Blog

video-tablet-1
Video

The Basic Root of Trust in Cryptographic Infrastructure

NextGen Cryptographic Key Orchestration Solutions for the Enterprise
  • All Topics
  • MPC
  • Digital Assets
  • Key Management
  • Authentication
  • Compliance

Authentication
Nigel-Smart-150x150
Prof. Nigel Smart
What the DP-3T Initiative Means for Privacy
April 28, 2020

The world is in the grip of a pandemic that has shut down the economies of all countries, imposed restrictions on freedom of movement, and more importantly is leading to the deaths of thousands of people. The problem is that the virus can be c

Digital Assets
Tova
Tova Dvorin
Why Infrastructure Matters for Secure Digital Asset Custody Services-
April 13, 2020

This is the fourth blog in a series about infrastructure for protecting tokenized assets. To recap: “Do-it-yourself” (DIY) – or in-house, self-built solutions – rely heavily (or exclusively) on internal resources (for setup, execution, and maintenance) to build and maintain their transaction signing and cryptocurrency holding systems. Security-as-

Digital Assets MPC
Yehuda
Prof. Yehuda Lindell
Hierarchical Deterministic Wallets
May 20, 2020

In Bitcoin and other cryptocurrencies, the use of hierarchical deterministic wallets (HD wallets) is a widely accepted practice. Loosely speaking, such wallets work by having a single master key (or master secret) and then deriving all keys from the master key. There are

Digital Assets
Tova
Tova Dvorin
Digital Asset Security as-a-Service
June 3, 2020

Crypto-Asset Security as-a-Service offerings can be tempting for enterprises who want to deliver digital asset services without building the infrastructure. But is it right for your organization? Let’s play out a scenario: you’re a mid-size organization (or larger) dealing with cryptocurrency and blockchain

Key Management
Yehuda
Prof. Yehuda Lindell
RSA Randomness and IoT
December 19, 2019

A new paper by researchers at KeyFactor shows how an extremely high number of RSA keys on the Internet can be completely broken, in very short time. Out of 75 million RSA certificates scraped from the Internet between 2015 and 2017, a whopping 250,

Key Management
Yehuda
Prof. Yehuda Lindell
Plundervolt – Yet Another Attack on SGX
June 3, 2020

A new yet another attack on SGX, called Plundervolt, works by playing around with the clock speed and voltage to the chip in order to induce an error in the computation that can be used to extract cryptographic secret keys. To an ordinary per

Digital Assets
Yehuda
Prof. Yehuda Lindell
default-image-400x213
January 15, 2020

Last week, I had the pleasure of attending the Real-World Cryptography conference (RWC 2020) in New York. There was a large attendance with over 600 people (yes, this is a large number for an academic cryptography conference), who came to hear about academic

Digital Assets
Nigel-Smart-150x150
Prof. Nigel Smart
default-image-400x213
January 12, 2018

The second week in January saw the Real World Cryptography conference return to Europe. Held in Zurich from Jan 10th to Jan 12th, it is the annual gathering which brings together cryptographers industry and academia to discuss how to make the world a mo

Key Management
Oz-Mishli-150x150
Oz Mishli
default-image-400x213
January 28, 2018

Since hitting the news early January, the havoc caused by Meltdown and Spectre refuses to abate. These software side-channel attack vulnerabilities affect current and past processors, from 1995 and on. Problems with Patches Over the past few weeks, Intel has worked diligently to release software

Key Management
Yehuda
Prof. Yehuda Lindell
default-image-400x213
January 18, 2018

Spectre and Meltdown The recent discovery of Spectre and Meltdown has once again highlighted the fact that we have a huge trust problem in our systems. In an idealized view of the world, software provides isolation between different processes, VMs and so on,

Key Management
Tova
Tova Dvorin
default-image-400x213
February 5, 2020

CyberHub engage hosted Prof. Yehuda Lindell, Co-founder & CEO of Unbound Tech on their Friday Wrap Up discussing the latest headlines in cybersecurity. #CyberNews Breakdown of episode: (2:25) Defending against Sodinokibi Ransomware (4:29) An encryption defense against Ransomware (7:50) How to prevent Ransomware from encr

Key Management
Tova
Tova Dvorin
default-image-400x213
March 18, 2018

It was announced in early February that AV-TEST, an independent organization that tests antimalware and security software, discovered 139 samples of malware that “appear to be related to recently reported CPU vulnerabilities”—otherwise known as Spectre and Meltdown. The organization previously reported the discov

MPC
michal_brenner-150x150
Michal Brenner
default-image-400x213
February 8, 2018

Data encryption. Cryptocurrency. These two crypto-based technologies are game-changers—the former old and tried, the latter still in its infancy—shaping the way business is done in the digital world. While most of us typically think of their positive, legitimate uses (consider secure communications, digital transac

MPC
Nigel-Smart-150x150
Prof. Nigel Smart
Ask The Professor - Ep.5
February 22, 2018

In this episode of ‘Ask the Professor,” Prof. Nigel Smart talks about Yao’s Millionaire Problem (how to reveal who is the richest millionaire w/out revealing how much money they actually have), in the case of two or more parties. Additionally, what do

MPC
Nigel-Smart-150x150
Prof. Nigel Smart
Ask The Professor - Ep.4
February 7, 2018

Professor Nigel Smart is back for another episode of ‘Ask the Professor’. This time he discusses the Ideal World vs. the Real World in relation to protocol creation. He also answers the question—will Quantum Key Distribution ever replace Standard Cryptography (as we know i

Digital Assets
Tova
Tova Dvorin
Two-Edged Technology for Decentralized Finance
March 31, 2020

In honor of Women’s History Month, and #HyperledgerWomen, we interviewed Unbound’s Director of Digital Asset Security & Blockchain, Rebecca Aspler to get her thoughts specifically on blockchain security. RA: “Worldwide spending on blockchain solutions reached 2.7 billion USD in 2019, and is projected

MPC
Tova
Tova Dvorin
InfoSec Influencers
March 30, 2020

Looking for new infosecurity influencers to follow? Tired of the same personalities on your feed? Unbound chose to shine a new light on 7 influencers with two of three characteristics in common:   They have under 20,000 followers; or  They cover infosec topics from new and innovative angles; or  They cover multi-party computation

Tova
Tova Dvorin
default-image-400x213
March 28, 2019

Samuel Ranelluci, Unbound’s Chief Scientist, had the opportunity to attend and speak at the NIST Threshold Cryptography Workshop this year. What is threshold cryptography? In a nutshell, threshold cryptography involves having multiple parties run a computation over private data to generate a public outpu

Key Management
Tova
Tova Dvorin
Your Cryptographic Security Setup
March 10, 2019

Imagine a scenario where data is kept on hard drives or disks you own, phones can only… well… make phone calls (or send simple text messages), and currency is only of the traditional fiat kind. Welcome to 1999. Back then, cryptographic keys were sec

MPC
Yehuda
Prof. Yehuda Lindell
The Zoom Encryption Debate
April 7, 2020

Cryptographic experts explain the encryption protocols Zoom uses for its record 220 million users, and what they mean for cybersecurity in the age of work-from-home and coronavirus. In April 2020, over 4 billion people are under a form of shelter-in-place or stay-home orders worl

Key Management
Lior-Levy
Lior Levy
default-image-400x213
April 28, 2019

Crypto hygiene, surprisingly enough, is a lot like personal hygiene. Just like showering regularly and brushing teeth twice daily is vital for combating and preventing illness and maintaining overall well-being, organizations must practice good crypto hygiene to reduce security risk and maintain good business health.    However, just like one needs to brush one’s teeth correctly in order to prevent cavities, organizations need to kno

MPC
Nigel-Smart-150x150
Prof. Nigel Smart
Ask The Professor - Ep.6
June 4, 2018

Do you happen to have a crypto algorithm you’d like to introduce? Then get ready to do a thorough security proof; just because you can’t break it, doesn’t mean it’s secure. Prof. Nigel Smart discusses the process of introducing a cryptographic algorithm, what applica

Key Management
michal_brenner-150x150
Michal Brenner
Software-Defined Cryptography
May 21, 2019

Gluing the terms software-defined and cryptography together in one phrase may seem counter-intuitive at first. Just like the realm of networking where the software-defined trend first gained momentum, cryptography has firm roots in hardware. To be more specific, purpose-built hardware has been the

Key Management
George-Wainblat-150x150
George Wainblat
default-image-400x213
June 19, 2018

Preface In this blog post, we’ll review some of the greatest breaches of 2017 & 2018, and how they could have been avoided by proper use of encryption and key management best practices, including crypto-anchors. So without further ado, here is the list: Ma

MPC
Nigel-Smart-150x150
Prof. Nigel Smart
Ask The Professor - Ep.7
July 11, 2018

In our latest video from Prof Smart we here about a number of issues in Crypto: The one which sticks out is how to securely implement online dating. This is particularly timely given the recent upgrade to Tinder in encrypting photos…Prof Smart however ta

MPC
Nigel-Smart-150x150
Prof. Nigel Smart
Ask The Professor - Ep.10
July 24, 2019

“Ask the Professor” is back!   For those not familiar with “Ask the Professor” – it’s a series worth watching for anyone involved in the cybersecurity or cryptography communities. Professor Nigel Smart, a world-renowned expert in applied cryptography, and professor at the COSIC group at the KU Leuven,

MPC
Nigel-Smart-150x150
Prof. Nigel Smart
Ask The Professor - Ep.11
August 10, 2019

In this video, Prof. Smart gives an analogy about distributed trust: sharing secrets without knowing who you’re sharing with. He also answers is it better to learn classical cryptography vs. quantum key distribution and the question we’ve all been wondering: Why would an academic cry

MPC
Nigel-Smart-150x150
Prof. Nigel Smart
August 25, 2019

Quantum computers. They’re making headlines for all sorts of use cases – but what will it mean for the future of cryptography?   Plus: Why garbled circuits can’t be reused, and the skinny on government backdoor policies in crypto.   In the ‘Ask the Professor’ video series,

MPC
Nigel-Smart-150x150
Prof. Nigel Smart
Ask The Professor - Ep.8
October 15, 2018

In this video, Prof. Nigel Smart answers whether double layers of encryption make information more secure. What’s the best way to make sure data is protected when one layer can be breached? What is the most ideal way to encrypt information? In the

MPC
Nigel-Smart-150x150
Prof. Nigel Smart
Ask The Professor - Ep.13
August 25, 2019

In this episode of “Ask the Professor,” Prof. Nigel Smart answers the internet’s burning questions: Why can’t one figure out the private key by looking inside the public key? How can you lose your head in cryptography? Why did you get into cryptography? In the

MPC
Nigel-Smart-150x150
Prof. Nigel Smart
Ask The Professor - Ep.9
December 12, 2018

Prof. Nigel smart answers: What are garbling circuits? What books would you recommend to learn more about public key cryptography? Is cryptography concerned with worst or average case difficulty to solve problems? In the ‘Ask the Professor’ video series, Professor Nigel Smart, a world-renowned expert i

Authentication
Tova
Tova Dvorin
Three Ways Authentication has changed since 1960
June 29, 2020

An oral history of the tech community’s efforts to connect computer operations with the people behind them. When you think “authentication,” what comes to mind? For most security professionals, authentication = passwords, and the many security issues which passwords have created over the y

Authentication
Tova
Tova Dvorin
The Cost of Doing Nothing
July 12, 2020

The old adage of “why do robbers target banks? Because that’s where the money is,” has never rung truer as it does today when we consider the increase in security attacks designed to gain access to identity credentials. Now more than ever, businesse

Digital Assets
Yehuda
Prof. Yehuda Lindell
July 20, 2020

In security, a “root of trust” is an element that can be trusted and then used to ensure that the entire system is secure. In cryptography, it can be used to mean many things, but the most basic root of trust is that cryptogra

Authentication
Tova
Tova Dvorin
SIM swapping
August 3, 2020

SIM swapping has become one of the most common attacks on Internet-of-Things (IoT) devices over the past 5 years – and anyone with a cell phone is at risk. In January 2020, Princeton researchers determined that 17 out of 140 online services and websit

Digital Assets
Tova
Tova Dvorin
Building Your Own Digital Asset Security Infrastructure
November 7, 2019

Do you develop your own digital asset custody or trading platform security infrastructure in-house, or are you thinking of doing so? Here’s the ins and outs of going at it yourself for the long term.   As your digital asset services business grows

Key Management
michal_brenner-150x150
Michal Brenner
Code Signing with Extended Validation
November 14, 2019

You’ve probably noticed when surfing the web, some browsers show a special indicator like a green bar containing the company name, or in some instances, completely replacing the URL with the company name. This is a result of Extended Validation (EV) certificates—a type of digital ce

Digital Assets
Yehuda
Prof. Yehuda Lindell
The Importance of Proofs of Security
December 4, 2019

This is the sixth blog in a series aimed at explaining the growing use of MPC and threshold signing to protect cryptocurrencies. Read the other posts in this series: Shamir Secret Sharing and Quorums Threshold Signature Schemes Additional Properties of Threshold Signing MPC Co

Key Management
Yehuda
Prof. Yehuda Lindell
Publicly Verifiable Backup of Signing Keys
January 9, 2020

This is the seventh blog in a series aimed at explaining the growing use of MPC and threshold signing to protect cryptocurrencies. Check out the rest of the blog posts in this series: Shamir Secret Sharing and Quorums Threshold Signature Schemes Additional Properties of

Key Management
Oz-Mishli-150x150
Oz Mishli
When Encryption is Not Enough for Data Stored in the Public Cloud
January 26, 2020

Got sensitive data in the public cloud? Encryption is essential, but there’s more to it. Using the public cloud has become the de-facto standard for many organizations, many of which use two or more public cloud services providers, along with on-premise data center

Digital Assets
Tova
Tova Dvorin
Incorporating Digital Assets Into Custody Services
February 27, 2020

If you’re managing a custodian service, you may be feeling a new wave of change starting to impact your business. Long gone are the days of strictly physical asset protection, investment, and transfer; and with blockchain and cryptocurrency adoption on the rise, the latest ad

MPC
Yehuda
Prof. Yehuda Lindell
An MPC Protocol is Not A Security Solution
March 12, 2020

  This is the eighth and last blog in a series aimed at explaining the growing use of MPC and threshold signing to protect cryptocurrencies. Check out the rest of the blog posts in this series: Shamir Secret Sharing and Quorums Threshold Signature Schemes A

Digital Assets
Tova
Tova Dvorin
Digital Asset Security
March 22, 2020

A look at digital asset security infrastructure via in-house deployment of a platform solution developed by a security expert vendor. Scenario: You’re a CISO looking to secure your financial services organization’s digital assets — and secure them effectively and efficiently for the long

MPC
Yehuda
Prof. Yehuda Lindell
What is Secure Multiparty Computation MPC
March 24, 2020

In this blog series, I will describe what secure multiparty computation is, what it can be used for, how it works (to some extent), and more. My aim is for the majority of the content to be accessible to a general reader, wit

Digital Assets
michal_brenner-150x150
Michal Brenner
default-image-400x213
December 25, 2018

Photo by Christopher Burns on Unsplash 2018 was a stormy year for the crypto-asset market. We’ve seen the market cap swing from a nearly $800 billion high in January to $100 billion low in December, according to CoinMarketCap. Governments and leading financial institutions contemplated thei

Digital Assets
Oz-Mishli-150x150
Oz Mishli
default-image-400x213
October 22, 2018

10 years into the blockchain revolution, how do we safeguard crypto assets today? The genesis block. (Wiki) Soon, on 3 Jan 2019, it would be exactly a decade since the day when the genesis block of bitcoin was mined. Interestingly, this block included a header

Digital Assets
Rebecca--150x150
Rebecca Aspler
default-image-400x213
November 15, 2018

Most exchanges — fiat or cryptocurrency — maintain an operational strategy that involves aggregation of funds from multiple consumers’ accounts into a single higher-level account. In the cryptocurrency space this is known as a ‘co-wallet’ strategy. By means of introduction, the co-wallet strategy ass

Digital Assets
Oz-Mishli-150x150
Oz Mishli
default-image-400x213
December 18, 2018

The anatomy of attacking a crypto exchange There is a famous quote associated with Willie Sutton, a famous 20th century American bank robber. When he was asked why he robbed banks, he simply answered: “Because that’s where the money is.”   This simple an

Digital Assets
Tova
Tova Dvorin
default-image-400x213
January 4, 2019

We’re several days after 2019’s “Proof of Keys” — an annual event, started by crypto investor and podcaster Trace Meyers, encouraging cryptocurrency investors to withdraw their holdings from cryptocurrency exchanges in order to promote Bitcoin’s founding principles of monetary independence and decentralization

Digital Assets
Tova
Tova Dvorin
Choosing Your Crypto Asset Protection
March 20, 2019

Hardware Security Modules (HSMs) have been the financial sector’s go-to key protection strategy for the past two decades. Multi-Sig has become the default choice for crypto-native institutions that want to secure cryptocurrencies and blockchain transactions. Both are well-known and well-documented – but have many disad

Digital Assets
Tova
Tova Dvorin
The Rise of the Rogue Insider
April 4, 2019

Blockchain breaches and cryptocurrency heists continue to change in 2019 – from the exchange hacks we know to a new, scary brand of theft from rogue insiders. The latest victim of the rogue insider trend is Bitthumb, which suffered its third hack in

Digital Assets
Rebecca--150x150
Rebecca Aspler
Cold Wallets Meet Software
April 17, 2019

Those familiar with the cold storage/hot storage debate know that in the eyes of the public, cold storage wins. Google trends data from the past 5 years reveals that while multi-sig has the most buzz, cold storage is more talked about than hot wal

Oz-Mishli-150x150
Oz Mishli
default-image-400x213
July 11, 2019

The massive hype generated by Facebook’s official launch of Libra in mid-June refuses to decline. Indeed, this is arguably the biggest cryptocurrency endeavor the market has ever seen, and if things go as planned for Facebook and the Libra association, Libra will finally

Digital Assets
Tova
Tova Dvorin
Cryptocurrency Exchange Hacks
July 31, 2019

2018-9 continues to be the year of the hack, with 23 recorded exchange hacks within the past 18 months. 2018 had an “ebb and flow” of hacks, with a cluster of hacks every 2-3 months. But as 2019 continues with what seem

Digital Assets
Tova
Tova Dvorin
Quorum Authorization
August 6, 2019

Cryptocurrency began as a venture of the anarchist underground. In 2009, Satoshi Nakamoto’s genesis block debuted with text referencing the front page of the Times, and the January 3 headline about bailouts. Crypto arose as the ultimate antithesis of the traditional banking system and

Digital Assets
Tova
Tova Dvorin
Four Ways Exchanges Cold Storage Systems Kill Their Transaction Velocity
August 6, 2019

Exchanges use a cold-storage/hot wallet combo to keep assets safe – but it’s slowing down their businesses and keeping them from growing. In the crypto-native community, exchanges get a bad rap. Between a plethora of cryptocurrency exchange breaches since 2014 and high-profile insider the

Digital Assets
Tova
Tova Dvorin
What BitPoint Teaches Us
August 19, 2019

In July 2019, the cryptocurrency investment community woke up to shocking news: Japanese exchange BitPoint had been hacked – withstanding $28 mil USD in losses. Here’s what we know:   In the heist, hackers pilfered the funds from the company’s software-based, or “hot” wallets. These wallets held 5 different coins,

MPC
Yehuda
Prof. Yehuda Lindell
Asynchronous Approval in Threshold Signing
October 23, 2019

This is the fifth blog in a series aimed at explaining the growing use of MPC and threshold signing to protect cryptocurrencies. Brief recap In the first four blog posts in this series (Shamir Secret Sharing and Quorums, Threshold Signature Schemes, Additional Properties of Threshold

Digital Assets MPC
Yehuda
Prof. Yehuda Lindell
MPC Compared to Other Approaches
September 3, 2019

This is the fourth blog in a series aimed at explaining the growing use of MPC and threshold signing to protect cryptocurrencies. Brief recap In the first three blog posts in this series (read Shamir Secret Sharing and Quorums, Threshold Signature Schemes, and Additional Prop

Digital Assets MPC
Yehuda
Prof. Yehuda Lindell
Additional Properties of Threshold Signing
August 28, 2019

This is the third blog in a series aimed at explaining the growing use of MPC and threshold signing to protect cryptocurrencies. Brief recap In the first two blog posts in this series (Shamir Secret Sharing and Quorums and Threshold Signature Schemes), I describe

MPC
Yehuda
Prof. Yehuda Lindell
MPC for Cryptocurrency Protection
July 29, 2019

This is the first blog in a series aimed at explaining the growing use of MPC and threshold signing to protect cryptocurrencies. The Problem: Key Protection is Not Enough As we all know, one of the primary features of cryptocurrencies and blockchain-based distributed l

MPC
Yehuda
Prof. Yehuda Lindell
Secure Multiparty Computation
July 14, 2019

What is MPC? Secure multiparty computation (MPC) is a technology that enables different parties with private inputs to carry out a joint computation on their inputs without revealing them to each other. For example, it is possible for two people to compare thei

Key Management
michal_brenner-150x150
Michal Brenner
Lessons from the Asus Hack
April 8, 2019

It was revealed two weeks ago that hackers had broken into computer giant ASUS’ servers and compromised their code signing keys.  According to Kaspersky Labs, ASUS’ software update system was hacked and used to distribute malware to about 1 million Windows computers. The malware was

Key Management
George-Wainblat-150x150
George Wainblat
Looking at Code Signing Holistically
June 27, 2019

Code signing proves the identity of the source vendor of a software (only the private code signing key holder can create the signature) and verifies that the code has not been tampered with since being published. Code signing can be done in two p

Compliance
George-Wainblat-150x150
George Wainblat
default-image-400x213
May 24, 2018

As May 25th, the effective date of GDPR inception, is just around the corner, we decided to take a closer look on how encryption can be leveraged to achieve GDPR compliance. A Few Words About GDPR The General Data Protection Regulation (GDPR) harmonizes data p

Compliance
Oz-Mishli-150x150
Oz Mishli
default-image-400x213
July 19, 2018

If you’re a financial institution that does business in New York State, then you most likely already know about New York State Department of Financial Services Cybersecurity Requirements for Financial Services Companies (23 NYCRR 500), commonly referred to as the NY-DFS Cybersecurity Regulatio

Compliance
George-Wainblat-150x150
George Wainblat
Encryption and Regulation
August 9, 2018

How Do I Encrypt Thee? Let Me Count the Ways In our recent blog post on NY-DFS compliance requirements, we discussed the significant role of encryption as a means for financial institutions to implement security controls over non-public data in their possession. Encrypt

Key Management
George-Wainblat-150x150
George Wainblat
default-image-400x213
August 20, 2018

Since the publication of the Spectre and Meltdown attacks in January this year, security researchers have been taking a close look at speculative execution and it’s security implications. Recently, research independently conducted by two groups of researchers (a first team from KU Leuven in

Key Management
George-Wainblat-150x150
George Wainblat
default-image-400x213
August 30, 2018

Preface In this blog, we will delve into BYOK approach to security model of the encryption keys in the cloud. We will also cover how Unbound Key Control can be used to securely enable a multi-cloud strategy for the enterprise. Cloud Security Model for Cry

Key Management
George-Wainblat-150x150
George Wainblat
When Traditional High Availability Is Not Good Enough
June 6, 2019

In this blog, we will explore how one can provide a highly available key management and vHSM service, for the relevant cryptographic use cases, comparing Unbound pure-software technology to the legacy HSMs. The digital revolution has transformed the landscape of business. Traditional high availa

Key Management
Yehuda
Prof. Yehuda Lindell
Major Vulnerabilities in Hardware Security Modules
June 10, 2019

Hardware Security Modules (HSMs) are physical boxes that carry out cryptographic operations, and never reveal the keys inside. They are designed to have very high security, and as such, are used to protect an organization’s most valuable cryptographic keys. Due to their long hist

Key Management
George-Wainblat-150x150
George Wainblat
How to Hack an Hardware Security Module
July 3, 2019

Ever wondered how it’s possible to hack a hardware security module (HSM)? ​We recently had the opportunity to chat with Dr. Fotis Loukos, researcher at the Aristotle University of Thessaloniki and Director of Security Architecture at SSL Corp.  We also spoke to him about standardization testing

MPC
Nigel-Smart-150x150
Prof. Nigel Smart
default-image-400x213
March 25, 2019

We’ve taken the past couple of weeks to reflect on RSA and consider the many things we learned. In addition to receiving socks, t-shirts, pens and iPads, attendees were genuinely interested to learn about the many new products and technologies exhibiting at the

Digital Assets
Nigel-Smart-150x150
Prof. Nigel Smart
Cryptographic Lessons in Trust blog
August 19, 2020

Cryptography forms the basis of much of our digital infrastructure and the services built around that infrastructure. Whether it be about accessing mobile phone networks, our online or ATM accessed bank accounts, paying for something online, or the task of passing through automated passpor

Digital Assets MPC
Yehuda
Prof. Yehuda Lindell
Threshold Signature Schemes
August 15, 2019

This is the second blog in a series aimed at explaining the growing use of multi-party computation (MPC) and threshold signing to protect cryptocurrencies. Brief recap In the first blog post in this series, I described why key protection alone is not enough for p

MPC
Nigel-Smart-150x150
Prof. Nigel Smart
Information Security in the Kitchen
September 2, 2019

One is often asked as a Professor to explain some complex aspect of security in an easy way. This week I saw an interesting talk which explained cache attacks via means of cookery. So let me share this with you. Imagine you are in

Digital Assets
Rebecca--150x150
Rebecca Aspler
Digital Asset Custody
July 2, 2019

When it comes to secure custody solutions for cryptocurrency and digital assets, the golden era of hardware is on its way out.   On the surface, HSMs remain popular for institutional cryptographic key custody, blockchain or not – and cold wallets reign supreme in crypto-enthusiast culture on Twitter and Google alike.

MPC
Nigel-Smart-150x150
Prof. Nigel Smart
Ask The Professor - Ep.3
January 14, 2018

Where is crypto headed? What does this mean for Post-Quantum Cryptography, Privacy and Machine Learning? Prof. Nigel Smart discusses the future of crypto, and explains the difference between Homomorphic Encryption vs. Secure Multi-Party Computation vs. Blind Computation and why the breaking of the Enigm

MPC
Nigel-Smart-150x150
Prof. Nigel Smart
Ask The Professor - Ep.2
January 14, 2018

Ever wondered what the difference between public key vs. private key cryptography actually means? Furthermore, why is quantum cryptography even important? Prof. Smart answers all of your questions, and also explains how cryptography has changed in the past five years. In the ‘Ask the Pro

MPC
Nigel-Smart-150x150
Prof. Nigel Smart
Ask The Professor - Ep.1
January 14, 2018

 Prof. Nigel answers some fundamental questions about the mathematical guarantees of cryptographic algorithms, explains how Multiparty Computation (MPC) works, and most importantly, why he became a cryptographer in the first place. In the ‘Ask the Professor’ video series, Professor Nigel Smart, world-renowned

MPC
Nigel-Smart-150x150
Prof. Nigel Smart
Ask The Professor - Ep.16
September 9, 2019

 This week, Prof. Nigel Smart answers the latest of the internet’s burning questions: What is public-key cryptography in layman’s terms? How is it related to prime numbers? How do I teach the workings of public and private key encryptions as a game among

MPC
Nigel-Smart-150x150
Prof. Nigel Smart
Ask The Professor - Ep.15
September 9, 2019

 In this all-new episode of “Ask the Professor,” Prof. Nigel Smart addresses a medley of the internet’s best cryptography questions: Can a combination of a digital signature and public-key cryptography be considered a hybrid cryptosystem? How can cryptography be explained to a lay

MPC
Nigel-Smart-150x150
Prof. Nigel Smart
Ask The Professor - Ep.14
September 9, 2019

 In this all-new episode of our hit series, “Ask the Professor,” Prof. Nigel Smart answers the following questions: What is the difference between a one-shot MPC protocol and an unbounded invocation of multiple MPC protocols? Would public key cryptography have been possible

Key Management
George-Wainblat-150x150
George Wainblat
August 9, 2017

Cloud-Native Secrets Management: Part I This is the first part in a three-part blog series titled “Introduction to Cloud-Native Secrets Management”. Cloud-Native Over the last several years, a massive transition from on-premises to the cloud is taking place, resulting in a significant increa

Key Management
George-Wainblat-150x150
George Wainblat
October 3, 2017

Introduction to Cloud-Native Secrets Management: Part II This is the second part in a three-part blog series titled “Introduction to Cloud-Native Secrets Management”. I had a lot to say so I am giving my readers the option to read the concise version below, or

Key Management
Prof-Nigel-Smart-x1
Liron
February 19, 2018

Introduction to Cloud-Native Secrets Management:Part III In the first part of the cloud-native blog series we introduced the various types of secrets that need protection in the cloud, the technical challenges and the business implications of security compromises. In the second part we deep-d

MPC
Rebecca--150x150
Rebecca Aspler
September 16, 2020

Cryptographic Validated and Easy to Use Multi-Party Approval Structures The setting of MPC is one where a number of distinct, yet connected, computing devices (or parties) wish to carry out a joint computation of some function, while preserving certain security properties in the face of adversarial behavior. The b