Consultancy and applied cryptology research. Design and analysis of encryption algorithms and security protocols. Comparison of their strengths based on mathematical security proofs, assessing the impact of known or potential methods of attack.

Implementation of cryptographic and related security functionality, and integration of software libraries.

Software Audit

Detailed security review of software, with or without source code, for software vendors and their customers.

Applications checked for vulnerabilities by an experienced programmer, with special focus on privacy and authentication. ‘Manual’ analysis beyond the capability of automated code review tools.

Reverse Engineering

Do you suspect a particular program is malicious? My detailed malware analysis will help to investigate security incidents.

Are you considering using a third-party application? Have it analysed so that you know how it works and whether it can be trusted.

I also reverse engineer unknown protocols, file formats and legacy software for interoperability purposes.