Linux Cryptography - Page 24
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
Gmail may be an excellent Web-based email application, but there is no easy way to use it with privacy tools like GnuPG. The FireGPG extension for Firefox is designed to solve this problem. It integrates nicely into Gmail's interface and allows you to sign and encrypt not only email messages but also text snippets from any Web page.
PGP has two uses. First, it is an encryption system that uses public-key cryptography. Each user has a public key and a private key. In simple terms, you can encrypt a message using someone's public key and they can decrypt it using their private key. (A one-off session key is actually involved.) If the private key has been kept truly private, no one else can read the message.
Steganography is the art of hiding messages so that uninitiated wouldn't suspect the presence of a message. A rainbow table is a huge binary file used for password cracking. This is the first in a series of posts on research I've done on how to hide data in rainbow tables, and how to detect its presence. There are several steganography algorithms to hide data in pictures. They often involve changing the least-significant-bits of the numbers representing the color or another visual property of a pixel. This minute difference cannot be perceived by the naked eye, but it this there. The size of the data you can hide in a picture is limited by the size of the picture and by the numbers of bits involved in the steganography algorithm. It
A team of researchers has, for the first time, hacked into a network protected by quantum encryption. Quantum cryptography uses the laws of quantum mechanics to encode data securely. Most researchers consider such quantum networks to be nearly 100% uncrackable. But a group from the Massachusetts Institute of Technology (MIT) in Cambridge was able to 'listen in' using a sort of quantum-mechanical wiretap. The trick allowed them to tease out about half of the data, in a way that couldn't be detected by those transmitting or receiving the message.
The Defense Department has launched a new program to encourage the use of open- source encryption software within DOD systems. The Open Source Software Institute of Hattiesburg, Miss., will support the OpenCrypto Management Program, which is part of DOD
Encryption has traditionally been difficult and expensive to use. This reputation was often well deserved. The 1999 study by Alma Whitten and. J. D. Tygar at Carnegie-Mellon University,
Proofpoint said it is adding policy-based encryption to its email content filtering appliance. The upgraded Proofpoint Secure Messaging software, slated for availability in June, adds Voltage's identity-based encryption (IBE) technology to the existing content-filtering capabilities, according to company officials. With this addition, Proofpoint's appliances will automatically encrypt email based on policies set by administrators as the messages leave the corporate network.
To maximize the effectiveness of encryption in providing effective security assurance solutions, organizations must deploy it as part of a defense-in-depth security stance. Like any technology, encryption is plagued with pitfalls, mistakes, and traps that could easily provide an organization with a false sense of confidence in its security, while still allowing attackers to easily compromise the organization
Hash functions are an excellent way to tie together various parts of a protection mechanism. Our first mesh design pattern, hash-and-decrypt, uses a hash function to derive a key that is then used to decrypt the next stage. Since a cryptographic hash (e.g., SHA-1) is sensitive to a change of even a single bit of input, this pattern provides a strong way to insure the next stage (code, data, more checks) is not accessible unless all the input bits are correct.
Pioneering physicist aims to lock out data hackers with speed-of-light cryptography. Right now, somewhere in the world, hackers are trying to break into central electronic storage facilities to pilfer sensitive data such as credit card information, financial records and personal identification.
Fremont, Calif.-based ASI Computer Technologies will start selling computers equipped with Seagate's Momentus 5400 FDE.2 drive next month, Seagate said in a statement. The computers, called ASI C8015, will be sold through a number of ASI's partners, including Newegg.com, PowerNotebooks.com and ZipZoomfly.com, an ASI representative said.
If you follow the media today, you might conclude that data encryption is everywhere. However, is this "good" encryption? A classic saying "Encryption is easy; key management is hard" illustrates one of the pitfalls that await those implementing encryption enterprise-wide or even SMB-wide. This article covers some of the other mistakes that often occur when organizations try to use encryption to protect data at rest and data in transit and thus improve their security posture.
A loophole in quantum cryptography that could allow a hacker to determine a secret key transmitted using the technology has been closed by new research. Working at Toshiba Research Europe in Cambridge, scientists found that laser diodes used to transmit keys used to encrypt data, known as Quantum Key Distribution (QKD), sometimes transmitted more than one photon at a time. Quantum encryption works by transmitting key data as a stream of single photons.
Cryptography is no mean field. After all, the science was invented by humans for the purpose of concealing information from other humans. That means that the best cryptographers have to be blindingly smart, with a mastery of mathematics but also a firm grasp of human psychology and, these days, fields such as computer science.
Need absolute privacy on your cell phone calls? Try the Cryptophone. The Cryptophone is a joint venture between Taiwanese smartphone maker HTC, and GSMK of Germany. The Cryptophone is a pretty normal clamshell phone with special software that encrypts your calls with "special software that encrypts calls with 4096 bit Diffie-Hellman key exchange and SHA256 hash function AES 256 and Twofish between Cryptophones."
The StorageTek Crypto-Ready T10000 drive supports multiple operating systems, including the Solaris OS, Z/OS and Windows. It enables customers to encrypt data using the AES-256 encryption algorithm as it is written to the drive, regardless of the application, operating platform or primary storage device and without impacting backup or restore times.
While 66% of IT and business managers surveyed have "some type" of encryption strategy, only 16% have enterprise-wide strategies, the Ponemon Institute found. While IT and business managers say they know encryption is critical to safeguarding company information on laptops, not many are actually doing it.
The U.S. National Institute of Standards and Technology is having a competition for a new cryptographic hash function. This matters. The phrase "one-way hash function" might sound arcane and geeky, but hash functions are the workhorses of modern cryptography. They provide web security in SSL. They help with key management in e-mail and voice encryption: PGP, Skype, all the others. They help make it harder to guess passwords. They're used in virtual private networks, help provide DNS security and ensure that your automatic software updates are legitimate. They provide all sorts of security functions in your operating system. Every time you do something with security on the internet, a hash function is involved somewhere.
RSA, The Security Division of EMC, (NYSE: EMC) today released the findings of its fourth annual Financial Institution Consumer Online Fraud Survey. Conducted in December 2006, the online survey asked 1,678 adults from eight countries around the world for their opinions on evolving fraud threats such as phishing, vishing and keylogging, and on the efforts of their financial institutions to strengthen remote channel banking authentication.
Remember those invisible ink kits from when you were a kid? You'd write a secret message that no one could see unless they had a black light or the decoder marker. The digital equivalent of invisible ink is steganography software, apps that embed files and data inside other files, hidden from everyone who doesn't know any better. You don't have to be a trained spy plotting international espionage to put steganography to good use. With some free tools for both the Mac and PC, you can embed secret information in image, PDF, HTML and MP3 files for fun or profit.