Cryptography

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Cryptography News

The Process of Security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Here's an excellent (as always) article by Bruce Schneier on the process of thinking about security. "Security is a process, not a product. Products provide some protection, but the only way to effectively do business in an insecure world . . .

Digital Certificates & Encryption

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Lance Spitzner tells us all about Digital Certificates & Encryption how they work and apply to Internet Commerce. "On the Internet, information you send from one computer to another passes through numerous systems before it reaches its destination. Normally, . . .

mod_ssl 2.6.3 Released

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

"mod_ssl combines the flexibility of Apache with the security of OpenSSL." This module provides strong cryptography for the Apache 1.3 webserver via the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols by the help of the . . .

Strong Encryption’s Weakness

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Think that encryption will secure corporate data? Not according to virus specialist Ncipher (https://www.entrust.com/products/hsm). The company says it’s found viruses that hunt through a computer’s memory for the key used to decrypt data. First proposed in 1999 by Dr. Adi . . .

Crypto-Convict Won't Recant

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Before Jim Bell went to prison, he suspected that most government officials were corrupt. Three years behind bars later, the self-proclaimed Internet anarchist is sure of it. After Bell, a cypherpunk who the United States government dubbed a techno-terrorist, . . .

CRYPTOCard PalmToken PIN Extraction Advisory

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The CRYPTOCard PalmToken is a software-based token system that provides challenge-response authentication. "An attacker can determine the private PIN number of a users token within a matter of minutes and clone the challenge/response scheme of the legitimate user." . . .

Record encryption puzzle cracked

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

An encryption method widely expected to secure next-generation wireless phones and other devices succumbed to a brute-force collaborative effort to break it, a French research agency announced Thursday. An international team of researchers — led by crypto researcher Robert . . .

OpenBSD Crypto Page

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Here's a link to an OpenBSD page that describes what crypto features are capable with it. Specifically, as pointed out on slashdot, http://www.openbsd.org/crypto.html#hardware is a link to new support for hardware crypto devices using OpenBSD. We'd be happy to post this kind of information in the future -- just send it along.

Twilight of the crypto-geeks

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

At a recent Computers, Freedom and Privacy Conference, developers and lawyers battled it out on issues of crypto and freedom. "... the unique annual meeting that brings together an unlikely combination of programmers, activists and government officials -- two . . .

'Draconian' Crypto Ideas Still Exist

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

While the Clinton administration has relaxed the international export of encryption technologies, there are still some other "draconian proposals" in the pipeline, according to the Electronic Privacy Information Center's (EPIC) third annual report on the state of encryption policies. The . . .

Fractal Encryption

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Here's a short editorial on fractal encryption. "A fractally encrypted message cannot be broken even by the senders. It is so secure as to be that way for it's lifetime. Oh, the key is the message. So, it functions . . . The link at InfoWar is no longer available.

Open source fans break strong encryption

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

597 computers get stuck into a feat of number crunching madness. Will Knight reports A group of French scientists joined forces with open source enthusiasts this week and claim to have broken a public encryption key of unprecedented strength (108-bit), . . .

Crypto Regs Challenged Again

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Privacy advocates won a preliminary victory when for the second time a federal appeals court questioned restrictions on data-scrambling encryption software. The Sixth Circuit Court of Appeals suggested Monday that President Clinton's restrictions on distributing encryption products might be . . .

SSH Secure Shell 2.1 Available

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Secure Shell protects Internet servers against the most common break-in method used by hackers -- stealing passwords from the Internet. The product encrypts passwords and all data transmitted between the user and host server over the Internet. SSH Secure Shell . . .

Trial Date Set in DECESS Case

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

"The importance of the fight against the MPAA and the DVD Copy Control Association was underlined this week with the hiring of the legal team of Frankfurt, Garbus, Klein, and Selz to represent 2600. Martin Garbus, who will . . .

Teen Science Is Serious Business

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Here is an interesting story..."On Monday, Risca was awarded a $100,000 scholarship for taking first place in the Intel Science Talent Search for her project called "DNA-Based Steganography," which combined the disciplines of cryptography, steganography, and molecular computing. . . .