Linux Cryptography - Page 37
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
Quantum encryption pioneers promise to put the world's first uncrackably secure networks online by early 2003. Based on the quantum properties of photons, quantum encryption guarantees absolutely secure optical. . .
The JavaTM Cryptography Extension (JCE) is a set of packages that provides a framework and implementation for encryption, key generation, key agreement, and Message Authentication Code (MAC) algorithms. JCE also supports secure streams and sealed objects. . .
A quantum encryption system developed by two Northwestern University professors can encode entire high-speed data streams and could potentially encrypt data sent at Internet backbones speeds, its inventors said. The approach developed by Prem Kumar and Horace Yuen uses quantum codes . . .
It took the power of 10,000 computers running around the clock for 549 days, coupled with the brain power of a mathematician at Indiana's University of Notre Dame, to complete one of the world's largest single math computations.. . .
And you thought you had tough math homework? Consider the work that went into cracking a secret code developed by Toronto-based Certicom Corp., which makes wireless encryption software. . .
Long hailed as the future of electronic security, quantum cryptography has arrived. As Swiss company id Quantique introduces a commercial quantum cryptography system and an American company, MagiQ Technologies, plans to unveil a second, at least one of the field's leading . . .
Will Manindra Agrawal bring about the end of the Internet as we know it? The question is not as ridiculous as it was just two months ago. Prof. Agrawal is a 36-year old theoretical computer scientist at the Indian Institute of . . .
A Defense Department analyst at the Pentagon is working on a top-secret case and needs to quickly exchange a large amount of information with a colleague in the intelligence community on the other side of the country. But the only tools . . .
The quirky world of quantum physics, where mathematical elements can hold multiple values and objects can be in several places at once, is heading toward commercial products. . .
Application security specialist Ingrian Networks has developed a technology to offload encryption functions from application or database servers onto appliances with the aim of providing more robust security for data in storage. . .
About half of the cryptographic modules submitted for Federal Information Processing Standard validation have security flaws, a survey by the National Institute of Standards and Technology has found. Almost all evaluated products had documentation errors, said Annabelle Lee, director of NIST's . . .
The current wireless networking standards use security technology that's far less secure than it could be. For example, most wireless network administrators are familiar with the Wired Equivalent Privacy (WEP) protocol, which uses RC4 encryption to help protect data as it travels over the airwaves. . . .
PGP encryption products will be back on the market by the end of the year, with a raft of new releases in the pipeline. PGP 8.0 will be out by the end of December and will include a freeware version . . .
Researchers have created a new way to encrypt information in a digital image and extract it later without any distortion or loss of information. A team of scientists from Xerox and the University of Rochester said that the technique, called . . .
Information, as any hacker will tell you, wants to be free. From Web-enabled pdas to wireless networks, new technology is making data freer than ever. But if the data are more accessible to you, they're more accessible to anyone who knows . . .
The latest chapter in his decade-long battle began to unfold on Friday, when lawyers representing both the Department of Commerce and Bernstein, a University of Illinois associate professor of mathematics, statistics and computer science, prepared to ask federal district court judge . . .
The uniqueness of everyone's voice can now be used to lock up data extra securely on mobile phones and portable computers, thanks to a prototype system developed by US researchers. The system could render stolen devices useless. . .
The National Security Agency recently selected three vendor teams to compete to develop Gigabit Ethernet encryptors (GigEE) supporting the secure exchange of top-secret information at speeds of at least 1 gigabit/sec over commercial Internet Protocol wide-area networks. . .
Two factor authentication, using secure tokens is being backed as an alternative to digital certificates by a UK company, which is enjoying support from the Parliamentary All Party Export Group. . .
As we rely on computers for tasks like handling money and keeping secrets safe, it has become increasingly important to give our desktops, laptops and PDAs the means to know for sure who they are dealing with. The classic solution is . . .