Cryptography - Page 52

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Cryptography News

NSA coughs up secret TEMPEST specs

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The first of several documents related to the US government's TEMPEST programme, obtained by Cryptome.org's John Young under a Freedom of Information Act (FOIA) request, have been posted on his Web site. His original request was denied, but the persistent Young . . .

Can DVD Be Protected?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

In the wake of DeCSS, the decryption technology for DVD, the Digital Versatile Disc industry has been searching for well over a year for new ways to thwart DVD piracy. But in much the same way the industry stepped on its . . .

New version of SendIP

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

New version of SendIP (1.4) available with bugfixes, a contrib dir and a default RIP option... SendIP is a command-line tool to send arbitrary IP packets. It has a large number of options to specify the content of every header of . . .

dsniff and SSH

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The following essay clarifies the facts in the "End of SSL and SSH" article written by Kurt Seifried a few days ago. "On 17 December 2000, Dug Song released a new version of his well-known package of network sniffing tools, dsniff. . . .

Laptop encryption and international travel

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The restrictions on using PC encryption products are far more lenient than those on importing software or hardware encryption for distribution or resale. In France, for example, the law states that upon entry to the country, travelers must register their decryption . . .

Net Security, Flawed

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

SSL and SSH have emerged, with other protocols, to provide authentication methods using a public key infrastructure. These protocols were developed to protect large amounts of network traffic from online shopping to financial transactions with online banks. . . .

Microsoft, others create XML-based encryption scheme

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Microsoft, VeriSign and webMethods Wednesday introduced a specification that works to simplify the integration of Public Key Infrastructure and digital certificates with XML applications. The companies have released the spec, dubbed XML Key Management Specification (XKMS), and will submit it to . . .

The End of SSL and SSH?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Yesterday, dsniff 2.3 was released. Why is this important, you ask? dsniff 2.3 allows you to exploit several fundamental flaws in two extremely popular encryption protocols, SSL and SSH. SSL and SSH are used to protect a large amount . . .

DeCSS case runs into Calif. roadblock

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Hollywood loses a ruling in its fight to outlaw DeCSS, an open-source Linux computer code that allows copying of protected DVD disks. The motion picture industry's effort to ban computer code that subverts its DVD encryption scheme has suffered a setback . . .

A message carved in spam

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

I have to admit that the excitement and fury over encryption leaves me baffled. It's not that I can't grasp the issues and long-term global implications, or that I fail to marvel at the technical complexities involved, but as far . . .

Record company prepares to sell copy-protected CDs

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Country music record company Fahrenheit Entertainment said it will begin selling copy-protected CDs by early next year using encryption technology from SunnComm, a little-known company based in Phoenix. If successfully employed, SunnComm's technology could become the first to hamper the copying . . .

Encryption experts set to bust RIP rules

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Regulation of Investigatory Powers (RIP) Act could be so much waste paper if a groundbreaking UK encryption project succeeds. Mathematician Peter Fairbrother has launched a project called M-o-o-t, which would make it physically impossible to surrender encryption keys - . . .

Mightier Than the Pen

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Digital signatures are coming, promising the rebirth of the Internet gold rush and the death of paper. Either that or a security nightmare. Earlier this year, President Clinton took the first step toward ending Hancock's long association with autographs by signing . . .

IBM claims faster encryption technology

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

IBM Corp. announced Thursday a secure method for digitally scrambling and signing data that it claims will take half the time of today's fastest techniques. IBM billed the combination encryption-authentication technique as especially suitable to secure mobile communications because of . . .

Will the Future Be Anonymous?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The work of David Chaum and Stefan Brands on protocols, such as blind signatures, that provide anonymity has attracted a great deal of interest among people interested in cryptography. In the RSA algorithm, given a public key consisting of an encryption . . .

US unlocks encryption market

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Australia is said to be at least two years behind the United States when it comes to the internet, so the two-year communication blackout between the US and Australian branches of encryption developer RSA Security seems entirely appropriate. The ban existed . . .