding For All The Days of CodeStack Are Numbered. [Here]. Date published: 16 April 2023.
  • Go Do Cloud The Perfect Digital Toolbox in Building The Future. [Here]. Date published: 15 April 2023.
  • In Cybersecurity There s No Magic Wand That The Good People Can Only Use. [Here]. Date published: 14 April 2023.
  • Well Done To WhatsApp In Taking Security Seriously Key Transparency. [Here]. Date published: 13 April 2023.
  • Yael Tauman Kalai Cryptographic Excellence. [Here]. Date published: 12 April 2023.
  • Energy Consumption of Post Quantum Cryptography Dilithium and Kyber Beat Our Existing TLS 1 3. [Here]. Date published: 11 April 2023.
  • Having Your Crypto Cake And Eating It Ed25519 or Dilithium Why Not Have Both . [Here]. Date published: 11 April 2023.
  • Having Your Crypto Handshaking Cake And Eating It X25519 or Kyber Why Not Have Both . [Here]. Date published: 11 April 2023.
  • Assessing Skill Levels of IT Auditors. [Here]. Date published: 10 April 2023.
  • How Many Work Roles in Cybersecurity Can you Name . [Here]. Date published: 10 April 2023.
  • 15 Minutes of Privacy. [Here]. Date published: 8 April 2023.
  • A Laser In Your Home To Infinity And Beyond MIMO 6G and Terahertz. [Here]. Date published: 5 April 2023.
  • The Wonderful World of Bob and Alice Martin Gardner ARS NSA Interference and Cracking Knapsack. [Here]. Date published: 2 April 2023.
  • Piger Fabrica Syndrome Major Vulnerability Could Bring Down The Internet. [Here]. Date published: 1 April 2023.
  • When 59 Bitcoins Just Vanished And When Sony Just Didn t Play Randomly. [Here]. Date published: 28 March 2023.
  • GitHub Says Ooops. [Here]. Date published: 25 March 2023.
  • Gordon Moore RIP. [Here]. Date published: 25 March 2023.
  • It Changed Our World As Few Things Have Done in the Whole History of Human Kind Ethernet. [Here]. Date published: 25 March 2023.
  • Route Summarization. [Here]. Date published: 24 March 2023.
  • Spotting Randomness. [Here]. Date published: 23 March 2023.
  • At The Core of Cybersecurity Is The Secret And The Great Protector is PBKDF2. [Here]. Date published: 21 March 2023.
  • Microsoft s Little Secret Encrypting Passwords and Keys. [Here]. Date published: 20 March 2023.
  • Cybersecurity Is Beautiful and Magical . [Here]. Date published: 18 March 2023.
  • For Improved Wifi Security It s Hello To DragonFly WPA3 . [Here]. Date published: 15 March 2023.
  • Overcoming Dragonblood Hashing Data To An Elliptic Curve Point or Scalar In A Constant Time. [Here]. Date published: 15 March 2023.
  • The People Who Got Me Into Cybersecurity and Cryptography Marty Hellman Neal Koblitz and Bruce . [Here]. Date published: 12 March 2023.
  • What Happens If I Don t Trust The Dealer in a Card Game A Bit of Mental Poker in . [Here]. Date published: 9 March 2023.
  • The real value is that we can use HTTPs for the communications and that the site can mainly be . [Here]. Date published: 5 March 2023.
  • Everything You Ever Wanted to Know About Digital Certificates But Were Afraid To Ask. [Here]. Date published: 4 March 2023.
  • The Cybersecurity of Headsets. [Here]. Date published: 3 March 2023.
  • Digital Signatures for the Future Dilithium FALCON and SPHINCS . [Here]. Date published: 2 March 2023.
  • OSPF Open Shortest Path First . [Here]. Date published: 28 February 2023.
  • Post Quantum and Non Post Quantum Key Exchange ECC and Kyber Working in Harmony. [Here]. Date published: 28 February 2023.
  • McEliece Key Exchange The Tortoise Shell Is A Little Broken But It Is Still Secure. [Here]. Date published: 27 February 2023.
  • Neal Koblitz He Built A Solid Foundation for Cybersecurity and Trust. [Here]. Date published: 25 February 2023.
  • Now Machines Attack Post Quantum Cryptography Kyber Has Been Cracked Not The Algorithm Though. [Here]. Date published: 25 February 2023.
  • Undetectable Backdoors in Machine Learning Models. [Here]. Date published: 25 February 2023.
  • ChatGPT Just Invented a New Encryption Method Aontacht. [Here]. Date published: 23 February 2023.
  • The Miracl e of Building a More Trusted and Private Digital World. [Here]. Date published: 22 February 2023.
  • Don t Trust GPT Off Topic and Wrong. [Here]. Date published: 21 February 2023.
  • The Two Most Interesting And Useful Academic Things I Have Learnt in my Academic Career DL and ECC. [Here]. Date published: 20 February 2023.
  • Novice Cybersecurity Mistakes Why Must e Not Share A Factor with PHI . [Here]. Date published: 18 February 2023.
  • Tommy Flowers Quantum Computers and Colossu. [Here]. Date published: 18 February 2023.
  • What Was Your Favourite Computer Over the Years . [Here]. Date published: 18 February 2023.
  • Encryption with ElGamal. [Here]. Date published: 16 February 2023.
  • Why I Do Cybersecurity Because of One Book Secrets Lies. [Here]. Date published: 16 February 2023.
  • Nano Painting Encryption With Colours. [Here]. Date published: 15 February 2023.

Conclusions

In a world of ChatGPT, we need human voices. People with a vision. People with passion. People with a belief in building a better world.

And, so, go write … and get others in the amazing world cybersecurity and cryptography. To me, I write best early in the morning — as my mind is fresh with ideas, but find the best time for you, and just write about the things you care about.