Linux Cryptography - Page 29
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
Recently we met with Jon Callas, CTO and CSO of PGP Corporation. Pretty Good Privacy (PGP) is today's most used crypto software with a lot of history. Presented here is the entire story of PGP in his words that covers everything from the the early days to future plans.
Encryption experts met in Gaithersburg, Maryland, this week to discuss retiring the SHA-1 hashing algorithm and creating a stronger version of the cryptographic workhorse.
Ever since networking came out, one important issue, to a various extent over the time, has been how to give the legitimate users the right access - authentication, which is one of the three basic elements in security: authentication, authorization and access control.
Sometimes encryption isn't enough to keep your conversations private. With standard encryption, it's theoretically possible for someone to steal your secret encryption keys and decipher the conversation. For conversations that need to be kept confidential, the Off-the-Record (OTR) plugin for Gaim saves the day. It leaves no trace of a conversation ever having taken place.
The US National Institute of Standards and Technology has released an updated draft version of its 'Guideline for Implementing Cryptography in the Federal Government'. This is the second edition of a white paper first released in 1999, and a welcome to the literature on practical applications of cryptography.
The product is meant to ensure an entire hard drive's data can be encrypted in real time and only accessed by authorised users. A full-disk end-user software encryption product for Linux was launched on Monday by security software company Pointsec. Full-disk encryption protects all data on the hard disk including the operating system, system files, and "supposedly deleted files", the company claims.. Pointsec is pitching the product — Pointsec for Linux — at "large technology and telecommunications corporations needing to protect intellectual property stored on laptop and desktop computers".
Data security is a major concern for all CIOs. This has been addressed from access and identity controls through encrypting data in transmission through to securing data at rest, on disk or on tape. The difference today is that threats are more sophisticated and business practices are more dependent on IT practices that span each organisation from individuals through to the data centre. The requirements for sound information governance include company practices, as well as financial reporting standards and legal issues, such as the Data Protection Act.
Three Chinese researchers have further refined an attack on the encryption standard frequently used to digitally sign documents, making the attack 64 times faster and leaving cryptographers to debate whether the standard, known as the Secure Hash Algorithm, should be phased out more quickly than planned.
Wang, Yu, and Yin, the team of Chinese cryptographers that successfully broke SHA-0 and SHA-1, announced new results against SHA-1 yesterday at Crypto's rump session. (Actually, Adi Shamir announced the results in their name, since she and her student did not receiveU.S. visas in time to attend the conference.)
In Phil Zimmermann's response to "Does Phil Zimmermann need a clue on VoIP", Zimmermann offered a blistering attack on PKI based solutions and offered his own PGP solution as the superior alternative. There is just one little problem: the computing world chose PKI for the most part while PGP barely makes a dent in the email world.
Cryptography is already the de facto way of securing sensitive web traffic and it is now reaching across the entire enterprise as companies start to use industry-standard protocols such as SSL internally - even between servers only a few feet apart.
Japanese Nippon Telegraph and Telephone Corp. (NTT) has successfully demonstrated the quantum cryptography with a single photon can be realised in the photonic network of optical fibres. The quantum cryptography is expected to be the last resort of the cryptography protocol, and to enhance enormously the safety of transmitting information.
For those of you who follow the news, you may have read the recent story of spy software discovered at some of Israel’s leading companies which reads just like the spy stories we’ve been reading for years. The imagined villains are in fact the victims, but more importantly the problem of spy software being prevalent in Israeli companies came as a result of one of the most comprehensive investigations involving computer crime ever undertaken. The Trojan had been introduced by providing companies with contaminated files, or sending a contaminated e-mail message to the companies. This also raises concerns that this evaded all the security measures in place at the companies infected.
Dr. Walter, Head of Cryptography for Comodo Inc. and chair of the Trusted Computing Group (TCG) Peripheral Working Group, has clarified the relationship between encryption and authentication. The blurred definition to date has split the Certificate Authority industry into two groups. Authorities such as Comodo and VeriSign compete head to head, to deliver high assurance digital certificates whilst other groups concentrate on the low assurance market.
Scientists have moved one step closer to the "unhackable" network by developing a device that can send single photons in a regular stream over a fiber optic link.
The "crypto wars" are finally over - and we've won! On 25th May 2005, Part I of the Electronic Communications Act 2000 will be torn out of the statute book and shredded, finally removing the risk of the UK Government taking powers to seize encryption keys.
Let us take the example of scrambling an egg. First, crack the shell, pour the contents into a bowl and beat the contents vigorously until you achieved the needed result - well, a scrambled egg. This action of mixing the molecules of the egg is encryption. Since the molecules are mixed-up, we say the egg has achieved a higher state of entropy (state of randomness). To return the scrambled egg to its original form (including uncracking the shell) is decryption. Impossible?
For as long as modern computers have been around, they have been associated with encryption in one way or another. It is no coincidence that the first semi-programmable computer, Colossus, was developed to decrypt messages during the Second World War. Encryption relies on encoding information in a way that makes it difficult to decode without either a key (cipher) or an awful lot of mathematical muscle. The longer the length of the cipher (in bits), the more difficult it will be to break. Although there are many encryption techniques that are unbreakable in practice, there are very few that are unbreakable in theory, given enough time or processing power.
Quantum cryptography – using a private communication channel to lock down the exchange of sensitive data between two points – has to date created much more discussion than it has practical applications. However, with scientists, researchers and academics already on the case, it could be just five years until the technology hits the mainstream.
WHEN budgets get tight, R&D is often one of the first departments to feel the squeeze. But at RSA Security, vice-president of research Burt Kaliski and his team are considered the heart and soul of the business. RSA puts about 18-20 per cent of its revenue into applied research and standards development at its research centre, RSA Laboratories.