Blog

News and articles

Stop the Hackers: Here's How to Remove Your Password Database

30 Nov, 2017 by MIRACL Blogger

There are two key questions anyone associated with business and data need to ask themselves: Does our company still have a password database and, if so Why? The simple fact is that there i…

Post Quantum Identity Based Encryption

13 Nov, 2017 by Dr Michael Scott

In our last blog, “Post Quantum Cryptography for Grandparents”, (which you really need to read first before reading this one) we pointed out that Post-Quantum cryptography as based on the Ri…

How to Explain Post Quantum Cryptography to Anyone

02 Oct, 2017 by Dr Michael Scott

Its actually not as complicated as it sounds. Let’s get the maths over with first. Remember polynomials? (x+1)(x+1)=x2+2x+1 This would be an example of two first degree polynomials being mul…

First Hybrid, then fully Post Quantum

15 Aug, 2017 by Dr Michael Scott

As we are all aware we are on the cusp of a major revolution in the auto-mobile industry. In 20 years we will all be driving electric cars and the good old petrol engine will be something we…

PSD2 - What Will Your Bank Do?

30 May, 2017 by MIRACL Blogger

In 2018, PSD2, the revised Payment Service Directive will be implemented which will change banking as we know it. Banks and payment services will be required to comply with new legislation w…

Bad Medicine - The Evolution of Computer Security

18 May, 2017 by Dr Michael Scott

It’s interesting to compare progress in Computer Security with progress in Medicine Science. Think of computing technology as being analogous to the human body, and under attack from multipl…

Why Does Your Business Still Have This Cyber Security Risk?

03 May, 2017 by MIRACL Blogger

In today’s online world of increasing digital crime, internet fraud and database breaches, businesses are left with the growing worry about protecting their online commerce and customers. Wh…

Conditioning the Blockchain

25 Apr, 2017 by Dr Michael Scott

As described in my last posting on the ‘Essence of the Blockchain’, the block-chain is just a public ledger supported by the power of the cryptographic hash function. From a “genesis” block,…

In Praise of the Humble PIN, Authentication that works for the Web.

19 Apr, 2017 by Dr Michael Scott

By which I mean the Personal Identification Number. Most days we use it in conjunction with our ATM card to perform relatively large value transactions. As such its a pretty proven way of au…

A Note on the Implementation of Format Preserving Encryption Modes

01 Nov, 2016 by Dr Michael Scott

The American National Institute for Standards in Technology (NIST) is considering proposals for several modes of operation for Format Preserving Encryption (FPE). The idea behind FPE is quit…

Ed3363 (HighFive) – An alternative Elliptic Curve

25 Oct, 2016 by Dr Michael Scott

We propose a new Elliptic curve at a security level significantly greater than the standard 128 bits, that fills a gap in current proposals while bucking the expected security vs cost curve …

New Partnership: NTT

19 Oct, 2016 by MIRACL Blogger

New Service Adopted by NTT Software to Expand Offerings While Eliminating the Largest Security Threat To Enterprise Customers In Digital Businesses (The Password Database). Tokyo, Japan, Oct…