Linux Cryptography - Page 43

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Cryptography News

A Rough Year for SSH

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Just as 2000 was a rough year for firewalls, with holes blown in both commercial and open-source products, 2001 was a most uncomfortable year for the secure shell, or ssh. Several groups focused their attentions on this cornerstone of the net, and several problems emerged. ssh has emerged from this scrutiny a stronger product. . . .

Brain-bending crypto

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Researchers at Toshiba have developed an LED (light emitting diode) capable of firing a single photon at a time, which could make sending encrypted messages truly secure. Researchers believe the diode could be used for quantum cryptography, a secure form . . .

Wheels turning with secret keys

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The E-government unit of the State Services Commission has opted for an open Public Key Infrastructure (PKI) standard it hopes will lead to rapid adoption of encryption technology by Government agencies. The unit has called for New Zealand and international certification authorities to apply for accreditation to supply keys or digital certificates to departments.. . .

Steganography, Next Generation

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Steganography, the science of burying secret messages within something innocuous, has endured bad publicity recently, with unsubstantiated rumors of missives from Osama bin Laden hidden in images on websites. But the good guys can play, too. A new steganography-based technique hides . . .

Quantum crypto edges closer

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

British boffins have made a breakthrough in quantum cryptography, an advanced code-making technology which is theoretically uncrackable, by developing a single photon-emitting diode. The researchers from the University of Cambridge and Toshiba have discovered a way of incorporating semiconductor nano-technology into . . .

Bridge built between HushMail and PGP users

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Users are promised interoperability between HushMail accounts and desktop PGP users with a tool which uploads PGP public keys to HushMail servers. A spokeswoman for Hush Communications described it as "a bridge between the two technologies", made possible by the migration . . .

IPsec Tunneling Between FreeBSD Hosts

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

IPsec is short for IP security, which is a manner of encrypting and authenticating Internet traffic all the way down to the IP packet level. That means that protocols such as SMTP, which are inherently insecure, can be reliably secured. Inherent to IPv6, IPSec is somewhat bolted onto the side of IPv4. But it works, and it works very well.. . .

Don't like IKE?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Internet Engineering Task Force this week will consider replacing the protocol that manages encryption keys for IP Security VPNs with a new set of rules that is admittedly less flexible but could lead to equipment that is more interoperable, supports better security and is easier to configure.. . .

US give AES the official yes

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Advanced Encryption Standard (AES) has at long last received the official stamp of approval which allows it to be used by the US Federal Government. AES represents the fruits of a four-year project by cryptographers to develop a next generation . . .

U.S. Approves New 256-Bit Encryption Standard

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The U.S. government has updated its encryption standard for computer transmissions, replacing an aging standard first put in place in 1977, the Commerce Department said on Tuesday. When the new Advanced Encryption Standard, or AES, is adopted by the government and . . .

High hopes for new 256-bit encryption

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The U.S. government has updated its encryption standard for computer transmissions, replacing an aging standard first put in place in 1977, the Commerce Department said on Tuesday.When the new Advanced Encryption Standard, or AES, is adopted by the government and private . . .

Encryption 101

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

It's always been difficult to keep secrets. It's even more difficult when necessity forces you to write those secrets down and move them around the Internet, whose open systems make it easy for eavesdroppers to glance at the information we send . . .

Tim May: Rumors of the death of Cypherpunks are greatly exaggerated

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Over the course of the last week or so a number of news sites reported the demise of the cyperpunks mailing list. Tim May writes that he thinks it's a matter of course for the lifecycle of a mailing list, and perhaps not as noteworthy as it's being made to be... "The article is not a bad one, and actually makes some good points. Predictably, the headline is lurid and derogatory.". . .