Do you happen to have a crypto algorithm you’d like to introduce? Then get ready to do a thorough security proof; just because you can’t break it, doesn’t mean it’s secure. Prof. Nigel Smart discusses the process of introducing a cryptographic algorithm, what applications MPC (secure multiparty computation) is used for, and gives a clear cut answer to whether we can bioengineer public-key cryptography into human voice.