Linux Cryptography - Page 33

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Cryptography News

Java security, Part 1: Crypto basics

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Java platform, both its base language features and library extensions, provides an excellent base for writing secure applications. In this tutorial, the first of two parts on Java security, Brad Rubin guides you through the basics of cryptography and how . . .

Quantum leap for encryption

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

CODE-makers could be on the verge of winning their ancient arms race with code-breakers. After 20 years of research, an encryption process is emerging that is considered unbreakable because it employs the mind-blowing laws of quantum physics. This month, a small . . .

The SSL Alternative

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

More and more companies are letting staffers work remotely. In fact, the number of U.S. employees who work remotely at least one day per month has increased by nearly 40 percent since 2001, according to a recent study conducted by The Dieringer Research Group.. . .

Scientists seek to plug gaps in computer security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

To counter these hackers, the centre is pursuing a variety of approaches to the problem, such as developing software to detect intruders. Another involves improved cryptography, or the special coding of information. "It's an important building block for security systems," Sevinc . . .

Another Look at Quantum Crypto

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

On Friday, I voiced moderate scepticism about whether MagiQ's launch of quantum cryptography was the real thing. I've had an e-mail from a computer science lecturer at Massey University in New Zealand, Bruce Mills, which sheds some light on the topic . . .

Startup Says Quantum Crypto Is Real

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Quantum cryptography goes a step further than electronic cryptography through its employment of a stream of photons, the quantum properties of which determine the key. The fun part is that if an intruder observes or intercepts the transmission, those properties get . . .

NSA licenses cryptography tech

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The National Security Agency has licensed cryptography technology from Certicom Corp., based in Ontario, Canada. The $25 million contract gives NSA the nonexclusive right to use elements of Certicom's elliptic curve cryptography technology, which is covered by 26 patents. Certicom retains . . .

Copyright law could hurt crypto research

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The new European Union Copyright Directive (EUCD), which comes into force today, could adversely hit research into areas such as stronger cryptography, threatening progress in more advanced security methods. The directive was drafted to protect all copyrights, including digital rights. It . . .

Firms tap encyption over complex security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Despite the availability of sophisticated hardware security solutions, it seems many businesses aren't interested in doing much more than encrypting data. According to a survey of customers by IBM, the most common use for its embedded security system--essentially a 'security chip' . . .

Secure Messaging Using Steganography

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Manish Kumar Arya submits, Secure messaging by using steganography methods is quite good and reliable technique. This slide presentation covers general steganography, model of steganography, algorithms for image steganography, a demo using steghide, and a small attempt of implementing . . .

SSL VPNs best IPSec rivals

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

As as one of their many challenges, IT staffs must provide secure remote access to data and applications from outside the confines of the enterprise. IPSec-style VPNs are no longer up to the task, however. IPSec is just too inflexible and limited in device support to really work in many situations. . . .

Quantum Is Key To New Security Alliance

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Uncrackable encryption based on quantum-key distribution could soon come to a network near you. Two Swiss companies last week joined hands with a trade organization in pledging to create the infrastructure necessary for worldwide distribution of unbreakable quantum keys. . .

Product Review: iKey 3000

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

One-factor authentication (user IDs and password) is still the most widely used method, primarily because it is simple, easy and there are no pieces of hardware to configure. But there are many applications where this is just not secure enough. In two-factor authentication, not only do users need to know a PIN but they also need to possess the correct token.. . .

National workshop on cryptography

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Cryptography was until recently an exclusive domain of the defense and security agencies. However, with the explosive growth of computerization, networking and the Internet coupled with the increasing importance of electronic commerce, cryptography has become an essential component of all electronic . . .