Linux Cryptography - Page 32

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Cryptography News

PKI appliance goes for selective security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Enterprises traditionally spend a significant amount of their resources securing the network perimeter, despite the fact, noted by analysts and security experts, that a majority of attacks originate from within networks. Ingrian's product takes a different tack, allowing small sections of application or database information to be hidden from all unauthorised users, whether within or outside the network. . . .

The MD5CRK Project

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The MD5CRK project seeks to prove empirally that MD5 is a hash algorithm that exhibits the not-so-cryptographically-sound property of collisions. This has already been proven theoretically, but nobody really paid attention, so this distributed computing project was created. . . .

Simple Optics Make Quantum Relay

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Quantum cryptography devices and networks, which transport photons whose properties can be used to represent the 1s and 0s of digital information, could also benefit from repeaters. Today's prototype quantum cryptography systems provide theoretically perfect security, but these systems can't carry information over long distances. . . .

RSA Panel: Cryptography Can't Foil Human Weakness

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Anyone with any savvy in the computer security world already knows that the weakest link is virtually always the users. Technically speaking, the world of cryptography has reached the point where it is feasible to secure static data beyond the reach of any reasonable attack, and streaming data may reach that point soon as well as streaming encryption is replaced by block encryption, which, though it requires more resources, is now well within reach. But none of that helps if users fall victim again and again to the same social engineering attacks, giving away the keys to their own castles. Who now has any doubt that there will be an increasing prevailance of 'phishing' schemes in the coming years? . . .

Enigma-E DIY Building Kit

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Enigma-E is a DIY Building Kit that enables you to build your own electronic variant of the famous Enigma coding machine that was used by the German army during WWII. It works just like a real Enigma and is compatible with an M3 and M4 Enigma as well as the standard Service Machines. A message encrypted on, say, a real Enigma M4 can be read on the Enigma-E and vice versa. . . .

Crypto Chip Choices Confound PC Makers

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

As PC makers gear up to build desktops with hardware security, they face tough choices about how to implement a small but significant cryptography chip crucial to their architecture. That's because chipmakers are offering a bewildering array of options for so-called trusted platform modules, essentially low-cost silicon safes for a digital key. . . .

RC-Crypt 1.5

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

RC-Crypt can be used to encrypt or decrypt data using the RC5 algorithm. It operates on 128-bit data blocks, adding random characters for padding if necessary. The key size can be chosen by the user, but 64 bits or greater is recommended. It has many input/output options, making this a versatile piece of software suitable for embedding into scripts. . . .

Using GnuPG, Part I

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

In today's world, communication has broken all previous time and distance limits. Now you can talk with someone in real-time no matter how far away he is. That advantage has also brought some major problems with itself. First, it is hard to verify other persons identity with 100% certainty and second, we can't know if there is a third party between who reads our correspondence. Fortunately for us something called public key cryptography was invented. . . .

A Quantum Leap in Codes for Secure Transmissions

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Scientists at companies in Europe, Asia and the United States say they are close to a commercial version of what they see as an uncrackable way of transporting data. Among the first customers are expected to be banks and intelligence agencies, as well as governments that want to introduce secure digital services like electronic voting. The technology, called quantum cryptography, is a radical departure from the way data is secured today. . . .

Identity Based Encryption

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

For years the undisputed "best of breed" technologies for enterprise email encryption were Secure MIME (S/MIME) or PGP. Support for S/MIME has been built into popular email clients, going back nearly a decade. Originally considered the tool of the hacker elite, PGP has evolved into highly effective enterprise tool, usable by mere mortals. . . .

How to hit an elliptic curveball

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

It was at the end of an IT security event hosted by the Canadian Advanced Technology Alliance last October that someone called to Ian McKinnon from the back of the room. His cheeks flushed and eyes beaming, he approached somewhat awkwardly, nervously, as though he was slightly out of breath. . . .

Code That Can't Be Cracked

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Want to win a million bucks and a high-paying job for life? That's what Mississauga-based Certicom Corp. is offering anyone who can crack the code to its products and patents surrounding Elliptic Curve Cryptology (ECC) -- a combination of algebra and algorithms that ensure everything from cellphone chatter to wireless e-mail sent and received on an Internet-enabled phone or a Blackberry PDA can't be hacked. . . .

Yeemp Encrypted Messaging Program 0.9

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Yeemp is a decentralized instant messaging system. It uses GPG over SSL for encryption, and UTF-8 to enable non-Latin text to be transferred. The clients include support for Japanese, Cyrillic, and Ogham input, as well as direct UTF-8. Yeemp includes a . . .

The Recording Industry Is Unwittingly Driving Encryption Adoption

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

People will differ on the value of this change, depending on their feelings about privacy and their trust of the Government, but the effects of the increased use of encryption, and the subsequent difficulties for law enforcement in decrypting messages and files, will last far longer than the current transition to digital music delivery, and may in fact be the most important legacy of the current legal crackdown.. . .

Asymmetric Cryptography

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

One big issue with using symmetric algorithms is the key exchange problem, which can present a classic catch-22. The other main issue is the problem of trust between two parties that share a secret symmetric key. Problems of trust may be . . .

The Death Throes of crypt()

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Tom Perrine and Devin Kowatch of the San Diego Supercomputer Center have issued "Teracrack: Password cracking using TeraFLOP and PetaByte Resources." Using SDSC's prodigious computing facilities, they precomputed 207 billion crypt() hashes in 80 minutes. . .

Hiding Secrets with Steganography

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The term steganography comes from the Greek words for covered writing. If, as a child, you ever wrote an invisible message in lemon juice and had your friend hold it next to a light bulb in order to watch the message magically appear, you've used steganography.. . .

This number is ready for prime time

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

That is one huge number...6,632,430 digits long to be exact. The above number was found November 17th by Michael Shafer, a Michigan State University graduate student, and is the largest prime number found (so far). The number is only the 40th . . .

GnuPG's ElGamal signing keys compromised

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Phong Nguyen identified a severe bug in the way GnuPG creates and uses ElGamal keys for signing. This is a significant security failure which can lead to a compromise of almost all ElGamal keys used for signing. Note that this is a real world vulnerability which will reveal your private key within a few seconds.. . .