Linux Cryptography - Page 55
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
This article talks about "template-driven pages, this time using Perl and Python to deliver those SSI templates straight into CGI documents. In the last article we examined the different ways in which we could introduce pages purely using the SSI (Server . . .
RSA's competitors' reactions to the expiration are mixed. Baltimore Technologies Inc. responded with its own announcement of new products and initiatives. It's eliminating its runtime licensing for its PKI development suite KeyTools and will switch to a flat fee, and it's also offering a free KeyTools Lite, which includes cryptographic and digital certificate functions, including communication with a certificate authority or a Lightweight Directory Access Protocol directory. . . .
The release of the algorithm is a good thing because you can now create cryptographic software using one RSA implementation and distribute it worldwide without having to license anything from RSA. ... This is good news because you can, for example, . . .
What are the relative merits and drawbacks of using Gnu Privacy Guard vs. Network Associates' PGP. I am not referring to the fact that GPG doesn't use any restricted implemtations or algorithems; or that GPG was not affected by the recent . . .
... Despite RSA's gesture, several competitors who have paid royalties for use of the algorithm for up to 17 years, argue that the industry could have done with the patent relaxation earlier. "Of course its fantastic news, but after 17 years to suddenly release it two weeks early is a bit of a stunt," says Paddy Holahan, vice president of marketing at Baltimore Technology. "It has held back e-commerce.". . .
Interested in knowing up to the second increments on the status of the impending RSA patent expiration? This site also provides a view on what the author thinks of software patents to begin with... "The patent office has shown remarkable incompetence . . .
Phil Zimmermann, the creator of Pretty Good Privacy (PGP), responds to the recent flaw discovered in Network Associates implementation of the Additional Decryption Key (ADK) feature. This is a key escrow account that allows a responsible third-party to gain access to . . .
Master cryptographer Bruce Schneier's "Secrets and Lies" explains why computer security is an oxymoron. Bruce Schneier, master cryptographer and idol of the computer underground, targets those short-attention-spanners in his latest book, "Secrets and Lies: Digital Security in a Networked World." Aiming . . .
Encrypting data before storage or transmission involves a bit of extra work. This often means that people who ought to be using encryption, instead of relying on the assumption that their data will not be intercepted, fail to do so. But it is also true that some of the people who use encryption are keenly aware of the importance of keeping their information secret.. . .
Even as the FBI slowly releases details of its Carnivore e-mail wiretap technology, software developers are readying schemes to starve Carnivore of meaningful data.. . .
A GERMAN RESEARCHER has discovered a major security flaw in the latest versions of the PGP free e-mail encryption software that could allow someone to read another person's encrypted e-mail if he or she was able to intercept it. . . .
Yahoo plans to let its email account holders use data encryption to protect the privacy of their messages, marking a potentially significant advance for the mainstream use of encryption. . . .
A very serious PGP vulnerability was just discovered. Using this vulnerability, an attacker can create a modified version of someone's public key that will force a sender to encrypt messages to that person AND to the attacker.
"In late September, 2000, the RSA Patent expires. Rivest, Shamir, and Adelman, Public Key Cryptography's most famous supergroup, developed this algorithm about 20 years ago. If you are planning a party, tell us. We're going to make a list, and . . .
The following is a description of how I got a Linux version of the PGP encryption program, how I installed it, and a few observations about quirks in the program. The Linux version of PGP that I got is PGPcmdfw_6.5.2_Linux.i386.rpm and . . .
Bruce Schneier, computer security expert, CTO and founder of Counterpane Internet Security, Inc., has written a new book specifically for corporate managers. Secrets and Lies: Digital Security in a Networked World is a practical, straightforward guide to understanding and achieving security . . .
Security is best when it is handy. ssh-agent is pretty darn handy. Ssh-agent can authenticate you to a remote machine via keypairs, rather than the traditional hand-typed username/password combination, with no loss of security.. . .
Scientists at the University of Geneva are collaborating with the Swiss Ministry of Posts and Telecommunications on an experiment that uses quantum computers to run an unbreakable encryption algorithm. Cryptography could, in fact, be the first commercial application for this technology. . . .
BEDFORD, Mass., August 17, 2000 - To further position itself as the leader in the e-security space, RSA Security Inc (NASDAQ: RSAS), the most trusted name in e-security, today announced the launch of its inaugural "e-Security Experience," a Webinar designed to . . .
Key certificates are an important element in the use of public-key cryptography (PKC). Your browser, when it visits a secure site, checks for a key certificate from a small number of commercial certificate providers. The instructions that came with PGP described . . .