Linux Cryptography - Page 51
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
CI SOFTWARE SOLUTIONS, a small U.K.-based company specializing in business-to-business data encryption, announced Monday that it has acquired the worldwide patent to the transfer of encrypted EDI (electronic data interchange) documents for sending over the Internet. EDI is a standard for . . .
Mathematics enthusiast Leo de Velez who claims to have discovered a faster way of decoding RSA encryption believes that his findings are solid since nobody is still using his formula of 2^X = 1 mod N where N is given as . . .
We report, you decide. Could have far-reaching implications if it's correct. "A Filipino mathematics enthusiast has developed a new method of decoding RSA (RivestShamir-Adleman) encryption using three simple formulas. Leo de Velez has discovered these three formulas are simple forward equations . . .
The proper integration of encryption and anti-virus software is the only way to stop the two security tools continuing to work at crossed purposes, according to virus hunters at Kaspersky Labs. Traditionally anti-virus and encryption, although opposite sides of the same . . .
A new algorithm developed by IBM could double the speed of secure online communications. IBM says the combination encryption/authentication technique is particularly suited to securing Internet protocols, storage area network protocols, fiber-optic networks and e-business transactions. But analysts say the new . . .
Over a year after the US government first announced the liberalization of encryption export rules, a tangle of vestigial regulations might still trip up unwary developers, experts say. "Never work under the belief that encryption is not controlled," said Susan . . .
Companies using the specification will adopt a combination hardware-software security approach, involving a security chip that encrypts data. The security chip, an integral component of the specification, resides on a computer's motherboard. "This offers even more robust security . . .
"The fact that computer code is copyrightable means that it is protected by the First Amendment. Copyright law, of which DMCA is a part, confirms the point: In view of the First Amendment protections already embodied in the Copyright Act's distinction . . .
Illinois has decided to standardize its electronic transaction authentication system, but questions remain about how it will work. The state's public-key infrastructure program, which uses digital certificates to authenticate users for electronic transactions, will be standardized on Entrust Technologies Inc.'s . . .
n a move that free-speech activists hope will be trendsetting, Internet service provider Verio is standing up to the movie industry by refusing to remove a Web site the Motion Picture Association of America says is illegal. Many ISPs, especially smaller . . .
Gnu Privacy Guard (GnuPG or GPG), is an open, patent-free encryption application whose main purpose is to protect communication and secure data archives. It achieves this goal by implementing a hybrid cipher system that utilizes both a symmetric cipher system and . . .
Leo Marks, WWII codemaker and codebreaker, and later playwright, has died aged 80. He was chief cryptographer of Special Operations Executive during WWII, having trained as a cryptographer in Bedford when called up for National Service. . . .
A certificate is a structured document that binds some information (such as Bob's name) to a public key, and is digitally signed by a trusted third party called a certification authority or CA. To verify a certificate, the user of the . . .
If you're a Linux administrator and you're still using telnet for authentication, your network could be in danger. Telnet passes your user IDs, password/passphrase, and the content of your terminal sessions in the clear, where anyone with a sniffer can see . . .
Boffins at UCSB (University of California, Santa Barbara) have made a breakthrough in quantum cryptography, and put together a gadget that is capable of emitting a single photon. The device is being heralded as an important step towards secure quantum communications . . .
The Clinton administration on Wednesday proposed further easing of encryption exports and expanding of the regions where U.S. companies can ship powerful computers without restrictions. In a move that could be its final action regarding encryption, the Clinton administration acknowledged that . . .
It took only a year or two for a pair of computer and math geeks to discover modern encryption technology in the 1970s. But it's taken three decades for the full story to be told. Transforming what is an unavoidably nerdy . . .
The next step is the virtual private network, which is essentially an encryption code for a specific law firm or litigation group. Data is encrypted as it is being sent on the Internet's public lines to isolate it from . . .
While encryption was still under the watchful eye of the US Department of State, Bernstein wrote an encryption program called Snuffle. This was promptly classified as munitions under then existing International Traffic in Arms Regulations, which meant a licence was required . . .
Whitfield 'Whit' Diffie revolutionized cryptography by creating a digital signature, making codes accessible for public use. The good news is that, after decades of struggle against a government opposed to its widespread use, we've finally got access to crypto-software that does . . .