Blog

News and articles

Key-Escrow-less M-Pin

17 Oct, 2016 by Dr Michael Scott

We have been tasked to harden the M-Pin protocol against a “key-escrow” attacker, who has the authority to demand and be issued with all of the secrets from all of the distributed trust auth…

Using M-Pin with Geo-location/Geo-fencing

10 Oct, 2016 by Dr Michael Scott

M-Pin is a Multi-Factor identity based authentication protocol. Secret authentication keys are issued to clients from a Distributed Trusted Authority (DTA). Typically there are two DTAs, one…

Migrating SOK to a type-3 Pairing

03 Oct, 2016 by Dr Michael Scott

The non-interactive authenticated key exchange protocol known as SOK after its inventors Sakai, Oghishi and Kasahara, is one of the original pairing-based protocols. Like many such early pro…

M-Pin Full Technology (Version 3.1)

26 Sep, 2016 by Dr Michael Scott

M-Pin is a two-factor authentication protocol which has been proposed as an alternative to Username/Password, which works in conjunction with SSL/TLS. Here we derive a more complex M-Pin der…

Late Binding for the M-Pin protocol

20 Sep, 2016 by Dr Michael Scott

The M-Pin protocol has been proposed for use in a setting which uses multiple Trusted Authorities. One way to realise M-Pin is to use “early binding”. With early binding the client secret sh…

M-Pin: A Multi-Factor Zero Knowledge Authentication Protocol

13 Sep, 2016 by Dr Michael Scott

Here we introduce the M-Pin client-server protocol, which features two-factor client authentication as an alternative to Username/Password. Despite the mathematical complexity of the protoco…

New Partnership: Dimension Data

12 Sep, 2016 by MIRACL Blogger

Dimension Data Signs on as Global Distribution Partner to Capture Additional Share of $4 Billion User Authentication & Market LONDON, September 12 , 2016 — MIRACL, a leading internet cyber-­…

Electronic Voting

05 Sep, 2016 by Dr Michael Scott

With the elections looming in America, the issue of the security of electronic voting is back in the news. Both major parties are making serious allegations that the election may well be rig…

The Essence of the Blockchain

30 Aug, 2016 by Dr Michael Scott

Here we attempt a simple explanation of the blockchain for a not overly technical audience. Download the Essence of the Blockchain PDF 1 Introduction The blockchain is a testament to the pow…

The Apache Milagro Crypto Library (Version 2.0)

24 Aug, 2016 by Dr Michael Scott

We introduce a multi-lingual crypto library, specifically designed to support the Internet of Things. Download this paper on The Apache Milagro Crypto Library 1 Introduction There are many c…

A Poor Programmer’s Fix for Username/Password

18 Aug, 2016 by Dr Michael Scott

You are a programmer that uses the Internet a lot. You don’t want to be one of those unfortunates that gets their password hacked, due to some asshole’s failure to properly protect the passw…

Another Computer Language Comparison

03 Aug, 2016 by Dr Michael Scott

In this article we describe our experience in implementing a high performance cryptographic library in multiple Computer Languages Download this paper on Another Computer Language Comparison…