Linux Cryptography - Page 43
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
Just as 2000 was a rough year for firewalls, with holes blown in both commercial and open-source products, 2001 was a most uncomfortable year for the secure shell, or ssh. Several groups focused their attentions on this cornerstone of the net, and several problems emerged. ssh has emerged from this scrutiny a stronger product. . . .
The following text describes a security hole in the encrypted loop device for linux. Because of it, an attacker is able to modify the content of the encrypted device without being detected. This text proposes to fix the hole by authenticating the device.. . .
Researchers at Toshiba have developed an LED (light emitting diode) capable of firing a single photon at a time, which could make sending encrypted messages truly secure. Researchers believe the diode could be used for quantum cryptography, a secure form . . .
The E-government unit of the State Services Commission has opted for an open Public Key Infrastructure (PKI) standard it hopes will lead to rapid adoption of encryption technology by Government agencies. The unit has called for New Zealand and international certification authorities to apply for accreditation to supply keys or digital certificates to departments.. . .
Steganography, the science of burying secret messages within something innocuous, has endured bad publicity recently, with unsubstantiated rumors of missives from Osama bin Laden hidden in images on websites. But the good guys can play, too. A new steganography-based technique hides . . .
Research suggests that locally stored keys can be located by individuals who simply look for the relative 'randomness' of the key in contrast to the surrounding data. Conventional wisdom dictates that the keys used for generating digital signatures or decrypting . . .
The federal government's recent decision to adopt the Advanced Encryption Standard (AES) for securing sensitive information will trigger a move from the current, aging Data Encryption Standard (DES) in the private sector, users and analysts said. But don't expect it to . . .
The heart of a new light-emitting diode (LED) developed in Cambridge, UK, can be controlled so precisely that it emits just one single photon of light each time it is switched on. The device could be a key component in quantum . . .
British boffins have made a breakthrough in quantum cryptography, an advanced code-making technology which is theoretically uncrackable, by developing a single photon-emitting diode. The researchers from the University of Cambridge and Toshiba have discovered a way of incorporating semiconductor nano-technology into . . .
E-mail encryption seems to be hard enough, or annoying enough, that even many technically sophisticated people don't do it regularly. Non-technical people rarely seem to be able to figure it out at all. Even though we have a great free implementation . . .
Users are promised interoperability between HushMail accounts and desktop PGP users with a tool which uploads PGP public keys to HushMail servers. A spokeswoman for Hush Communications described it as "a bridge between the two technologies", made possible by the migration . . .
IPsec is short for IP security, which is a manner of encrypting and authenticating Internet traffic all the way down to the IP packet level. That means that protocols such as SMTP, which are inherently insecure, can be reliably secured. Inherent to IPv6, IPSec is somewhat bolted onto the side of IPv4. But it works, and it works very well.. . .
The Internet Engineering Task Force this week will consider replacing the protocol that manages encryption keys for IP Security VPNs with a new set of rules that is admittedly less flexible but could lead to equipment that is more interoperable, supports better security and is easier to configure.. . .
The Advanced Encryption Standard (AES) has at long last received the official stamp of approval which allows it to be used by the US Federal Government. AES represents the fruits of a four-year project by cryptographers to develop a next generation . . .
The U.S. government has updated its encryption standard for computer transmissions, replacing an aging standard first put in place in 1977, the Commerce Department said on Tuesday. When the new Advanced Encryption Standard, or AES, is adopted by the government and . . .
The U.S. government has updated its encryption standard for computer transmissions, replacing an aging standard first put in place in 1977, the Commerce Department said on Tuesday.When the new Advanced Encryption Standard, or AES, is adopted by the government and private . . .
It's always been difficult to keep secrets. It's even more difficult when necessity forces you to write those secrets down and move them around the Internet, whose open systems make it easy for eavesdroppers to glance at the information we send . . .
OpenSSH 3.0.2 has just been released. This release fixes a vulnerability in the UseLogin option of OpenSSH. This option is not enabled in the default installation of OpenSSH.. . .
Over the course of the last week or so a number of news sites reported the demise of the cyperpunks mailing list. Tim May writes that he thinks it's a matter of course for the lifecycle of a mailing list, and perhaps not as noteworthy as it's being made to be... "The article is not a bad one, and actually makes some good points. Predictably, the headline is lurid and derogatory.". . .
A federal appeals court on Wednesday upheld an order that prohibits publishing or linking to DVD-cracking code--a decision with sweeping significance for free speech rights and copyright protection on the Internet.. . .