Linux Cryptography - Page 53
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
Australia is said to be at least two years behind the United States when it comes to the internet, so the two-year communication blackout between the US and Australian branches of encryption developer RSA Security seems entirely appropriate. The ban existed . . .
This is a great document that explains public key infrastructure, X.509 and certificates, and the problems with existing methods. "Conventional PKI, built around ISO standard X.509, has been, and will continue to be, a substantial failure. This paper examines that form . . .
E-commerce is driving the Internet economy; e-commerce wouldn't be driving anything if users didn't purchase items online; overcoming users fears while shopping online has been the major hurdle in growing e-commerce; a single Internet protocol has almost single handedly increased e-commerce . . .
Top bureaucrats will be able to swap classified material on the Net with the launch this week of a "Secure Electronic Environment" linking Treasury, the State Services Commission and the Department of Prime Minister and Cabinet.. . .
The US Government is adopting a new encryption standard called Advanced Encryption Standard (AES), which will eventually replace DES. On October 2, the National Institute of Standards and Technology (NIST) announced that it had chosen Rijndael (pronounced Rhine-doll) as the new . . .
In the early seventies the US government put out a call for an encryption algorithm. It had no response. A year later in 1973 they tried again and got one response, from IBM. Then followed a bit of politicking, but by . . .
Responding to a question about encryption technology in an ongoing Internet debate, Texas Gov. George W. Bush today castigated President Clinton and Vice President Gore for what he called "outdated" technology policy. "The Clinton administration has repeatedly been slow to recognize . . .
This month's Linux Gazette has an article on, well, encrypting data in web forms. Linux Gazette is a great online magazine, and this month is no exception. "There may be times when you want to send encrypted data . . .
The U.S. government likes that number. Earlier this month, it selected Rijmen and Daemen's brainchild as the new Advanced Encryption Standard. That means Rijndael will soon become the shield of choice to protect sensitive U.S. government information, financial transactions and Internet . . .
This is a pretty article that discusses why IPSec is slow going, and how now vendors are starting to work together to make sure their products interoperate when building a VPN. "As the number of VPN gateways increases, so does the . . .
The Space and Naval Warfare Systems Center in Charleston, S.C., in the coming year plans to test an IPv6 version of the Non-Classified IP Router Network. Government organizations are conducting "lots of IPv6 impact studies" in view of the rapidly declining . . .
This Wired story describes the recent contest created to decipher 10 increasingly difficult codes set by author Simon Singh in his international bestseller The Code Book. Quite interesting. There's also the step-by-step analysis of what the Swedish cryptographers did in their . . .
SET and a relative newcomer-IOTP-offer robust security frameworks for online transactions. So why haven't they threatened SSL's dominance as a payment protocol? When it comes to transaction security, Secure Sockets Layer (SSL) has been the de facto protocol for a . . .
In the final step toward matching the European Union's recent liberalization of rules governing the export of encryption products, the Commerce Department's Bureau of Export Administration has published a final rule allowing the export of encryption products of any strength to . . .
One of the world's leading experts on computer security said that because of recent developments in the online world, cryptography on its own is now not enough to protect systems in the digital world. In his new book, Bruce Schneier, an . . .
A team of Swedish computer buffs has fought off thousands of rivals from around the world to crack what was billed as the toughest code challenge ever set. It took the Swedes the equivalent of 70 years of computer time to . . .
The new model of LCI-SMARTpen is the first in the world to comply with new encryption standard. "The National Institute for Standards and Technology (NIST) has selected Rijndael as the proposed Advanced Encryption Standard (AES) algorithm. The AES will be . . .
The idea of the International Kernel Patch is to collect all crypto patches so that using crypto in the kernel will be easier than today. The patch includes a number of crypto patches including a crypto API including Blowfish, CAST-128, DES, . . .
As most may know, one of three existing Enigma machines was stolen a few months ago. Bletchley Park Museum had agreed to hand over a £25,000 ransom before midnight on Friday but the deadline passed with no word from the . . .
This article starts out with a nice description of cryptography then goes into how to incorporate PGP for use with Pine. "Encryption is the transformation of data into a form that is (hopefully) impossible to read without the knowledge of a . . .