Linux Cryptography - Page 44

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Cryptography News

PKCS #11 openCryptoki for Linux

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

openCryptoki is an implementation of the PKCS #11 API that allows interfacing to devices (such as a smart card, smart disk, or PCMCIA card) that hold cryptographic information and perform cryptographic functions. openCryptoki provides application portability by isolating the . . .

Encryption: is it a load of &*^%&^&^$%?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Encryption technology has come under fire from proponents of rival socket layer technology, who claim it will always be vulnerable to hackers. Encryption has been traditionally seen as the most secure way to transport data as the technology relies on the . . .

Phil Zimmerman and PGP

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

InfoSecurityMag talks with the creator of PGP and the motivations behind creating it. "Zimmermann says he was confident that the first release of PGP domestically would be safe from legal restrictions, albeit not unnoticed.. . .

OpenSSH 3.0.1 Released

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A security hole that may allow an attacker to authenticate if -- and only if -- the administrator has enabled KerberosV. By default, OpenSSH KerberosV support only becomes active after KerberosV has been properly configured.. . .

Strategies & Issues: Public Key Infrastructure Nuts and Bolts

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Like a successful public works project, a good Public Key Infrastructure (PKI) should also be invisible to its end users, whether they're company employees, business partners, or customers. Similarly, PKI and the digital certificates that are its stock in trade can be complex and complicated-the potential for messy mishaps is high.. . .

DeCSS' DVD descrambler ruled legal

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Copy Control Association (CCA), which was granted a preliminary injunction against Andrew Bunner and other Webmasters, was handed its head in a California appellate court Thursday. The trial court had granted the injunction against publishing Jon Johansen's DeCSS DVD descrambler, but Brunner appealed on First Amendment free-speech grounds.. . .

Cryptanalysis of Multiswap (Microsoft Digital Rights Management Broken)

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

An anonymous security researcher working under the pseudonym "Beale Screamer" reverse engineered the Microsoft Digital Rights Management subsystem and, by October 20th, the results were available on cryptome.org. As part of the reverse engineering effort Screamer found an unpublished block cipher, which he dubbed MultiSwap, being used as part of DRM. Screamer did not need to break the MultiSwap cipher to break DRM, but we thought it would be a fun excercise, and summarize the results of our investigation below.. . .

Master key encryption plan abandoned

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

As concern grows over the vulnerability of government and industry organizations, a familiar and controversial battle has been revisited on Capitol Hill: the question of whether government should have control of encrypted messages. "Key escrow" -- a system whereby digital keys . . .

Secure Communications with OpenSSH

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Computer networks are an inherently insecure medium. Unless you are assured that your packets will never pass through a router or computer which you do not have direct control over, your data is not safe. It may be viewed by an . . .

Senator Backs Off Backdoors

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Sen. Judd Gregg has abruptly changed his mind and will no longer seek to insert backdoors into encryption products. A spokesman for the New Hampshire Republican said Tuesday that Gregg has "no intention" of introducing a bill to require government . . .

Encryption: How Prevalent Is It?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Many companies have reassessed their technology initiatives in the month since the tragic attacks on the United States. Some are focusing on security measures for IT systems while others are deepening efforts to secure facilities and intellectual property. Encryption technologies are . . .

The Times misquoted me - crypto expert

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

nternational cryptography expert Professor Ross Anderson has demanded a correction from the The Times for being misquoted on the subject of terrorists' use of email. With echoes of Phil Zimmermann's treatment by the Washington Post, which manufactured quotes by Zimmermann expressing . . .

Inside eBook Security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Partly in an attempt to protect the interests of publishers, the U.S. Congress in 1998 enacted national copyright laws called the "Digital Millennium Copyright Act" (DMCA). Among other things, this legislation (Public Law 105-304) makes it a crime to circumvent security controls in DRM-secured content.. . .