ASecuritySite Podcast

By: Professor Bill Buchanan OBE
  • Summary

  • A security podcast is hosted by Professor William (Bill) Buchanan OBE, a world-renowned Information security professional and educator. Join Bill as he interviews and discusses the state-of-the-art with esteemed guests from all corners of the security industry. From cryptologists to technologists, each guest shares a wealth of experience and knowledge.
    2023
    Show More Show Less
activate_Holiday_promo_in_buybox_DT_T2
Episodes
  • Get Used to Three Boring Acronyms: ML-KEM, ML-DSA and SLH-DSA
    Oct 28 2024

    Well, as if cybersecurity doesn’t have enough acronyms. There’s RIP, OSPF, TCP, IP, SSH, AES, and so many others. Now, there are three really important ones to remember: ML-KEM (Module Lattice-Based Key Encapsulation Mechanism), ML-DSA (Module Lattice-Based Signature Standard) and SLH-DSA (Stateless Hash-based Digital Signature Standard). ML-KEM is defined in the FIPS 203 standard, ML-DSA as FIPS 204, and for SLH-DSA, we have FIPS 205.

    https://medium.com/@billatnapier/get-used-to-three-boring-acronyms-ml-kem-ml-dsa-and-slh-dsa-0156b6ab82c5

    Show More Show Less
    7 mins
  • So What Is A PreHash, And What Has it to do With Post Quantum Signatures?
    Oct 28 2024

    The cybersecurity world is changing, and where the signature methods of RSA, ECDSA and EdDSA are likely to be replaced by FIPS 204 (aka ML-DSA Module-Lattice-Based Digital Signature Standard— Dilithium) and FIPS 205 (aka SLH-DSA (Stateless Hash-based Digital Signature Standard — SPHINCS+)

    https://medium.com/@billatnapier/so-what-is-a-prehash-and-what-has-it-to-do-with-post-quantum-signatures-bf7812cfa203

    Show More Show Less
    6 mins
  • CMAC or HMAC?
    Oct 28 2024

    In cybersecurity, there are so many acronyms, and to be an expert, you really need to dig underneath the methods and understand how they work. One weak area of the industry is in the usage of MACs (Message Authentication Codes).

    With the public-key signing, we use a public key and a private key, where the private key will digitally sign a hash of the message, and where the public key is verified the signature. With a MAC, we use a shared symmetric key, and where Bob and Alice will share the same secret key (Figure 1).

    https://medium.com/@billatnapier/cmac-or-hmac-which-is-better-8e1861f744d0

    Show More Show Less
    4 mins

What listeners say about ASecuritySite Podcast

Average customer ratings

Reviews - Please select the tabs below to change the source of reviews.