Linux Cryptography - Page 52
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
This document is intended to be a primer on how to get IPsec on FreeBSD up and running, interoperating both with another FreeBSD (or NetBSD or any other KAME-derived stack) machine, and a Windows 2000 machine. IPsec is a means . . .
The first of several documents related to the US government's TEMPEST programme, obtained by Cryptome.org's John Young under a Freedom of Information Act (FOIA) request, have been posted on his Web site. His original request was denied, but the persistent Young . . .
An interview with Sun Labs' Whit Diffie and Susan Landau on the subject of the new AES encryption standard. Whit is one of the industry's "encryption gurus" and recently received the Marconi award (with Martin Hellman) for developing Public Key encryption. . . .
In the wake of DeCSS, the decryption technology for DVD, the Digital Versatile Disc industry has been searching for well over a year for new ways to thwart DVD piracy. But in much the same way the industry stepped on its . . .
New version of SendIP (1.4) available with bugfixes, a contrib dir and a default RIP option... SendIP is a command-line tool to send arbitrary IP packets. It has a large number of options to specify the content of every header of . . .
The following essay clarifies the facts in the "End of SSL and SSH" article written by Kurt Seifried a few days ago. "On 17 December 2000, Dug Song released a new version of his well-known package of network sniffing tools, dsniff. . . .
The restrictions on using PC encryption products are far more lenient than those on importing software or hardware encryption for distribution or resale. In France, for example, the law states that upon entry to the country, travelers must register their decryption . . .
SSL and SSH have emerged, with other protocols, to provide authentication methods using a public key infrastructure. These protocols were developed to protect large amounts of network traffic from online shopping to financial transactions with online banks. . . .
Microsoft, VeriSign and webMethods Wednesday introduced a specification that works to simplify the integration of Public Key Infrastructure and digital certificates with XML applications. The companies have released the spec, dubbed XML Key Management Specification (XKMS), and will submit it to . . .
Yesterday, dsniff 2.3 was released. Why is this important, you ask? dsniff 2.3 allows you to exploit several fundamental flaws in two extremely popular encryption protocols, SSL and SSH. SSL and SSH are used to protect a large amount . . .
Hollywood loses a ruling in its fight to outlaw DeCSS, an open-source Linux computer code that allows copying of protected DVD disks. The motion picture industry's effort to ban computer code that subverts its DVD encryption scheme has suffered a setback . . .
I received a phone call today from a lady with the U.S. Bureau of Export Administration (BXA) who'd read my AEScrypt page (the URL of which I'd submitted to them for an export license exemption as required by U.S. . . .
I have to admit that the excitement and fury over encryption leaves me baffled. It's not that I can't grasp the issues and long-term global implications, or that I fail to marvel at the technical complexities involved, but as far . . .
Country music record company Fahrenheit Entertainment said it will begin selling copy-protected CDs by early next year using encryption technology from SunnComm, a little-known company based in Phoenix. If successfully employed, SunnComm's technology could become the first to hamper the copying . . .
The Regulation of Investigatory Powers (RIP) Act could be so much waste paper if a groundbreaking UK encryption project succeeds. Mathematician Peter Fairbrother has launched a project called M-o-o-t, which would make it physically impossible to surrender encryption keys - . . .
Digital signatures are coming, promising the rebirth of the Internet gold rush and the death of paper. Either that or a security nightmare. Earlier this year, President Clinton took the first step toward ending Hancock's long association with autographs by signing . . .
IBM claims to have invented a new encryption algorithm which can encrypt and authenticate data in one step. The algorithm takes advantage of parallel processing hardware, to cut in half the time taken to encrypt data. However, the news has failed . . .
IBM Corp. announced Thursday a secure method for digitally scrambling and signing data that it claims will take half the time of today's fastest techniques. IBM billed the combination encryption-authentication technique as especially suitable to secure mobile communications because of . . .
Encryption software has sparked regulation by the U.S. government and at least two important lawsuits involving the First Amendment. Exporting encryption products requires a thorough understanding of what's legal and what's not. This article explains the issues. . . .
The work of David Chaum and Stefan Brands on protocols, such as blind signatures, that provide anonymity has attracted a great deal of interest among people interested in cryptography. In the RSA algorithm, given a public key consisting of an encryption . . .