Linux Cryptography - Page 37

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Cryptography News

Using the Java Cryptography Extension

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The JavaTM Cryptography Extension (JCE) is a set of packages that provides a framework and implementation for encryption, key generation, key agreement, and Message Authentication Code (MAC) algorithms. JCE also supports secure streams and sealed objects. . .

Quantum encryption secures high-speed data stream

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A quantum encryption system developed by two Northwestern University professors can encode entire high-speed data streams and could potentially encrypt data sent at Internet backbones speeds, its inventors said. The approach developed by Prem Kumar and Horace Yuen uses quantum codes . . .

Quantum Cryptography Arrives

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Long hailed as the future of electronic security, quantum cryptography has arrived. As Swiss company id Quantique introduces a commercial quantum cryptography system and an American company, MagiQ Technologies, plans to unveil a second, at least one of the field's leading . . .

Math discovery Rattles Net Security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Will Manindra Agrawal bring about the end of the Internet as we know it? The question is not as ridiculous as it was just two months ago. Prof. Agrawal is a 36-year old theoretical computer scientist at the Indian Institute of . . .

NSA taps vendors for encryption

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A Defense Department analyst at the Pentagon is working on a top-secret case and needs to quickly exchange a large amount of information with a colleague in the intelligence community on the other side of the country. But the only tools . . .

FIPS Testing Finds Lots Of Mistakes In Crypto IT

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

About half of the cryptographic modules submitted for Federal Information Processing Standard validation have security flaws, a survey by the National Institute of Standards and Technology has found. Almost all evaluated products had documentation errors, said Annabelle Lee, director of NIST's . . .

Increasing Wireless Security with TKIP

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The current wireless networking standards use security technology that's far less secure than it could be. For example, most wireless network administrators are familiar with the Wired Equivalent Privacy (WEP) protocol, which uses RC4 encryption to help protect data as it travels over the airwaves. . . .

PGP Poised For Major Comeback

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

PGP encryption products will be back on the market by the end of the year, with a raft of new releases in the pipeline. PGP 8.0 will be out by the end of December and will include a freeware version . . .

Images get distortion-proof crypto marks

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Researchers have created a new way to encrypt information in a digital image and extract it later without any distortion or loss of information. A team of scientists from Xerox and the University of Rochester said that the technique, called . . .

Professor's Case: Unlock Crypto

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The latest chapter in his decade-long battle began to unfold on Friday, when lawyers representing both the Department of Commerce and Bernstein, a University of Illinois associate professor of mathematics, statistics and computer science, prepared to ask federal district court judge . . .

Trio Vying For Encryption Work

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The National Security Agency recently selected three vendor teams to compete to develop Gigabit Ethernet encryptors (GigEE) supporting the secure exchange of top-secret information at speeds of at least 1 gigabit/sec over commercial Internet Protocol wide-area networks. . .

Voiceprints make crypto keys

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

As we rely on computers for tasks like handling money and keeping secrets safe, it has become increasingly important to give our desktops, laptops and PDAs the means to know for sure who they are dealing with. The classic solution is . . .