Linux Cryptography - Page 45
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
Strong cryptography does more good for society than harm and placing backdoors in encryption products to allow law enforcement access to plain text messages would be "worse than futile", encryption guru Phil Zimmermann told The Register today. Zimmermann, the creator . . .
Revived efforts to restrict software encryption in the wake of the recent terrorist attacks could have an adverse impact on e-commerce, IT managers and security experts say, but it's unlikely the government will succeed in curtailing encryption.. . .
Government research on computer security and identification technologies will likely receive greater attention in the aftermath of the Sept. 11 terror attacks against the United States, according to the chairman of the House Science Committee.. . .
Godfather of encryption Phil Zimmerman has responded to attacks directed at him over the use of encryption software in the terrorist attacks on the US. Zimmerman, who created the Pretty Good Privacy (PGP) encryption software a decade ago, apparently came . . .
Following reports that bin Laden hides messages in images on the Web, a study has found no evidence that steganography has caught on. A study of more than two million images downloaded from eBay auctions appears to show little . . .
Guess what? Osama Bin Ladin uses steganography. According to nameless "U.S. officials and experts" and "U.S. and foreign officials," terrorist groups are "hiding maps and photographs of terrorist targets and posting instructions for terrorist activities on sports chat rooms, pornographic bulletin . . .
Fearing that last week's terrorist attacks have created a backlash against secure communications, computer security experts are warning that any effort to mandate government access to encrypted information will seriously weaken crypto systems that protect critical business data and the national infrastructure.. . .
In a terror-induced climate of heightened electronic vigilance, debate is brewing over whether makers of encryption software should be obliged to provide law enforcement with the keys to open scrambled messages. Phil Zimmermann and fellow encryption supporters thought they had won . . .
A U.S. lawmaker well versed in technology issues said Friday that government bodies and citizens should use more encryption, not less, to increase security on the Internet. In the wake of last Tuesday's hijackings that left more than 6,500 Americans . . .
There is a standard list of reasons why you might want to consider the use of encryption to ensure the privacy of your business and/or personal data. In the Resources section below, I've provided links to half a dozen sites, each explaining why such protection is a good thing.. . .
Despite calls for a ban on 'uncrackable' encryption products in the US, the Australian government isn't saying whether it will support the Americans Australia's Department of Defence won't disclose if it will answer the US government's call to arms in . . .
Three in four Americans favour tough anti-encryption laws, in the wake of last week's terrorist atrocities, a survey finds. Seventy-two per cent believe anti-encryption laws will be "somewhat" or "very" helpful in combating terrorism, according to the survey, conducted by Princeton . . .
A poll in the United States has found widespread support for a ban on "uncrackable" encryption products, following proposals in Congress to tighten restrictions on software that scrambles electronic data. The survey found that 72 percent of Americans believe that . . .
Rob Carlson is worried about something that most Americans would consider entirely obscure: the future of encryption technology. Carlson, a 21-year-old programmer who typically sports a floppy, pin-studded safari hat, fears that the U.S. Congress, in the wake of last week's . . .
The horror of Tuesday's coordinated attacks on the commercial and military centers of America has prompted the U.S. Congress to call for a global ban on "uncrackable" encryption products. Speaking in the U.S. Senate on Thursday, Senator Judd Gregg proposed tighter . . .
A vulnerability has been discovered in versions of software development toolkits from RSA Security, which could allow an attacker to bypass SSL client authentication. In a security notice on the issue, RSA said the vulnerability meant that hackers "might potentially gain . . .
The terrorist attacks in the US this week have prompted calls for all encryption software to have 'backdoors' for government interception. The horror of Tuesday's coordinated attacks on the commercial and military centres of America has prompted the US . . .
The Customs Service has arrested two persons in Missouri and California for attempting to export military encryption technology to China. Eugene You Tsai Hsu of Blue Springs, Miss., and David Tzu Wvi Yang of Temple City, Calif., allegedly tried to export . . .
Mathematician Phil Carmody, who in March of this year managed to encode the DeCSS source in a prime number, has upped the ante by producing a prime number which represents an executable version of the banned CSS descrambler.. . .
Public key cryptography supports security mechanisms such as confidentiality, integrity, authentication, and non-repudiation. However, to successfully implement these security mechanisms, you must carefully plan an infrastructure to manage them. A public key infrastructure (PKI) is a foundation on which other applications, . . .