Linux Cryptography - Page 51

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Cryptography News

Encryption vs anti-virus

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The proper integration of encryption and anti-virus software is the only way to stop the two security tools continuing to work at crossed purposes, according to virus hunters at Kaspersky Labs. Traditionally anti-virus and encryption, although opposite sides of the same . . .

IBM Reveals New "Signcryption" Algorithm

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A new algorithm developed by IBM could double the speed of secure online communications. IBM says the combination encryption/authentication technique is particularly suited to securing Internet protocols, storage area network protocols, fiber-optic networks and e-business transactions. But analysts say the new . . .

Crypto regs still tricky

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Over a year after the US government first announced the liberalization of encryption export rules, a tangle of vestigial regulations might still trip up unwary developers, experts say. "Never work under the belief that encryption is not controlled," said Susan . . .

IBM chip powers emerging security standard

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Companies using the specification will adopt a combination hardware-software security approach, involving a security chip that encrypts data. The security chip, an integral component of the specification, resides on a computer's motherboard. "This offers even more robust security . . .

Illinois unifying PKI program

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Illinois has decided to standardize its electronic transaction authentication system, but questions remain about how it will work. The state's public-key infrastructure program, which uses digital certificates to authenticate users for electronic transactions, will be standardized on Entrust Technologies Inc.'s . . .

GnuPG: An Open Solution to Data Protection

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Gnu Privacy Guard (GnuPG or GPG), is an open, patent-free encryption application whose main purpose is to protect communication and secure data archives. It achieves this goal by implementing a hybrid cipher system that utilizes both a symmetric cipher system and . . .

Top WWII code cracker dies

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Leo Marks, WWII codemaker and codebreaker, and later playwright, has died aged 80. He was chief cryptographer of Special Operations Executive during WWII, having trained as a cryptographer in Bedford when called up for National Service. . . .

Implementing PKI

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A certificate is a structured document that binds some information (such as Bob's name) to a public key, and is digitally signed by a trusted third party called a certification authority or CA. To verify a certificate, the user of the . . .

OpenSSH 2.3 And SSH Secure Shell 2.4

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

If you're a Linux administrator and you're still using telnet for authentication, your network could be in danger. Telnet passes your user IDs, password/passphrase, and the content of your terminal sessions in the clear, where anyone with a sniffer can see . . .

Quantum crypto one step closer

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Boffins at UCSB (University of California, Santa Barbara) have made a breakthrough in quantum cryptography, and put together a gadget that is capable of emitting a single photon. The device is being heralded as an important step towards secure quantum communications . . .

Clinton: Relax crypto export controls

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Clinton administration on Wednesday proposed further easing of encryption exports and expanding of the regions where U.S. companies can ship powerful computers without restrictions. In a move that could be its final action regarding encryption, the Clinton administration acknowledged that . . .

Crypto: Three Decades in Review

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

It took only a year or two for a pair of computer and math geeks to discover modern encryption technology in the 1970s. But it's taken three decades for the full story to be told. Transforming what is an unavoidably nerdy . . .

How Safe is the Net?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The next step is the virtual private network, which is essentially an encryption code for a specific law firm or litigation group. Data is encrypted as it is being sent on the Internet's public lines to isolate it from . . .

The maths prof., free speech and encryption

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

While encryption was still under the watchful eye of the US Department of State, Bernstein wrote an encryption program called Snuffle. This was promptly classified as munitions under then existing International Traffic in Arms Regulations, which meant a licence was required . . .

Crypto

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Whitfield 'Whit' Diffie revolutionized cryptography by creating a digital signature, making codes accessible for public use. The good news is that, after decades of struggle against a government opposed to its widespread use, we've finally got access to crypto-software that does . . .