Linux Cryptography - Page 36

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Cryptography News

Experts Discredit Swiss SSL Crack

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Johannes Faustus submits Experts have poured cold water on claims sweeping the Internet that Swiss researchers have cracked the ubiquitous SSL (Secure Socket Layer) protocol. SSL, used by Internet browsers for protecting information such as online banking passwords . . .

Creating Your Own CA

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Well-known Certificate Authorities (such as Thawte and VeriSign) exist to serve as authoritative, trusted third-parties for authentication. They are in the business of signing SSL certificates that are used on sites that deal with sensitive information (like account numbers or passwords). . . .

What to look for when buying a VPN

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Virtual private networking is becoming an integral part of today's data networks. Virtual private network (VPN) drivers range from securing corporate communications to reducing costs by replacing leased lines. But for those who have not yet deployed a VPN, the options can be daunting. There are several approaches and dozens of products and services from which to choose, each with its own pros and cons.. . .

SSL VPNs to take over remote access

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Virtual private networks (VPNs) based on SSL are an increasingly common option for remote access. One service provider has launched a box to do the job Virtual private networks built on the Web's secure sockets layer (SSL) are tipped as . . .

Cryptic Quandary For Encrypters

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The new Regulations of Interception of Communications and Provision of Communication-Related Information Act could prove problematic for crypto providers, who face fines of up to R5 million if they fail to co-operate with the government. . .

Encryption in the Enterprise

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

When it comes to computer security, the primary question is not whether enterprises should be paranoid, but how paranoid they should be. To reduce their risk, many companies are attempting to put encryption Latest News about encryption to work. The question . . .

Encrypting Your E-mail

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Afraid an unauthorized someone is reading your personal e-mail? Then prevent it by encrypting your e-mail using a program such as PGP (Pretty Good Privacy). PGP was invented in 1991 by Phil Zimmermann as a way to send e-mail so . . .

Software Lets User Encrypt On Web

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

We all know that data sent over the Internet can be intercepted. How to prevent it? One method is to encrypt it. Various technologies exist for doing this, but they haven't caught on with individual users, partly because people don't really . . .

XML Encryption Specs Approved

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The two specs, XML Encryption Syntax and Processing and Decryption Transform for XML Signature, will enable Web pages using Extensible Markup Language to encrypt parts of a document being exchanged between Web sites, the World Wide Web Consortium said. . .

Demand for Encryption ICs Increases

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

With all that has happened in the last 18 months, the need for encryption chips and integrated components is picking up steam, according to In-Stat/MDR Although still in its infancy, the high-tech market research firm reports that the security IC market will be propelled upward by the continuation of heightened security concerns, coupled with the technology's ability to help companies operate more efficiently and lower operating costs. . . .

Light at End of Encryption Tunnel

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Quantum encryption is about to make life much more difficult for Internet spies. A new method of scrambling data manipulates light to create more complex patterns than just "on" or "off," as with typical encryption. As a result, the information . . .

Noisy Light Is New Key To Encryption

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Scientists at Northwestern University say they have harnessed the properties of light to encrypt information into code that can be cracked only one way: by breaking the physical laws of nature. This high-speed quantum cryptography method allowed the scientists to . . .

Wi-Fi Encryption Fix Not Perfect

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The biggest security risks for "Wi-Fi" wireless Internet networks are that users sometimes fail to turn on their encryption software. But even the responsible ones who use the encryption program -- Wired Equivalent Privacy -- aren't immune to malicious attacks. . . .