Category: Cyber Security

Read our latest blog posts

Imagine a World

Let’s play a game – “Imagine a World…” For this blog post, I’d like to propose playing a game called IMAGINE A WORLD, except when we play, I propose that...

Continue reading

Introducing the Shannon Score – an objective way of measuring Cryptographic strength

Over the past 50 years, cryptographic strength has traditionally been measured in bits due to the correlation between the bit length and the number of possible keys that can be...

Continue reading

Equivocation Graphs & Unicity Distance

Information Theoretic Security (ITS) is a cryptographic standard that guarantees security based on the laws of mathematics and information theory, regardless of the computational power or time available to the...

Continue reading

Cryptography Risks & Issues, Mitigating Actions and Consequences of getting it wrong

Cryptography is used everywhere, in fact its estimated that there are over a quintillion cryptographic events a day.  That’s 1,000,000,000,000,000,000 encryption & decryption events, secret key exchanges, authentication & identity...

Continue reading

Measuring Cryptographic Strength – Practical, Perfect & Ideal Secrecy

BRIEF HISTORY OF MODERN CRYPTOGRAPHY The year is 1945, and Claude Shannon publishes a classified summary paper which is the foundation to modern cryptography – “A Mathematical Theory of Cryptography”...

Continue reading