Linux Cryptography - Page 33
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
The Java platform, both its base language features and library extensions, provides an excellent base for writing secure applications. In this tutorial, the first of two parts on Java security, Brad Rubin guides you through the basics of cryptography and how . . .
CODE-makers could be on the verge of winning their ancient arms race with code-breakers. After 20 years of research, an encryption process is emerging that is considered unbreakable because it employs the mind-blowing laws of quantum physics. This month, a small . . .
More and more companies are letting staffers work remotely. In fact, the number of U.S. employees who work remotely at least one day per month has increased by nearly 40 percent since 2001, according to a recent study conducted by The Dieringer Research Group.. . .
To counter these hackers, the centre is pursuing a variety of approaches to the problem, such as developing software to detect intruders. Another involves improved cryptography, or the special coding of information. "It's an important building block for security systems," Sevinc . . .
A quantum-key distribution and encryption system developed by Magiq Technologies Inc. and called the Navajo Security Gateway promises unbreakable encryption over existing fiber-optic lines. The crypto system will initially be available only to U.S. companies and agencies, the company said. . .
On Friday, I voiced moderate scepticism about whether MagiQ's launch of quantum cryptography was the real thing. I've had an e-mail from a computer science lecturer at Massey University in New Zealand, Bruce Mills, which sheds some light on the topic . . .
Quantum cryptography goes a step further than electronic cryptography through its employment of a stream of photons, the quantum properties of which determine the key. The fun part is that if an intruder observes or intercepts the transmission, those properties get . . .
The National Security Agency has licensed cryptography technology from Certicom Corp., based in Ontario, Canada. The $25 million contract gives NSA the nonexclusive right to use elements of Certicom's elliptic curve cryptography technology, which is covered by 26 patents. Certicom retains . . .
The new European Union Copyright Directive (EUCD), which comes into force today, could adversely hit research into areas such as stronger cryptography, threatening progress in more advanced security methods. The directive was drafted to protect all copyrights, including digital rights. It . . .
Despite the availability of sophisticated hardware security solutions, it seems many businesses aren't interested in doing much more than encrypting data. According to a survey of customers by IBM, the most common use for its embedded security system--essentially a 'security chip' . . .
Manish Kumar Arya submits, Secure messaging by using steganography methods is quite good and reliable technique. This slide presentation covers general steganography, model of steganography, algorithms for image steganography, a demo using steghide, and a small attempt of implementing . . .
Security processor vendor Cavium Networks and embedded Linux supplier MontaVista Software announced a hardware/software duo they claim offers two- to three-times faster IPsec VPN performance (up to 150Mbps) on Intel IXP4XX network processors compared to existing solutions at similar price-points. . . .
As as one of their many challenges, IT staffs must provide secure remote access to data and applications from outside the confines of the enterprise. IPSec-style VPNs are no longer up to the task, however. IPSec is just too inflexible and limited in device support to really work in many situations. . . .
Every now and again a competition comes along that's a little bit out of the ordinary. Today LinuxWorld brings advance word of one that fits that description squarely: the latest installment of a running series of "CryptoChallenges" from a leading security . . .
Uncrackable encryption based on quantum-key distribution could soon come to a network near you. Two Swiss companies last week joined hands with a trade organization in pledging to create the infrastructure necessary for worldwide distribution of unbreakable quantum keys. . .
This inconclusive ending of the Bernstein case is a consequence of the government's policy in cases where there are first amendment challenges to restrictions on the publication of software to claim that they have no intention of enforcing the law as . . .
One-factor authentication (user IDs and password) is still the most widely used method, primarily because it is simple, easy and there are no pieces of hardware to configure. But there are many applications where this is just not secure enough. In two-factor authentication, not only do users need to know a PIN but they also need to possess the correct token.. . .
A pioneering attempt to overturn the U.S. government's Cold War-era laws restricting the publication of some forms of encryption code ended quietly Wednesday when a federal judge dismissed the lawsuit--but only after assurances that the anticrypto laws would not be enforced. . . .
Cryptography was until recently an exclusive domain of the defense and security agencies. However, with the explosive growth of computerization, networking and the Internet coupled with the increasing importance of electronic commerce, cryptography has become an essential component of all electronic . . .
All of the cypher systems we have looked at so far have been single-key character cyphers. By this, we mean that the same key which is used to encrypt the plaintext into the ciphertext is used to recover the plaintext from . . .