Linux Cryptography

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Cryptography News

Make SSH do more

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

However, most people simply connect via SSH, enter their passwords, and type away. They don't realize that SSH has advanced key-management features that allow them to avoid having to retype their passwords; that its port-forwarding options can secure other, normally insecure, . . .

Crypto experts: All hail AES

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The government finally did something right. That seemed to be the common theme at the RSA Data Security Conference on Monday afternoon with encryption experts praising the U.S. government's selection of an Advanced Encryption Standard, or AES. "I would like to . . .

SSH inventor denied trademark request

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Internet engineering community rebuffed one of its own security gurus this week, by rejecting a request from the inventor of the popular Secure Shell protocol to change the technology's acronym to protect his company's trademark on the term. Tatu Ylonnen . . .

IBM, Intel Push for Encryption Standard

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

IBM is backing a standards proposal that would allow generic functions to be programmed into removable media such as DVDs, flash memory and Zip drives that, among other things, could limit what a user copies to or from his computer. IBM . . .

Cryotp-Gram: March 15, 2001

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

In this issue, Bruce Schneier talks about, the "Security Patch Treadmill", the future role of insurance in network security, Harvards "new" and "uncrackable" cryptosystem, the TCP/IP sequence number bug, the "closed' cryptosystem of iBallot.com, some problems with conventional IDS, and how . . .

EU denies rumours NSA has broken its encryption system

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Paranoia is alive and well at the European Union (EU) Commission, which has been forced to officially deny its encryption system has been compromised by the NSA (National Security Agency). Fears of eavesdropping by the ultra-secretive US spy agency grew out of comments by a Commission employee, Briton Desmond Perkins, who told a EU Parliamentary committee of regular but unsuccessful attempts by the NSA to crack the Commission's encryption system.. . .

DeCSS 2? DVD code broken again

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

MIT student Keith Winstein and alum Marc Horowitz say they're out to prove a point: Publishing code that decrypts and plays DVD movies is not a crime. In their case, they assert it's about teaching copyright issues and is thus protected . . .

Seven-line program beats DVD crypto

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Motion Picture Association of America is taking a closer look at a seven-line Perl script claimed by its authors to show just how "trivial" DVD encryption really is. The algorithm was written by Keith Winstein and Marc Horowitz - one . . .

Need for encryption delaying government

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The push towards egovernment in the US is being hindered by the use of various encryption technologies in different government agencies. According to a new report released by the General Accounting Office (GAO), the US government has to ensure the . . .