Linux Cryptography - Page 34

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Cryptography News

Encryption? Give it a rest

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Any hacker can tell you that data 'at rest' is much easier to access, but security efforts are being targeted in the wrong place, using complex, costly encryption schemes for data in motion.. . .

Basic Cryptography, Part 7. One-Time Pads

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Steganography is a technique for embedding information in files such that it is not obvious that this information has been embedded. The technique is extensively used in putting digital watermarks in such things as digitized artwork, but it can also be . . .

Exploring RSA Encryption in OpenSSL

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

When sending your credit card number through a public medium, such as the Internet, your financial credibility may be compromised if the number is not first encrypted. It is impossible to tell who may be listening in on your connection as you shop for new CDs or books. The RSA encryption method often is used to hide your credit card number from would-be thiefs on the Internet, because it uses a public key to hide your information and a private key to reveal it.. . .

Quantum Cryptography Finally Commercialized

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Start-up MagiQ Technologies, from Somerville, Massachusetts, has released the first commercial implementation of quantum cryptography, the much-heralded solution to the perfect encryption cipher. Theoretically, encryption ciphers created using quantum physics are unbreakable. . .

Ultramagnetic: Instant Messaging With Encryption

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

vindicator submits, Ultramagnetic is the name of a new open-source secure instant messaging client based on the popular Gaim software and GnuPG's libgcrypt library. It supports strong end-to-end encryption with 256-bit AES and anonymous routing with Hacktivismo's Six/Four protocol.. . .

Advanced Encryption Standard by Example

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The following document provides a detailed and easy to understand explanation of the implementation of the AES (RIJNDAEL) encryption algorithm. The purpose of this paper is to give developers with little or no knowledge of cryptography the ability to implement AES. . .

Benchmarking Encryption Technology

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Although ciphers long have been a staple of spy thrillers and mysteries, data encryption now has gained a real -- and critical -- foothold in the business world. "Encryption and authentication are playing a very important role, in particular . . .

Totally Random

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Here's a random thought: "Everything we do to achieve privacy and security in the computer age depends on random numbers." So says Simon Cooper, an encryption expert and author of Building Internet Firewalls. Random number sequences have been around for . . .

A Quantum Leap in Cryptography

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

In a dark, quiet room inside the Boston labs of BBN Corp. (VZ ), network engineer Chip Elliott is using the laws of physics to build what he hopes will be an unbreakable encryption machine. The system, which sits atop a . . .

'Hack-proof' cryptography goes quantum

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Researchers have developed new technology that could allow companies to implement hack-proof communications in three years. The technology, based on quantum cryptography, was demonstrated by Toshiba Research Europe this week working over distances of 100km for the first time. . . .

Quantum Cryptography Stretches 100 Kilometres

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Communications protected with the complete security of quantum cryptography are now possible over an ordinary 100-kilometre fibre optic cable, thanks to sophisticated photon detection equipment developed by UK researchers. A team from Toshiba Research Europe, based in Cambridge, UK, has . . .

Langa Letter: Easy Encryption

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A recent change in federal privacy laws is causing huge numbers of IT departments to examine the steps they take to keep data secure. Although the specific law affects organizations that store or process medical records--hospitals, insurance companies, human-resource departments, and . . .

Crypto Maker Changes Course

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

New leadership at security developer Ntru CryptoSystems Inc. is hoping a new services and consulting strategy will help mitigate the damage caused by problems with the company's core encryption algorithm. Once one of the premier cryptography companies in the United States, . . .