Linux Cryptography - Page 45

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Cryptography News

Encryption Debate Revived

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Revived efforts to restrict software encryption in the wake of the recent terrorist attacks could have an adverse impact on e-commerce, IT managers and security experts say, but it's unlikely the government will succeed in curtailing encryption.. . .

Godfather of encryption hits back

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Godfather of encryption Phil Zimmerman has responded to attacks directed at him over the use of encryption software in the terrorist attacks on the US. Zimmerman, who created the Pretty Good Privacy (PGP) encryption software a decade ago, apparently came . . .

Terrorists and steganography

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Guess what? Osama Bin Ladin uses steganography. According to nameless "U.S. officials and experts" and "U.S. and foreign officials," terrorist groups are "hiding maps and photographs of terrorist targets and posting instructions for terrorist activities on sports chat rooms, pornographic bulletin . . .

Terror attacks revive crypto debate

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Fearing that last week's terrorist attacks have created a backlash against secure communications, computer security experts are warning that any effort to mandate government access to encrypted information will seriously weaken crypto systems that protect critical business data and the national infrastructure.. . .

Lawmaker: More encryption needed

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A U.S. lawmaker well versed in technology issues said Friday that government bodies and citizens should use more encryption, not less, to increase security on the Internet. In the wake of last Tuesday's hijackings that left more than 6,500 Americans . . .

How to install GnuPG

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

There is a standard list of reasons why you might want to consider the use of encryption to ensure the privacy of your business and/or personal data. In the Resources section below, I've provided links to half a dozen sites, each explaining why such protection is a good thing.. . .

Americans want Uncryption

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Three in four Americans favour tough anti-encryption laws, in the wake of last week's terrorist atrocities, a survey finds. Seventy-two per cent believe anti-encryption laws will be "somewhat" or "very" helpful in combating terrorism, according to the survey, conducted by Princeton . . .

Geeks Gather to Back Crypto

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Rob Carlson is worried about something that most Americans would consider entirely obscure: the future of encryption technology. Carlson, a 21-year-old programmer who typically sports a floppy, pin-studded safari hat, fears that the U.S. Congress, in the wake of last week's . . .

Senator calls for encryption crackdown

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The horror of Tuesday's coordinated attacks on the commercial and military centers of America has prompted the U.S. Congress to call for a global ban on "uncrackable" encryption products. Speaking in the U.S. Senate on Thursday, Senator Judd Gregg proposed tighter . . .

SSL toolkit flaw poses risk

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A vulnerability has been discovered in versions of software development toolkits from RSA Security, which could allow an attacker to bypass SSL client authentication. In a security notice on the issue, RSA said the vulnerability meant that hackers "might potentially gain . . .

Encryption crackdown looms

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The terrorist attacks in the US this week have prompted calls for all encryption software to have 'backdoors' for government interception. The horror of Tuesday's coordinated attacks on the commercial and military centres of America has prompted the US . . .

Public Key Infrastructure Overview

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Public key cryptography supports security mechanisms such as confidentiality, integrity, authentication, and non-repudiation. However, to successfully implement these security mechanisms, you must carefully plan an infrastructure to manage them. A public key infrastructure (PKI) is a foundation on which other applications, . . .