Cryptography - Page 56

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Cryptography News

Bruce Schneier, "It doesn't look good. "

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Speaking at the Black Hat Security Conference, a noted cryptography expert predicts a gloomy future for online security. Cryptographer and security expert Bruce Schneier (seen here in an earlier photo) gave one of the opening keynotes Wednesday. In it, he argued . . .

Encryption export policies updated

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The United States on Monday announced an update to its encryption export policy affecting companies that sell encryption software to users in the 15 European Union nations and in eight other countries that are U.S. allies.

Clinton relaxes crypto export rules

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The United States has eased its rules on exporting encryption products to the European Union and other key trading partners in an effort to improve security in cyberspace and promote electronic commerce, the White House said today. Under the new policy, . . .

SSH Tutorial

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Enter SSH (Secure SHell). By using SSH, you encrypt the traffic and you can make 'man-in-the-middle' attacks almost impossible. It also protects you from DNS and IP spoofing. As a bonus, it offers the possibility to compress the traffic and thus . . .

OpenSSH's Cinderella story

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Once upon a time, a Finnish programmer named Tatu Ylönen developed a networking protocol and attendant software called SSH, short for Secure SHell. Not having spoken to Mr. Ylönen, I know nothing about his precise motivations at the time, but the . . .

Crypto Users Can't See FBI.gov

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Is the FBI blocking privacy-equipped browsers from its website? The question goes unanswered a week after users of a commercial privacy service found themselves unable to access the Federal Bureau of Investigation's fbi.gov site.

Diffie-Hellman Key Exchange

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A colleague recently asked if I could help him understand the Diffie-Hellman key exchange protocol... without digging through the math. My answer was "Yes I can, but not easily." Doing so requires a few diagrams because, in this particular case, a . . .

Approved, But Workable?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

President Clinton used both a smart card and an old-fashioned pen today to give digital signatures the force of law. By signing the Electronic Signatures in Global and National Commerce Act, the president made it possible for Americans to sign some . . .

PGP patch prevents remote server crash

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A recent report by the Underground Security Systems Research group identifies a weakness in the PGP Certificate Server code that can allow a malicious user to crash the authentication server. Network Associates has released a patch that prevents this particular vulnerability. . . .

Time May Be Right For Biometrics

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The world of James Bond may be inching toward reality. A new generation of biometric devices -- gadgets that identify you by scanning your face, fingerprint, or voice, have a distinctly futuristic look and feel, but have yet to make much . . .

Certificate Revocation: When Not To Trust

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Installing and managing a PKI (public key infrastructure) have far-reaching implications in an enterprise. A PKI by itself offers no value until it is paired with applications and services designed to leverage its functionality. Briefly, a PKI needs to issue digital . . .

Encryption Gets Better, but Remains Imperfect

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

"There is some outstanding technology available, and in publicly available algorithms," Bauer told Newsbytes after his speech. "The problem isn't that there's no good cryptographic technology available. The problem is that it's fiendishly difficult to implement the technology in a secure . . .