Linux Cryptography - Page 44
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
openCryptoki is an implementation of the PKCS #11 API that allows interfacing to devices (such as a smart card, smart disk, or PCMCIA card) that hold cryptographic information and perform cryptographic functions. openCryptoki provides application portability by isolating the . . .
Encryption technology has come under fire from proponents of rival socket layer technology, who claim it will always be vulnerable to hackers. Encryption has been traditionally seen as the most secure way to transport data as the technology relies on the . . .
InfoSecurityMag talks with the creator of PGP and the motivations behind creating it. "Zimmermann says he was confident that the first release of PGP domestically would be safe from legal restrictions, albeit not unnoticed.. . .
GnuTLS is a project that aims to develop a library which provides a secure layer, over a reliable transport layer (ie. TCP/IP). Currently the gnuTLS library implements the proposed standards by the IETF's TLS working group. "The TLS protocol provides . . .
A security hole that may allow an attacker to authenticate if -- and only if -- the administrator has enabled KerberosV. By default, OpenSSH KerberosV support only becomes active after KerberosV has been properly configured.. . .
An independent expert has backed two Cambridge University students' claims to have uncovered a flaw in a key IBM cryptographic coprocessor that is at the heart of some of the world's most secure systems. IBM has been warned not to dismiss . . .
Like a successful public works project, a good Public Key Infrastructure (PKI) should also be invisible to its end users, whether they're company employees, business partners, or customers. Similarly, PKI and the digital certificates that are its stock in trade can be complex and complicated-the potential for messy mishaps is high.. . .
A California appeals court Friday issued a potentially far-reaching decision in a case involving the online publication of DVD-copying software. The Court of Appeal in the Sixth Appellate District of California reversed a lower court's decision to impose a temporary injunction . . .
Securing your network activity is not difficult, but it does require an awareness of how certain protocols work. This article will attempt to address these protocols and situations and suggest ways of adding security.. . .
The Copy Control Association (CCA), which was granted a preliminary injunction against Andrew Bunner and other Webmasters, was handed its head in a California appellate court Thursday. The trial court had granted the injunction against publishing Jon Johansen's DeCSS DVD descrambler, but Brunner appealed on First Amendment free-speech grounds.. . .
An anonymous security researcher working under the pseudonym "Beale Screamer" reverse engineered the Microsoft Digital Rights Management subsystem and, by October 20th, the results were available on cryptome.org. As part of the reverse engineering effort Screamer found an unpublished block cipher, which he dubbed MultiSwap, being used as part of DRM. Screamer did not need to break the MultiSwap cipher to break DRM, but we thought it would be a fun excercise, and summarize the results of our investigation below.. . .
As concern grows over the vulnerability of government and industry organizations, a familiar and controversial battle has been revisited on Capitol Hill: the question of whether government should have control of encrypted messages. "Key escrow" -- a system whereby digital keys . . .
The perennial target for government disapproval is encryption, and recent events in New York have added serious fuel to the already glowing embers of the argument. It is a touchy subject in light of the recent atrocities, which are being used . . .
Computer networks are an inherently insecure medium. Unless you are assured that your packets will never pass through a router or computer which you do not have direct control over, your data is not safe. It may be viewed by an . . .
Sen. Judd Gregg has abruptly changed his mind and will no longer seek to insert backdoors into encryption products. A spokesman for the New Hampshire Republican said Tuesday that Gregg has "no intention" of introducing a bill to require government . . .
Many companies have reassessed their technology initiatives in the month since the tragic attacks on the United States. Some are focusing on security measures for IT systems while others are deepening efforts to secure facilities and intellectual property. Encryption technologies are . . .
The intent of this document is to provide the new PGP user with enough information to effectively use PGP. This is just a primer; for more information, check the PGP help file and manual or see the Resources list at the . . .
nternational cryptography expert Professor Ross Anderson has demanded a correction from the The Times for being misquoted on the subject of terrorists' use of email. With echoes of Phil Zimmermann's treatment by the Washington Post, which manufactured quotes by Zimmermann expressing . . .
A coalition of high-tech companies today urged Sen. Judd Gregg, R-N.H., not to move forward with legislation that would give law enforcement back door access to all U.S.-made encryption products. Gregg introduced the measure shortly after learning terrorists likely used . . .
Partly in an attempt to protect the interests of publishers, the U.S. Congress in 1998 enacted national copyright laws called the "Digital Millennium Copyright Act" (DMCA). Among other things, this legislation (Public Law 105-304) makes it a crime to circumvent security controls in DRM-secured content.. . .