Cryptography

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Cryptography News

Encryption Regs may Need "Tweaking"

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

William Reinsch, the Commerce Department's undersecretary for export administration, told technology executives on Tuesday that while the administration's new encryption export regulations appeared to be a huge improvement over prior iterations of the policy, a few cracks are starting to . . .

Couch Sessions

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This edition of "Couch Sessions" talks about building an online shopping cart. "Need to build an online shopping cart in a hurry? This article takes a look at session management, an important component of transaction-based Web sites, and explains the . . .

The Process of Security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Here's an excellent (as always) article by Bruce Schneier on the process of thinking about security. "Security is a process, not a product. Products provide some protection, but the only way to effectively do business in an insecure world . . .

Digital Certificates & Encryption

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Lance Spitzner tells us all about Digital Certificates & Encryption how they work and apply to Internet Commerce. "On the Internet, information you send from one computer to another passes through numerous systems before it reaches its destination. Normally, . . .

mod_ssl 2.6.3 Released

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

"mod_ssl combines the flexibility of Apache with the security of OpenSSL." This module provides strong cryptography for the Apache 1.3 webserver via the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols by the help of the . . .

Strong Encryption’s Weakness

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Think that encryption will secure corporate data? Not according to virus specialist Ncipher (https://www.entrust.com/products/hsm). The company says it’s found viruses that hunt through a computer’s memory for the key used to decrypt data. First proposed in 1999 by Dr. Adi . . .

Crypto-Convict Won't Recant

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Before Jim Bell went to prison, he suspected that most government officials were corrupt. Three years behind bars later, the self-proclaimed Internet anarchist is sure of it. After Bell, a cypherpunk who the United States government dubbed a techno-terrorist, . . .

CRYPTOCard PalmToken PIN Extraction Advisory

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The CRYPTOCard PalmToken is a software-based token system that provides challenge-response authentication. "An attacker can determine the private PIN number of a users token within a matter of minutes and clone the challenge/response scheme of the legitimate user." . . .

Record encryption puzzle cracked

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

An encryption method widely expected to secure next-generation wireless phones and other devices succumbed to a brute-force collaborative effort to break it, a French research agency announced Thursday. An international team of researchers — led by crypto researcher Robert . . .

OpenBSD Crypto Page

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Here's a link to an OpenBSD page that describes what crypto features are capable with it. Specifically, as pointed out on slashdot, http://www.openbsd.org/crypto.html#hardware is a link to new support for hardware crypto devices using OpenBSD. We'd be happy to post this kind of information in the future -- just send it along.

Twilight of the crypto-geeks

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

At a recent Computers, Freedom and Privacy Conference, developers and lawyers battled it out on issues of crypto and freedom. "... the unique annual meeting that brings together an unlikely combination of programmers, activists and government officials -- two . . .

'Draconian' Crypto Ideas Still Exist

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

While the Clinton administration has relaxed the international export of encryption technologies, there are still some other "draconian proposals" in the pipeline, according to the Electronic Privacy Information Center's (EPIC) third annual report on the state of encryption policies. The . . .

Fractal Encryption

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Here's a short editorial on fractal encryption. "A fractally encrypted message cannot be broken even by the senders. It is so secure as to be that way for it's lifetime. Oh, the key is the message. So, it functions . . . The link at InfoWar is no longer available.

Open source fans break strong encryption

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

597 computers get stuck into a feat of number crunching madness. Will Knight reports A group of French scientists joined forces with open source enthusiasts this week and claim to have broken a public encryption key of unprecedented strength (108-bit), . . .

Crypto Regs Challenged Again

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Privacy advocates won a preliminary victory when for the second time a federal appeals court questioned restrictions on data-scrambling encryption software. The Sixth Circuit Court of Appeals suggested Monday that President Clinton's restrictions on distributing encryption products might be . . .