Blog

News and articles

Conditioning the Blockchain

25 Apr, 2017 by Dr Michael Scott

As described in my last posting on the ‘Essence of the Blockchain’, the block-chain is just a public ledger supported by the power of the cryptographic hash function. From a “gen…

In Praise of the Humble PIN, Authentication that works for the Web.

19 Apr, 2017 by Dr Michael Scott

By which I mean the Personal Identification Number. Most days we use it in conjunction with our ATM card to perform relatively large value transactions. As such its a pretty proven way of au…

A Note on the Implementation of Format Preserving Encryption Modes

01 Nov, 2016 by Dr Michael Scott

The American National Institute for Standards in Technology (NIST) is considering proposals for several modes of operation for Format Preserving Encryption (FPE). The idea behind FPE is quit…

Ed3363 (HighFive) – An alternative Elliptic Curve

25 Oct, 2016 by Dr Michael Scott

We propose a new Elliptic curve at a security level significantly greater than the standard 128 bits, that fills a gap in current proposals while bucking the expected security vs cost curve …

New Partnership: NTT

19 Oct, 2016 by MIRACL Blogger

New Service Adopted by NTT Software to Expand Offerings While Eliminating the Largest Security Threat To Enterprise Customers In Digital Businesses (The Password Database). Tokyo, Japan, Oct…

Key-Escrow-less M-Pin

17 Oct, 2016 by Dr Michael Scott

We have been tasked to harden the M-Pin protocol against a “key-escrow” attacker, who has the authority to demand and be issued with all of the secrets from all of the distributed trust auth…

Using M-Pin with Geo-location/Geo-fencing

10 Oct, 2016 by Dr Michael Scott

M-Pin is a Multi-Factor identity based authentication protocol. Secret authentication keys are issued to clients from a Distributed Trusted Authority (DTA). Typically there are two DTAs, one…

Migrating SOK to a type-3 Pairing

03 Oct, 2016 by Dr Michael Scott

The non-interactive authenticated key exchange protocol known as SOK after its inventors Sakai, Oghishi and Kasahara, is one of the original pairing-based protocols. Like many such early pro…

M-Pin Full Technology (Version 3.1)

26 Sep, 2016 by Dr Michael Scott

M-Pin is a two-factor authentication protocol which has been proposed as an alternative to Username/Password, which works in conjunction with SSL/TLS. Here we derive a more complex M-Pin der…

Late Binding for the M-Pin protocol

20 Sep, 2016 by Dr Michael Scott

The M-Pin protocol has been proposed for use in a setting which uses multiple Trusted Authorities. One way to realise M-Pin is to use “early binding”. With early binding the client secret sh…

M-Pin: A Multi-Factor Zero Knowledge Authentication Protocol

13 Sep, 2016 by Dr Michael Scott

Here we introduce the M-Pin client-server protocol, which features two-factor client authentication as an alternative to Username/Password. Despite the mathematical complexity of the protoco…

New Partnership: Dimension Data

12 Sep, 2016 by MIRACL Blogger

Dimension Data Signs on as Global Distribution Partner to Capture Additional Share of $4 Billion User Authentication & Market LONDON, September 12 , 2016 — MIRACL, a leading internet cyb…