Cryptography - Page 58.75

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Cryptography News

Fractal Encryption

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Here's a short editorial on fractal encryption. "A fractally encrypted message cannot be broken even by the senders. It is so secure as to be that way for it's lifetime. Oh, the key is the message. So, it functions . . . The link at InfoWar is no longer available.

Open source fans break strong encryption

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

597 computers get stuck into a feat of number crunching madness. Will Knight reports A group of French scientists joined forces with open source enthusiasts this week and claim to have broken a public encryption key of unprecedented strength (108-bit), . . .

Crypto Regs Challenged Again

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Privacy advocates won a preliminary victory when for the second time a federal appeals court questioned restrictions on data-scrambling encryption software. The Sixth Circuit Court of Appeals suggested Monday that President Clinton's restrictions on distributing encryption products might be . . .

SSH Secure Shell 2.1 Available

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Secure Shell protects Internet servers against the most common break-in method used by hackers -- stealing passwords from the Internet. The product encrypts passwords and all data transmitted between the user and host server over the Internet. SSH Secure Shell . . .

Trial Date Set in DECESS Case

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

"The importance of the fight against the MPAA and the DVD Copy Control Association was underlined this week with the hiring of the legal team of Frankfurt, Garbus, Klein, and Selz to represent 2600. Martin Garbus, who will . . .

Teen Science Is Serious Business

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Here is an interesting story..."On Monday, Risca was awarded a $100,000 scholarship for taking first place in the Intel Science Talent Search for her project called "DNA-Based Steganography," which combined the disciplines of cryptography, steganography, and molecular computing. . . .

Bruce Schneier's CryptoGram

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This month Bruce Schneier talks about Kerberos and Windows 2000, Software as a Burglary Tool, news on the DES replacement, a Business Week interview, and comments from readers. This newsletter is always worth reading. . . .

China Eases Rules On Encryption

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

"BEIJING -- China has eased tough new restrictions on encryption technology, announcing that a vast category of consumer software and equipment -- including mobile phones and Microsoft's Windows operating system -- would be exempt from the rules. " . . .

China Lightens Up On Encryption Rules

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A Reuters report today said the government agency responsible for enforcing Internet rules has exempted a wide range of consumer software and equipment -- including mobile phones and Microsoft Windows, and added it would not insist on keeping trusteeship of . . .

French Banks Hacked

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

"An unknown hacker or group of hackers caused havoc in French banking circles late this week after the 96-digit encryption algorithm underlying the Cartes Bancaires system was posted on the Internet. Some sources suggest that the code was posted to . . .

tinc Virtual Private Network daemon

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

tinc is a Virtual Private Network (VPN) daemon that uses tunneling and encryption to create a secure private network between hosts on the Internet. Because the tunnel appears to the IP level network code as a normal network device, . . .

NetScreen Has Net Data Center Security System

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This appears to be one hell of a box. "Netscreen Technologies on Monday will introduce the first gigabit security appliance. Called the NetScreen-1000 Gigabit Security System, the product is designed for high-bandwidth, high-capacity e-businesses and enterprises, as well . . .

Opposition Against Encryption Bill

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A wave of media-led resentment against the proposed Regulation of Investigatory Powers (RIP) bill, which critics say will give the government the all-clear to monitor private e-mail and mobile phone conversations, has started rising. . . .

OpenSSH v1.2.3 Released

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

OpenSSH is a FREE version of the SSH suite of network connectivity tools that increasing numbers of people on the Internet are coming to rely on. Many users of telnet, rlogin, ftp, and other such programs might not realize that . . .