Linux Cryptography - Page 36
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
Johannes Faustus submits Experts have poured cold water on claims sweeping the Internet that Swiss researchers have cracked the ubiquitous SSL (Secure Socket Layer) protocol. SSL, used by Internet browsers for protecting information such as online banking passwords . . .
Well-known Certificate Authorities (such as Thawte and VeriSign) exist to serve as authoritative, trusted third-parties for authentication. They are in the business of signing SSL certificates that are used on sites that deal with sensitive information (like account numbers or passwords). . . .
According to Gerhard Claassen, Managing Director of the Crypto Business Unit at JSE-listed, secure electronic payments company, Prism Holdings, the major card companies - Visa and MasterCard - have stated that by end-2003 all Host-to-Host PIN communication, such as that used . . .
Meganet, an Israeli-U.S. data security company, has developed an encryption technology that appears to be unbreakable, enabling governments and corporations, to keep their data safely out of the hands of competitors, thieves and saboteurs. Among the clients that believe in . . .
Security is a strange phenomenon in IT. Like a Will O' The Wisp, it's elusive. And so we are faced with the promise and the reality of Public Key Infrastructures (PKIs) - such a useful, powerful technology, coupled with near total . . .
There has been a great deal of difficulty experienced in getting research performed by cryptographers in the last decade or so (beyond basic algorithms such as SHA and AES) applied in practice. The reason for this is that cryptographers don't . . .
This week, we begin to reverse engineer the home-grown encryption algorithm discussed last week. Last week I offered you five examples of "encrypted" text that were generated by a home-grown crypto system. Your job was to reverse engineer the algorithm. . .
Virtual private networking is becoming an integral part of today's data networks. Virtual private network (VPN) drivers range from securing corporate communications to reducing costs by replacing leased lines. But for those who have not yet deployed a VPN, the options can be daunting. There are several approaches and dozens of products and services from which to choose, each with its own pros and cons.. . .
Virtual private networks (VPNs) based on SSL are an increasingly common option for remote access. One service provider has launched a box to do the job Virtual private networks built on the Web's secure sockets layer (SSL) are tipped as . . .
Every programmer tries to build their own encryption algorithm at some point. In one word: Don't.. . .
The new Regulations of Interception of Communications and Provision of Communication-Related Information Act could prove problematic for crypto providers, who face fines of up to R5 million if they fail to co-operate with the government. . .
Computer security followers are questioning the way the U.S. transportation security administration, which oversees airport security and other transportation issues, is protecting some restricted documents on its Web site. . .
When it comes to computer security, the primary question is not whether enterprises should be paranoid, but how paranoid they should be. To reduce their risk, many companies are attempting to put encryption Latest News about encryption to work. The question . . .
Afraid an unauthorized someone is reading your personal e-mail? Then prevent it by encrypting your e-mail using a program such as PGP (Pretty Good Privacy). PGP was invented in 1991 by Phil Zimmermann as a way to send e-mail so . . .
We all know that data sent over the Internet can be intercepted. How to prevent it? One method is to encrypt it. Various technologies exist for doing this, but they haven't caught on with individual users, partly because people don't really . . .
The two specs, XML Encryption Syntax and Processing and Decryption Transform for XML Signature, will enable Web pages using Extensible Markup Language to encrypt parts of a document being exchanged between Web sites, the World Wide Web Consortium said. . .
With all that has happened in the last 18 months, the need for encryption chips and integrated components is picking up steam, according to In-Stat/MDR Although still in its infancy, the high-tech market research firm reports that the security IC market will be propelled upward by the continuation of heightened security concerns, coupled with the technology's ability to help companies operate more efficiently and lower operating costs. . . .
Quantum encryption is about to make life much more difficult for Internet spies. A new method of scrambling data manipulates light to create more complex patterns than just "on" or "off," as with typical encryption. As a result, the information . . .
Scientists at Northwestern University say they have harnessed the properties of light to encrypt information into code that can be cracked only one way: by breaking the physical laws of nature. This high-speed quantum cryptography method allowed the scientists to . . .
The biggest security risks for "Wi-Fi" wireless Internet networks are that users sometimes fail to turn on their encryption software. But even the responsible ones who use the encryption program -- Wired Equivalent Privacy -- aren't immune to malicious attacks. . . .