Cryptography - Page 55

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Cryptography News

RSA Security's Crypto Patent Expiration May Spur More Competitive PKI Tools

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

RSA's competitors' reactions to the expiration are mixed. Baltimore Technologies Inc. responded with its own announcement of new products and initiatives. It's eliminating its runtime licensing for its PKI development suite KeyTools and will switch to a flat fee, and it's also offering a free KeyTools Lite, which includes cryptographic and digital certificate functions, including communication with a certificate authority or a Lightweight Directory Access Protocol directory. . . .

RSA Algorithm Released: Update

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The release of the algorithm is a good thing because you can now create cryptographic software using one RSA implementation and distribute it worldwide without having to license anything from RSA. ... This is good news because you can, for example, . . .

GPG vs. PGP?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

What are the relative merits and drawbacks of using Gnu Privacy Guard vs. Network Associates' PGP. I am not referring to the fact that GPG doesn't use any restricted implemtations or algorithems; or that GPG was not affected by the recent . . .

RSA releases proprietary security algorithm

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

... Despite RSA's gesture, several competitors who have paid royalties for use of the algorithm for up to 17 years, argue that the industry could have done with the patent relaxation earlier. "Of course its fantastic news, but after 17 years to suddenly release it two weeks early is a bit of a stunt," says Paddy Holahan, vice president of marketing at Baltimore Technology. "It has held back e-commerce.". . .

Welcome to the RSA Freedom Clock page!

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Interested in knowing up to the second increments on the status of the impending RSA patent expiration? This site also provides a view on what the author thinks of software patents to begin with... "The patent office has shown remarkable incompetence . . .

Zimmermann responds to PGP flap

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Phil Zimmermann, the creator of Pretty Good Privacy (PGP), responds to the recent flaw discovered in Network Associates implementation of the Additional Decryption Key (ADK) feature. This is a key escrow account that allows a responsible third-party to gain access to . . .

Ain't no network strong enough

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Master cryptographer Bruce Schneier's "Secrets and Lies" explains why computer security is an oxymoron. Bruce Schneier, master cryptographer and idol of the computer underground, targets those short-attention-spanners in his latest book, "Secrets and Lies: Digital Security in a Networked World." Aiming . . .

The Emotional Side of Cryptography

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Encrypting data before storage or transmission involves a bit of extra work. This often means that people who ought to be using encryption, instead of relying on the assumption that their data will not be intercepted, fail to do so. But it is also true that some of the people who use encryption are keenly aware of the importance of keeping their information secret.. . .

Pretty Good Privacy flaw reported

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A GERMAN RESEARCHER has discovered a major security flaw in the latest versions of the PGP free e-mail encryption software that could allow someone to read another person's encrypted e-mail if he or she was able to intercept it. . . .

PGP Vulnerability

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A very serious PGP vulnerability was just discovered. Using this vulnerability, an attacker can create a modified version of someone's public key that will force a sender to encrypt messages to that person AND to the attacker.

Installing Command Line PGP

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The following is a description of how I got a Linux version of the PGP encryption program, how I installed it, and a few observations about quirks in the program. The Linux version of PGP that I got is PGPcmdfw_6.5.2_Linux.i386.rpm and . . .

New book by Bruce Schneier

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Bruce Schneier, computer security expert, CTO and founder of Counterpane Internet Security, Inc., has written a new book specifically for corporate managers. Secrets and Lies: Digital Security in a Networked World is a practical, straightforward guide to understanding and achieving security . . .

SSH-Agent 1.2.27 Tutorial

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Security is best when it is handy. ssh-agent is pretty darn handy. Ssh-agent can authenticate you to a remote machine via keypairs, rather than the traditional hand-typed username/password combination, with no loss of security.. . .

Encryption Gets Really Small

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Scientists at the University of Geneva are collaborating with the Swiss Ministry of Posts and Telecommunications on an experiment that uses quantum computers to run an unbreakable encryption algorithm. Cryptography could, in fact, be the first commercial application for this technology. . . .

Why Are Keys Certified?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Key certificates are an important element in the use of public-key cryptography (PKC). Your browser, when it visits a secure site, checks for a key certificate from a small number of commercial certificate providers. The instructions that came with PGP described . . .

An Old Spy with a New Vision of Encryption

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Ex-NSA official and now Cylink CEO Bill Crowell is reviving the software maker and helping to bridge the government-industry divide. William Crowell doesn't look like what you'd expect. Espionage expert? Give me a break. Silicon Valley executive? No way. The 59-year-old . . .