Scientists seek to plug gaps in computer security

    Date11 Nov 2003
    CategoryCryptography
    3784
    Posted ByAnthony Pell
    To counter these hackers, the centre is pursuing a variety of approaches to the problem, such as developing software to detect intruders. Another involves improved cryptography, or the special coding of information. "It's an important building block for security systems," Sevinc . . . To counter these hackers, the centre is pursuing a variety of approaches to the problem, such as developing software to detect intruders. Another involves improved cryptography, or the special coding of information. "It's an important building block for security systems," Sevinc explains. "The code should be practically unbreakable, but of course you never know."

    The only way to find if a new protection system is secure is test it out in the public domain. "If someone manages to get through, we look at how they did it and we try to improve on our original idea," said Sevinc.

    You are not authorised to post comments.

    LinuxSecurity Poll

    Do you reuse passwords across multiple accounts?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).
    /component/communitypolls/?task=poll.vote
    13
    radio
    [{"id":"55","title":"Yes","votes":"0","type":"x","order":"1","pct":0,"resources":[]},{"id":"56","title":"No","votes":"0","type":"x","order":"2","pct":0,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.