Blog

News and articles

Why Delaying PSD2 is Good

23 Aug, 2019 by MIRACL International Limited

<img src="/assets/images/miracl-blog-psd2update.jpg" alt="Digital signatures, cryptographic signing and designated verifier signatures"> <p><strong><em>(2 Minute Read)</em></strong></p> <br> <p>No-one thought complying to PSD2 was going to be easy. This revised Payment Services Directive is going to revolutionise the payment services industry but this is going to take time. Delaying until 2021 will ensure organisations find the best solution to make the necessary changes and ultimately ensure online payments within Europe are safer, faster, cheaper and more convenient.</p> <p>Last year, cyber incidents increased by 1000% and fraud losses on UK ‘card not present’ transactions 47%. Numbers that are only going to keep rising unless security on payments improve. PDS2 calls for big changes, but integrating and incorporating the right solution that is both user friendly and secure is important – delaying until 2021 provides organisations time to find the right solution.</p>…

Designated Verifier Signatures

19 Aug, 2019 by Dr Michael Scott

<img src="/assets/images/miracl-blog-digital-signature.jpg" alt="Digital signatures, cryptographich signing and designated verifier signatures"> <h4 id="here-dr-michael-scott-considers-digital-signatures-and-the-verification-they-provide-in-todays-digital-world-4-minute-read">Here, Dr Michael Scott considers digital signatures and the verification they provide in today’s digital world. (4 Minute Read)</h4> <p>Digital signature is an attempt to provide a digital analogue of the human signature. Before getting into that, let’s look again at the human signature, and what it provides.</p> <p>The hand-written human signature provides irrevocable authentication of a document. You sign something, you are committed to it, and you can’t deny it later.</p>…

No more dongles

09 Oct, 2018 by James Chapman

<div class="tile is-5 is-pulled-left" style="margin: 0 30px 20px 0;"><img src="/assets/images/miracl-blog-no-more-dongles.jpeg" alt="No more dongles"></div> <p>One of the biggest issues in security today is that of secure identification and the misuse of stolen credentials to gain fraudulent access. This is highlighted in recent Verizon Data Breach reports: in the <a href="https://www.verizonenterprise.com/resources/reports/2017_dbir_en_xg.pdf" target="_blank">2017 report</a> it is revealed that 62% of data breaches featured hacking with 81% of these leveraging stolen or weak passwords; in the <a href="https://www.verizonenterprise.com/verizon-insights-lab/dbir/" target="_blank">2018 report</a> the authors note the considerable number of breaches due to botnets using malware to capture login details and exclude them from their analysis since “due to the sheer number of them (over 43,000 successful accesses via stolen credentials), they would drown out everything else”.</p>…

How can Two-Factor Authentication Protect your Brand?

13 Feb, 2018 by MIRACL Blogger

<img src="/assets/images/miracl-blog-hack.png" alt="Data breaches and how they can stop with two factor authentication"> <p>What do Yahoo!, Equifax, and eBay all have in common aside from data breaches on an epic scale? They all rely on a user’s trust across digital networks to move their businesses forward.</p> <p>If your enterprise still relies on stored and shared authentication credentials (e.g. passwords) it’s only a matter of time before your company’s name (and perhaps your name as well) appear in the news related to a hack of your user database.</p>…

How can you Easily Protect Citizen and Consumer Data?

01 Feb, 2018 by MIRACL Blogger

<img src="/assets/images/miracl-blog-data-protection.png" alt="data protection"> <p>Your end user has a relationship with your business application for only one reason. To do business with you. Anything that interferes with the security of that relationship not only disrupts your business, but also can place your customers at risk in other business relationships.</p> <p>As seen with the Equifax breach in the United States, 143 million US citizens lost control of their Social Security numbers, which are used in nearly all government and banking systems. Not only were citizen business and banking disrupted, but proposed legislation in the US could fine companies like Equifax up to $100 per affected user for future disclosures.</p>…

How Regulated Industries can Easily Comply with Security Requirements

18 Dec, 2017 by MIRACL Blogger

<img src="/assets/images/miracl-blog-compliance.png" alt="Compliance for Regulated Industries" title="Compliance for Regulated Industries"> <p>Europe’s financial institutions are sleepwalking into a regulatory nightmare with security systems that are not fit for purpose to meet the requirements of the European Union’s revised Directive on Payment Services (PSD2), which was adopted in 2015. Member states have had two years to introduce the necessary changes in their national legislation in order to comply with the new rules, and firms are expected to be compliant by January 2018.</p>…

The Simple Commandments You Should Learn to Avoid Leaking Secrets

06 Dec, 2017 by Dr Michael Scott

<img src="/assets/images/miracl-blog-leak.png" alt="Leaking secrets" width="1199" title="Leaking secrets" caption="false"> <p>Often a competent and experienced software engineer is tasked to implement a cryptographic algorithm. Unfortunately they may be unaware of what we call side-channels attacks.</p> <p>For example normally a programmer couldn’t care less about the power consumption profile of their running program. However in many situations where cryptography is deployed an attacker is in a position to monitor power consumption. And the power consumption profile may leak information about a secret cryptographic key. And power consumption is just one example of what we call a side-channel. A list of some of the side channels we need to worry about is given here - <a href="https://en.wikipedia.org/wiki/Side-channel_attack" target="_blank"><a href="https://en.wikipedia.org/wiki/Side-channel_attack" target="_blank">https://en.wikipedia.org/wiki/Side-channel_attack</a></a></p>…

Stop the Hackers: Here's How to Remove Your Password Database

30 Nov, 2017 by MIRACL Blogger

<p><strong>There are two key questions anyone associated with business and data need to ask themselves:</strong></p> <ol> <li><strong>Does our company still have a password database and, if so</strong></li> <li><strong>Why?</strong></li> </ol> <img src="/assets/images/email/zero-knowledge-vs-passwords.jpg" alt="Zero Knowledge is more secure than passwords" width="994" height="559"> <p>The simple fact is that there is no reason for any company to have a password database anymore. It is now estimated that 81% of all hacking related breaches involve the use of stolen or weak credentials (<em>source: <a href="http://www.verizonenterprise.com/verizon-insights-lab/dbir/2017/" target="_blank">DIBR</a></em>). And we need to put this in the context of 8 billion authentication credentials having been stolen since 2013, with all that this implies for damage to a company’s business and brand reputation.</p>…

Post Quantum Identity Based Encryption

13 Nov, 2017 by Dr Michael Scott

<img src="/assets/images/miracl-blog-iStock-680270994.jpg" alt="iStock-680270994.jpg" width="1199" height="899"> <p>In our last blog, <a href="/blog/post-quantum-cryptography-for-grandparents" target="_blank" title="Post Quantum Cryptography for Grandparents">“Post Quantum Cryptography for Grandparents”</a>, (which you really need to read first before reading this one) we pointed out that Post-Quantum cryptography as based on the Ring Learning with Errors (RLWE) problem, can actually be quite easy to understand, despite its rather terrifying terminology.</p> <p>Its based on this one-way function</p> <p><strong><em>B=As+e</em></strong></p> <p>Where <em>A</em> and <em>B</em> are “large” polynomials and <em>s</em> and <em>e</em> are “small” polynomials. Given <em>A</em> , <em>s</em> and <em>e</em> , its easy to calculate <em>B</em>, its just a multiplication followed by an addition. However given <em>B</em> and <em>A</em> , its very hard to calculate <em>s</em> and <em>e</em> . Even a quantum computer can’t do it. That’s why we call it one-way.</p>…

How to Explain Post Quantum Cryptography to Anyone

02 Oct, 2017 by Dr Michael Scott

<img src="/assets/images/miracl-blog-iStock-495007435.jpg" alt="iStock-495007435.jpg"> <p>Its actually not as complicated as it sounds. Let’s get the maths over with first. Remember polynomials?</p> <p><strong>(x+1)(x+1)=x<sup>2</sup>+2x+1</strong></p> <p>This would be an example of two first degree polynomials being multiplied together to create a second degree polynomial (or quadratic). In general two <em>n</em>-th degree polynomials when multiplied together create a <em>2n</em>-th degree polynomial result. Polynomials can also be added</p> <p><strong>(3<em>x</em>+5)+(5<em>x</em>+6) = 8<em>x</em>+11</strong></p> <p>Don’t tell me that’s hard! For the polynomial 8<em>x</em>+11, the coefficients are 8 and 11.</p>…

First Hybrid, then fully Post Quantum

15 Aug, 2017 by Dr Michael Scott

<p><strong>As we are all aware we are on the cusp of a major revolution in the auto-mobile industry. In 20 years we will all be driving electric cars and the good old petrol engine will be something we visit in museums. Already governments are legislating, and auto makers are revamping their assembly lines, to be ready in good time.</strong></p> <img src="/assets/images/miracl-blog-hybrid-car-2503566_1920.jpg" alt="Hybrid car" width="994" height="662"> <p>In the meantime the industry has introduced a slew of “hybrid” models, which have two engines, one petrol and one electrical. This is a perfectly rational holding position to take. It avoids putting all of the eggs in one basket, so if the new electric motor fails for any reason, the car still functions.</p>…

PSD2 - What Will Your Bank Do?

30 May, 2017 by MIRACL Blogger

<p><strong>In 2018, PSD2, the revised Payment Service Directive will be implemented which will change banking as we know it. Banks and payment services will be required to comply with new legislation which aims to improve innovation, reinforce consumer protection, and improve the security of internet payments and account access within the EU and EEA.</strong></p> <h3 id="what-is-psd2">What is PSD2?</h3> <p>The Payment Services Directive is an EU Directive, administered by the European Banking Authority to regulate payment services and providers. The directive’s purpose is to provide a level playing field by harmonising consumer protection as well as the rights and obligations of payment providers and users. The new requirements are designed to open access to banking customers, both consumers and businesses, through 3rd party providers and open APIs.</p>…