Linux Cryptography - Page 34
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
Security researchers have discovered a pair of vulnerabilities in the OpenSSL software package, one of which may allow an attacker to execute code on vulnerable machines.. . .
CERT is coordinating multiple security vulnerabilities in OpenSSL, the open source SSL/TLS implementation including an ASN.1 memory deallocation vulnerability and an ASN.1 tag vulnerability.. . .
Any hacker can tell you that data 'at rest' is much easier to access, but security efforts are being targeted in the wrong place, using complex, costly encryption schemes for data in motion.. . .
Steganography is a technique for embedding information in files such that it is not obvious that this information has been embedded. The technique is extensively used in putting digital watermarks in such things as digitized artwork, but it can also be . . .
When sending your credit card number through a public medium, such as the Internet, your financial credibility may be compromised if the number is not first encrypted. It is impossible to tell who may be listening in on your connection as you shop for new CDs or books. The RSA encryption method often is used to hide your credit card number from would-be thiefs on the Internet, because it uses a public key to hide your information and a private key to reveal it.. . .
Portable OpenSSH versions 3.7p1 and 3.7.1p1 contain multiple vulnerabilities in the new PAM code. At least one of these bugs is remotely exploitable (under a non-standard configuration, with privsep disabled). Vendor updates are in progress.. . .
Start-up MagiQ Technologies, from Somerville, Massachusetts, has released the first commercial implementation of quantum cryptography, the much-heralded solution to the perfect encryption cipher. Theoretically, encryption ciphers created using quantum physics are unbreakable. . .
vindicator submits, Ultramagnetic is the name of a new open-source secure instant messaging client based on the popular Gaim software and GnuPG's libgcrypt library. It supports strong end-to-end encryption with 256-bit AES and anonymous routing with Hacktivismo's Six/Four protocol.. . .
In the previous installment of this series, we looked in particular at security for 802.11 networks. However, as we illustrated in that article, a secure network doesn't necessarily guarantee secure applications. In this article, we'll examine how to better lock down . . .
The following document provides a detailed and easy to understand explanation of the implementation of the AES (RIJNDAEL) encryption algorithm. The purpose of this paper is to give developers with little or no knowledge of cryptography the ability to implement AES. . .
Although ciphers long have been a staple of spy thrillers and mysteries, data encryption now has gained a real -- and critical -- foothold in the business world. "Encryption and authentication are playing a very important role, in particular . . .
Here's a random thought: "Everything we do to achieve privacy and security in the computer age depends on random numbers." So says Simon Cooper, an encryption expert and author of Building Internet Firewalls. Random number sequences have been around for . . .
In a dark, quiet room inside the Boston labs of BBN Corp. (VZ ), network engineer Chip Elliott is using the laws of physics to build what he hopes will be an unbreakable encryption machine. The system, which sits atop a . . .
In countries where a private or semi-public WAN is something not every company can afford, the Internet is the only option available to connect all of those remote offices. The obvious problems are this is a public network and, in most . . .
Your company is negotiating a big deal with a partner, making you a bit nervous about the security of exchanging documents via email. There is a non-disclosure agreement in place, but you'd like to be absolutely certain that only the recipients . . .
Everybody knows that it is easier to hit a stationary target than a fast-moving target. Yet an enormous amount of resources are being used to encrypt data in motion, while the bigger risk is in data at rest. One reason . . .
Researchers have developed new technology that could allow companies to implement hack-proof communications in three years. The technology, based on quantum cryptography, was demonstrated by Toshiba Research Europe this week working over distances of 100km for the first time. . . .
Communications protected with the complete security of quantum cryptography are now possible over an ordinary 100-kilometre fibre optic cable, thanks to sophisticated photon detection equipment developed by UK researchers. A team from Toshiba Research Europe, based in Cambridge, UK, has . . .
A recent change in federal privacy laws is causing huge numbers of IT departments to examine the steps they take to keep data secure. Although the specific law affects organizations that store or process medical records--hospitals, insurance companies, human-resource departments, and . . .
New leadership at security developer Ntru CryptoSystems Inc. is hoping a new services and consulting strategy will help mitigate the damage caused by problems with the company's core encryption algorithm. Once one of the premier cryptography companies in the United States, . . .