Cryptography - Page 57

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Cryptography News

New MI5 unit to crack criminal computer codes

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A special codebreaking organisation is to be set up inside the headquarters of MI5 to crack encrypted communications and computer discs belonging to suspected organised criminals and terrorists. The new centre, which will begin to recruit expert codebreakers soon, will cost . . .

Hush offers Novel Twist on Secure E-mail

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

HushPOP, which can be downloaded for free from the company's Web site, is a transparent add-on that runs behind a user's desktop e-mail client and takes a unique approach to encrypted e-mail. Like many other secure messaging programs, HushPOP . . .

OpenSSH v2.2.1 Released

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A new version of OpenSSH has been released. Version 2.2.1 fixes a few usability bugs and a security feature not enabled by default. OpenSSH is a freely-available implementation of Secure Shell, a telnet/ftp/rlogin replacement that provides strong . . .

The Advanced Encryption Standard

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Data Encryption Standard, or DES, specified a block cipher with a 56-bit key that operated on 64-bit blocks. It was developed by IBM, in response to a request from the National Bureau of Standards for a cryptographic algorithm . . .

U.S. To Follow EU Crypto Lead

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

When the EU meets on June 13th, crypto in the US could be a different story shortly thereafter. "If the European Union votes next week to relax encryption regulations, the United States says it will take similar steps. Commerce . . .

Encryption: Where Next?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This SC Mag article discusses the history of crypto, the current controversy over exportation, info on the new crypto standard emerging, and "Crystal Ball" predictions. "The business arguments (for e-business) are important and irresistible. The challenge is for the . . .

Cryptography and Security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Here is a good paper that gives readers a basic understanding of cryptography. "Cryptography addresses one specific security-related requirement, and does so superbly: protecting a message or a file from being read by an eavesdropper who has no other . . .

Encryption for the masses

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

We hear alot about security on the internet, about securing your system from hackers who don't have much reason for existence except to break into peoples' systems. Maybe that's a good existence because they can get a book deal but . . .

Making an Unbreakable Code

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This article talks about the need for encryption. Email, e-commerce, digital cash, the NSA's Echelon Project all lead to reasons why crypto is necessary. "... more and more of our private communications are being routed through electronic channels. . . .

Maths prize could revolutionise encryption

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A £3.6m mathematics competition announced Wednesday could spark a revolution in computer security and online privacy experts believe. The competition is sponsored by the Clay Mathematics Institute in the US and was revealed at the Millennium Mathematics Conference in . . .

E-business Embraces PKI

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

"... many companies looking at public key infrastructure (PKI) technology. PKI allows use of digital certificates to ensure the confidentiality and integrity of data through encryption, control access through private keys, authenticate documents via digital signatures, and ease completion . . .

PGP 5.0 Key Generation Flaw

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A flaw has been found in the randomness gathering code of PGP 5. PGP 5 will, under certain well-defined circumstances, generate public/private key pairs with no or only a small amount of randomness. Such keys are insecure. Chances are very . . .

Snake Oil Warning Signs

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Why ``snake oil''? The term is used in many fields to denote something sold without consideration of its quality or its ability to fulfill its vendor's claims. This term originally applied to elixirs sold in traveling medicine shows. The salesmen . . .

PKI: Be Careful What You Wish For

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

For years now, the IT industry has anxiously anticipated the arrival of the public-key infrastructure (PKI), a magical technology that would, in one fell swoop, solve the problems of authentication, confidentiality and single sign-on for the corporate world. Businesses continue . . .

Congress Poised For China Trade, Digital IDs

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Congress this year is expected to approve normal trade relations with China and make electronic signatures legal, lawmakers told information-technology executives Tuesday. An extension of the moratorium on Internet taxes and an increase in the number of foreign-guest high-tech . . .