Linux Cryptography - Page 41
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
Secure Sockets Layer (SSL), developed by Netscape Communications, and Transport Layer Security (TLS), the open-standard replacement for SSL from the Internet Engineering Task Force, are the two protocols that add encryption and authentication to TCP/IP. This article summarizes the basic concepts . . .
Phil Zimmermann knows a thing or two about adversity. His invention for encrypting e-mail, Pretty Good Privacy, was so good that the government considered it munitions subject to tough export controls. Prosecutors threatened him with criminal charges when others leaked it overseas. . . .
Imagine, if you will, a means of delivering encryption keys that is so secure that it's impossible to break because doing so would violate the laws of physics. In other words, the delivery method is so secure, it's protected by the very fabric of the universe.. . .
The OpenSSL developers team is pleased to announce the upcoming release of OpenSSL 0.9.7. OpenSSL 0.9.7 contains several changes and enhancements in many fields; please check out the NEWS and CHANGES files for details. Some of the changes made break compatibility, so that application developers and distribution providers may need a transition period.. . .
Millions of users of the World Wide Web rely on a single cryptographic protocol, SSL, to make secure connections to remote web servers. The flexibility and ease of use of SSL, which is built into browser and server software, gives them . . .
Quick summary on some scp tricks. "Recall that the command: "$ scp ... S:file ..." actually runs ssh in a subprocess to connect to S and invoke a remote scp server. Now that we've gotten ssh working from client C . . .
IBM has unveiled new software that lets companies use encryption to control the online distribution of any digital data including music, text and video. The software maker wants companies to be able to sell copyrighted data files while preventing wholesale copying and distribution by users.. . .
US export restrictions and local legislation on cryptography still casts a shadow over the security of ecommerce site even years after regulations to permit the use of strong encryption. . . .
Up to 18 percent of servers using SSL (Secure Sockets Layer) encryption technology for Web site encryption are potentially vulnerable to hackers, with the problem being far more pronounced in Europe than in the U.S., according to the latest monthly survey . . .
Via an encryption scheme that uses GPS satellites to track users' locations, Georgetown professor Dorothy Denning takes the copyright fight to Hollywood--and into the heavens. Now, Denning is pioneering a new type of copyright protection, called geo-encryption. It's a big deal . . .
XML Encryption provides end-to-end security for applications that require secure exchange of structured data. XML itself is the most popular technology for structuring data, and therefore XML-based encryption is the natural way to handle complex requirements for security in data interchange . . .
One of the most popular methods of setting up a secure connection between different platforms is to use IP Security Protocol (IPSec). IPSec provides cryptographic services at the IP layer supporting data origin authentication, integrity, and confidentiality. The use of IPSec . . .
In the corporate world, companies commonly require all outgoing connections to pass through a proxy server or gateway host : a machine connected to both the company network and the outside. Although connected to both networks, a gateway host doesn't act as a router, and the networks remain separated.. . .
There is a growing debate in the cryptography community over whether the cryptographic keys used in dozens of applications should be considered compromised in light of a recent paper detailing a more efficient way of factoring large numbers. . . .
Keys used for the vast majority of encryption systems - including ecommerce - are no longer secure. A paper by Daniel Bernstein, an associate professor at the University of Illinois at Chicago, has shown that it is possible to build a . . .
Phil Zimmermann says he doesn't regret creating the Pretty Good Privacy (PGP) strong encryption program, even though terrorists may use it. But while encryption may protect our Internet transactions and routine communications, it would be naive to think that governments or . . .
With increasingly important communications taking place using e-mail, the ability to verify the authenticity, and also protect the contents, of such correspondence has become something that everyone should know. However, the tools created to provide PGP security are generally cryptic and difficult to work with.. . .
This paper (pdf) provides some background information about PGP and explains how to check signatures for validity. "PGP stands for Pretty Good Privacy. It is a computer program that uses mathematical algorithms to encrypt files and protect them from unauthorized access.. . .
Encryption expert Bruce Schneier downplayed this week the importance of a University of Illinois professor's newest method of breaking the digital codes that secure information. In a paper published on his Web site, Daniel Bernstein, an associate professor of . . .
The goal of this work is complete privilege separation within in OpenSSH. Privilege separation uses two processes: The privileged parent process that monitors the progress of the unprivileged child process. The child process is unprivileged and the only process that processes . . .