About:

Prof Bill Buchanan is a cryptography expert and innovator focused on fairness, justice, and trust, based in Edinburgh.

Website:

Specializations:

Interests:

Cryptography Fairness Justice Freedom Innovation Trust Building
Subscribe to RSS:
The article discusses the Feistel network as an alternative to AES for symmetric key encryption, highlighting its simplicity and efficiency in creating circuits for Zero Knowledge Proofs. It traces the origins of cybersecurity bac...
The article discusses advancements in Ethereum's Zero Knowledge Proofs (ZKPs) and the need for efficient hashing methods within blockchain infrastructure. It highlights the limitations of existing hashing methods and introduces al...
The article discusses the critical issues surrounding the zero value in cryptography, particularly its impact on mathematical operations used in secure computations. It explains how zero can disrupt calculations, leading to loss o...
The post discusses the concept of witness encryption through a narrative involving pirates and puzzles. Long John Silver creates a Sudoku puzzle to hide the location of buried treasure, illustrating the principles of witness encry...
The article discusses the transition from traditional public key cryptography methods like Diffie-Hellman (DH) to post-quantum cryptography techniques, specifically focusing on Key Encapsulation Methods (KEM) such as ML-KEM. It ex...
The article discusses the Unbalanced Oil and Vinegar (UOV) approach to public key signing, highlighting its use of multivariate polynomial problems to create a trap door for solving equations. It compares the performance, signatur...
The article discusses the technical brilliance of Satoshi Nakamoto in designing Bitcoin, emphasizing the robust cryptographic methods used, particularly the dual hashing with SHA-256 and RIPEMD160. It highlights the significance o...
The article discusses the Pedersen hash, a cryptographic hashing method that utilizes elliptic curve points, making it particularly useful in Zero Knowledge Proof (ZKP) systems. It explains the basic formula for the Pedersen hash,...
The article discusses the concept of generating two groups of points from an elliptic curve, specifically using the Baby Jubjub curve and Twisted Edwards curves. It explains how the order of the curve defines the number of possibl...
The blog post discusses the RSA method, a public key cryptography technique introduced in 1978, which is crucial for securing internet connections. It explains how RSA keys are generated using two prime numbers, the modulus, and t...
The article discusses the urgent need to transition from traditional cryptographic methods like RSA, ECDSA, and EdDSA to post-quantum cryptography (PQC) methods such as Dilithium, Falcon, and SPHINCS+. It explains how Shor's algor...
The article discusses the performance and security aspects of Kyber (ML-KEM) and FrodoKEM, two key encapsulation mechanisms (KEM) in post-quantum cryptography (PQC). Kyber outperforms FrodoKEM in terms of speed and key size due to...
The blog post discusses VeraCrypt, a disk encryption software, and its connection to classic cryptographic methods. It highlights the history of symmetric key methods, including Rijndael (AES), Serpent, Twofish, and Camellia, deta...
The article discusses Baby Jubjub, an elliptic curve used in blockchain technology to enhance Zero Knowledge Proofs (ZKPs), particularly zk-SNARKs. It explains the mathematical foundations of Baby Jubjub, including its efficient p...
The article discusses the implications of Shor's algorithm on public key cryptography and the standardization of new digital signature methods by NIST, including ML-DSA (Dilithium), SLH-DSA (SPHINCS+), and FN-DSA (FALCON). It deta...
The author discusses the transformative potential of NFTs (Non-Fungible Tokens) in defining ownership through cryptographic tokens and blockchain technology. They critique traditional digital methods and advocate for a shift towar...
The article discusses the advantages of Ethereum as a decentralized trust infrastructure compared to centralized platforms like Meta. It explains the Ethereum Name Service (ENS) and its upcoming version (ENSv2), which aims to inte...
The blog post discusses the vulnerabilities of the current email system, highlighting its lack of authentication and privacy, which makes it susceptible to cybersecurity hacks. It emphasizes the importance of email addresses and t...
The article discusses the impact of automated bots on website performance, distinguishing between beneficial bots like Googlebot and harmful ones that scrape data for AI models. It highlights the significant traffic from bots on t...
The post celebrates the 10th anniversary of Ethereum, detailing its inception on July 30, 2015, and its evolution in the digital world. It contrasts Ethereum's Proof of Stake (PoS) with Bitcoin's Proof of Work (PoW), highlighting ...
The article explains the process of creating a digital wallet on Ethereum, focusing on the generation of private and public keys using Elliptic Curve Cryptography (ECC). It details how a private key is securely generated and used ...
The EU Commission has aligned with the US on the migration from public key cryptography to Post Quantum Cryptography (PQC) standards, specifically FIPS 203 (ML-KEM), FIPS 204 (ML-DSA), and FIPS 205 (SLH-DSA). A deadline of 2030 ha...
The blog post discusses the Crypto 85 conference, highlighting key figures in cryptography such as Ron Rivest, Adi Shamir, and David Chaum. It emphasizes the significance of the conference in the development of elliptic curve cryp...
The article explains the process of generating a Bitcoin wallet ID and keys using ECDSA (Elliptic Curve Digital Signature Algorithm) as established by Satoshi Nakamoto. It details the creation of a private key, the derivation of a...