Blog

News and articles

A Poor Programmer’s Fix for Username/Password

18 Aug, 2016 by Dr Michael Scott

You are a programmer that uses the Internet a lot. You don’t want to be one of those unfortunates that gets their password hacked, due to some asshole’s failure to properly protect the passw…

Another Computer Language Comparison

03 Aug, 2016 by Dr Michael Scott

In this article we describe our experience in implementing a high performance cryptographic library in multiple Computer Languages Download this paper on Another Computer Language Comparison…

The Authentication Dilemma

03 Aug, 2016 by Dr Michael Scott

The Internet community is up in a heap about Username/Password, and what to replace it with. Here we try to shed a little light. Download paper and learn about the Authentication Dilemma Wha…

The Carnac protocol – or how to read the contents of a sealed envelope

03 Aug, 2016 by Dr Michael Scott

Johnny Carson as long time host of the Tonight show often appeared in the spoof role of Carnac the Magnificent, a mentalist who could magically read the contents of a sealed envelope. This i…

Missing a trick: Karatsuba variations

26 May, 2016 by Dr Michael Scott

There are a variety of ways of applying the Karatsuba idea to multi-digit multiplication. These apply particularly well in the context where digits do not use the full word-length of the com…

MIRACL, NTT i3 and NTT Labs initiative in the Apache® Incubator

11 May, 2016 by Brian Spector

Apache Milagro (incubating) creates an alternative to outdated and problematic monolithic trust hierarchies, providing a more secure infrastructure that’s built for today’s internet VANCOUVE…

Going Post-Quantum

03 May, 2016 by Dr Michael Scott

image source: Atomium Public Domain In about a decade (or so we are told) we may reach a tipping point in the world of cryptography, as a practical quantum computer will become a reality. Pe…

CertiVox announces Company name change to MIRACL

08 Jan, 2016 by MIRACL Blogger

Repositioning reflects the growth in opportunities to advance Cloud Computing and move the Internet into the post-PKI era. London / Dublin / Tokyo. We are excited to announce today that Cert…

HMRC Phishing Season Opens in January – Consumers Overrun with Scams

06 Jan, 2016 by MIRACL Blogger

New research highlights attitudes to personal security on the Internet in the lead-up to online tax return self-assessment deadline at end of January. LONDON, 6 January 2016 – As ten million…

Re-imagining Internet Security Infrastructure

22 Apr, 2015 by MIRACL Blogger

It’s time for a re-boot of the Internet’s security infrastructure. The last two years have been anything but uneventful in the realm of information security. Let’s start with the Snowden rev…

Whatever it is, it needs security

21 Feb, 2015 by Dr Michael Scott

The ubiquity of “things” is both a strength and a weakness when considering the potential of the Internet of things. The possibilities of what can be connected are, literally, endless. First…

Crypto Security - How many bits?

02 Feb, 2015 by Dr Michael Scott

Very recently we have seen some progress in the cryptanalysis of Elliptic curves. This Austrian group have reportedly broken an elliptic curve at the 113-bit level of security, using 10 FPGA…