Linux Cryptography - Page 46

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Cryptography News

PGP bolsters security package

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

PGP Security will unveil this week at NetWorld+Interop 2001 in Atlanta an easier-to-use version of its CyberCop network vulnerability-assessment tool that will help customers more quickly find and fix security weaknesses in PCs, servers, switches and firewalls.. . .

PGP opens up complete encryption source code

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

One of the first encryption products is made available to all. PGP Security -- a division of Network Associates that has been criticised in the past for being too proprietary -- has made available the electronic distribution of its complete source code for the PGPsdk, its cryptographic toolkit.. . .

Quantum Crypto to the Rescue

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This week has been big for cryptography. It's seen both technical and theoretical advances in next-generation quantum crypto systems and technology. It's seen a prototype enter its testing phase that could send secret crypto keys through open air to a satellite . . .

OpenSSH key management, Part 2

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Many developers use the excellent OpenSSH as a secure, encrypted replacement for the venerable telnet and rsh commands. One of OpenSSH's more intriguing features is its ability to authenticate users using the RSA and DSA authentication protocols, which are based upon . . .

Dug Song censors website, cites DMCA

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Highly respected OpenBSD, OpenSSH programmer censors website, cites DMCA. At this time it is not clear whether the site was taken down under pressure from corporations or simply attempting to express feelings about the DMCA and possibly start a trend whereby security researchers withhold their own research because they are at risk under the DMCA.. . .

In PKI We Trust?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

When PKIs hit the streets a few years ago, a media frenzy ensued -- remember 1999, the year of the public-key infrastructure? Now it's the morning after, and we've gotten a dose of reality when it comes to the cost and complexity of rolling out a PKI.. . .

Microsoft e-book security in doubt

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The encryption protection that stops the copying of e-books stored in Microsoft Reader formats has been broken by an anonymous programmer, according to MIT's Technology Review. Microsoft Reader is the software that enables people to read e-books. It is free and . . .

Linux Running on Secure Cryptographic Coprocessor

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

By running Linux, it enables much easier migration and porting of applications into the secure environment than with the current CP/Q operating system. As a key product for secure e-business, its main applications are financial-related solutions, such as electronic coupon dispensers, . . .

VPN firewalls standard in the pipeline

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

In a bid to make it easier for firewalls to interoperate with virtual private networks (VPNs), the Internet Engineering Task Force (IETF) is considering a standard for network address translation (Nat). At a recent meeting in London, the IETF reviewed a . . .

Programmer claims to crack MS Reader

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

In another potential blow to online publishing, a U.S. programmer says he has developed software that defeats the most advanced encryption features of Microsoft's Reader, a software program for distributing electronic books. The programmer's claim was reported Thursday on the Web . . .

Gallery of CSS Descramblers

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Source code and other example implementations of the CSS descrambling algorithm. "If code that can be directly compiled and executed may be suppressed under the DMCA, as Judge Kaplan asserts in his preliminary ruling, but a textual description of the same algorithm may not be suppressed, then where exactly should the line be drawn?. . .

Security firm discounts password threat

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Network security company SSH Communications said Friday that it is investigating claims that advanced pattern recognition can be used to weaken the security around an encryption standard used to protect connections between computers. The standard, known as secure shell, or SSH, . . .

E-commerce Now Survives Private Key Compromises

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A serious shortcoming of the present day cryptography algorithms is they do not survive private key compromise. Today, credit card holders are not willing to make online purchases after hearing several security incidents, an obvious reason behind most dotcom layoffs. But . . .

Crypto boffins question SSH security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Cryptographic researchers have identified flaws in Secure Shell (SSH) which might allow hackers to obtain information about a user's password or traffic being sent using the secure protocol. SSH has two weaknesses which might be exploited by traffic analysis that looked . . .

CFP: Financial Cryptography '02

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Original papers are solicited on all aspects of financial data security and digital commerce for submission to the Sixth Annual Conference on Financial Cryptography (FC '02). FC '02 brings together researchers in the financial, legal, cryptologic, and data security fields to foster cooperation and exchange of ideas.. . .

Researchers develop SSH cracker

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Researchers at the University of California at Berkeley have discovered more vulnerabilities in Secure Shell (SSH) which allow an attacker to learn significant information about what data is being transferred in SSH sessions, including passwords. SSH was designed as a secure . . .