Blog

News and articles

Going Post-Quantum

03 May, 2016 by Dr Michael Scott

image source: Atomium Public Domain In about a decade (or so we are told) we may reach a tipping point in the world of cryptography, as a practical quantum computer will become a reality. Pe…

CertiVox announces Company name change to MIRACL

08 Jan, 2016 by MIRACL Blogger

Repositioning reflects the growth in opportunities to advance Cloud Computing and move the Internet into the post-PKI era. London / Dublin / Tokyo. We are excited to announce today that Cert…

HMRC Phishing Season Opens in January – Consumers Overrun with Scams

06 Jan, 2016 by MIRACL Blogger

New research highlights attitudes to personal security on the Internet in the lead-up to online tax return self-assessment deadline at end of January. LONDON, 6 January 2016 – As ten million…

Re-imagining Internet Security Infrastructure

22 Apr, 2015 by MIRACL Blogger

It’s time for a re-boot of the Internet’s security infrastructure. The last two years have been anything but uneventful in the realm of information security. Let’s start with the Snowden rev…

Whatever it is, it needs security

21 Feb, 2015 by Dr Michael Scott

The ubiquity of “things” is both a strength and a weakness when considering the potential of the Internet of things. The possibilities of what can be connected are, literally, endless. First…

Crypto Security - How many bits?

02 Feb, 2015 by Dr Michael Scott

Very recently we have seen some progress in the cryptanalysis of Elliptic curves. This Austrian group have reportedly broken an elliptic curve at the 113-bit level of security, using 10 FPGA…

A Brief History of Authentication

20 Nov, 2014 by Dr Michael Scott

We authenticate ourselves multiple times every day. Every time we open a door with a key we are authenticating ourselves to the building we are entering, simply by demonstrating possession o…

Backdoors in NIST elliptic curves

24 Oct, 2013 by Dr Michael Scott

Cryptography is a lot about trust. And in the real world cryptography depends on standards, as the standardization of cryptographic algorithms is how cryptography is projected into the real …

2 step verification vs 2 factor authentication

21 Aug, 2013 by MIRACL Blogger

Several super high profile smash and grab attacks on global scale cloud service providers have prompted stronger authentication to be deployed on Google, Twitter, Evernote and many more prov…