27Feb

VyprVPN and DMCA Notices

Recently an Australian Radio program (Hack) through the Australian Broadcasting Company reported on a user who was served with a copyright infringement whilst they were using a VPN. To better explain how this occured, I am going to explain how a VPN works, and then recommend some tips and alternatives to prevent this from happening to you too.
 
30Jul

Stream Ciphers vs Block Ciphers

One of the important characteristics pertaining to cryptography is the ability to conceal data in what appears to be random bits of information. A cipher which displayed patterns in flow of information would give away clues to utilisation (peaks would indicate transmissions, and therefore the presence of a connection or requirement to transmit)and repeated patterns would allude to common terms or structures (think of all those emails you sign with your signature block). So how does the application of Stream or Block Ciphers aid in increasing transmission security?
 
11Jul

Guide to the Advanced Encryption Standard (AES)

We've all (maybe) heard of the Advanced Encryption Standard (AES) algorithm, otherwise known as Rijndael. However do we really know how AES works, and just how simple and effective it is? Well Jeff Moser from Moserware has created an illustrated storyboard describing the origins of AES and how it works.... How far into the story will you get before the maths becomes too much?
 
11Aug

Flaw in the Enigma Code - Numberphile

The flaw which allowed the Allies to break the Nazi Enigma code.
 
10Aug

The Turing Bombe in Action - Bletchley Park - 28th July 2012

A memorable talk by Tony Jarvis showing how the Turing Bombe was used to crack the ring settings on the German Enigma encipherment machine during the Second World War. Unlike the brilliant Polish Bomba (which due credit must be given to Marian Rejewski and his team) in use around 1938, which used 'brute force' to check the ring settings on Enigma, this version of the machine reduced the assumptions of wheel order and scrambler positions that required 'further analysis' to a manageable number via means of a 'crib', or an informed guess as to a known phrase included in the encyphered message. This approach was required after refinements in both the Enigma machine design and its use which made the Polish Bomba brute force attacks impractical.
 
10Aug

Cracking the NAZI Enigma Code Machine

A very good primer into understanding what the Enigma Code Machine was all about...
 
9Aug

158,962,555,217,826,360,000 (Enigma Machine) - Numberphile

The Nazi's Enigma Machine - and the mathematics behind it - was a crucial part of World War II.
 
9Aug

Theory and Practice of Cryptography

Topics include: Introduction to Modern Cryptography, Using Cryptography in Practice and at Google, Proofs of Security and Security Definitions and A Special Topic in Cryptography 
 
8Aug

A brief history of Cryptography with Akamai Chief Security Officer Andy Ellis

Akamai Chief Security Officer, Andy Ellis, shares a brief history of cryptography.Learn more about how Akamai's highly distributed platform delivers applications consistently while providing control and security for your users - wherever they are.
 
8Aug

How PGP works

When Julius Caesar sent messages to his generals, he didn't trust his messengers. So he replaced every A in his messages with a D, every B with an E, and so on through the alphabet. Only someone who knew the "shift by 3" rule could decipher his messages. And so we begin.