Linux Cryptography - Page 46
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
Ten years after Phil Zimmermann released PGP v.1.0 (Pretty Good Privacy), PGP has evolved from an underground tool for paranoiacs to the gold standard, even an internet standard, for e-mail encryption. GnuPG, the GNU Privacy Guard, is a 100% free alternative . . .
PGP Security will unveil this week at NetWorld+Interop 2001 in Atlanta an easier-to-use version of its CyberCop network vulnerability-assessment tool that will help customers more quickly find and fix security weaknesses in PCs, servers, switches and firewalls.. . .
One of the first encryption products is made available to all. PGP Security -- a division of Network Associates that has been criticised in the past for being too proprietary -- has made available the electronic distribution of its complete source code for the PGPsdk, its cryptographic toolkit.. . .
This week has been big for cryptography. It's seen both technical and theoretical advances in next-generation quantum crypto systems and technology. It's seen a prototype enter its testing phase that could send secret crypto keys through open air to a satellite . . .
Many developers use the excellent OpenSSH as a secure, encrypted replacement for the venerable telnet and rsh commands. One of OpenSSH's more intriguing features is its ability to authenticate users using the RSA and DSA authentication protocols, which are based upon . . .
This is the second article in a series on OpenSSL, a library written in the C programming language that provides routines for cryptographic primitives utilized in implementing the Secure Sockets Layer (SSL) protocol. In the first article in the series, we . . .
Highly respected OpenBSD, OpenSSH programmer censors website, cites DMCA. At this time it is not clear whether the site was taken down under pressure from corporations or simply attempting to express feelings about the DMCA and possibly start a trend whereby security researchers withhold their own research because they are at risk under the DMCA.. . .
When PKIs hit the streets a few years ago, a media frenzy ensued -- remember 1999, the year of the public-key infrastructure? Now it's the morning after, and we've gotten a dose of reality when it comes to the cost and complexity of rolling out a PKI.. . .
The encryption protection that stops the copying of e-books stored in Microsoft Reader formats has been broken by an anonymous programmer, according to MIT's Technology Review. Microsoft Reader is the software that enables people to read e-books. It is free and . . .
U.S. Customs Service agents have arrested two men for allegedly attempting to export military-grade encryption technology to China. Authorities on Tuesday arrested Eugene You Tsai Hsu, of Blue Springs, Mo., and David Tzu Wvi Yang, of Temple City, Calif., accusing the . . .
By running Linux, it enables much easier migration and porting of applications into the secure environment than with the current CP/Q operating system. As a key product for secure e-business, its main applications are financial-related solutions, such as electronic coupon dispensers, . . .
In a bid to make it easier for firewalls to interoperate with virtual private networks (VPNs), the Internet Engineering Task Force (IETF) is considering a standard for network address translation (Nat). At a recent meeting in London, the IETF reviewed a . . .
In another potential blow to online publishing, a U.S. programmer says he has developed software that defeats the most advanced encryption features of Microsoft's Reader, a software program for distributing electronic books. The programmer's claim was reported Thursday on the Web . . .
Source code and other example implementations of the CSS descrambling algorithm. "If code that can be directly compiled and executed may be suppressed under the DMCA, as Judge Kaplan asserts in his preliminary ruling, but a textual description of the same algorithm may not be suppressed, then where exactly should the line be drawn?. . .
Network security company SSH Communications said Friday that it is investigating claims that advanced pattern recognition can be used to weaken the security around an encryption standard used to protect connections between computers. The standard, known as secure shell, or SSH, . . .
A serious shortcoming of the present day cryptography algorithms is they do not survive private key compromise. Today, credit card holders are not willing to make online purchases after hearing several security incidents, an obvious reason behind most dotcom layoffs. But . . .
Cryptographic researchers have identified flaws in Secure Shell (SSH) which might allow hackers to obtain information about a user's password or traffic being sent using the secure protocol. SSH has two weaknesses which might be exploited by traffic analysis that looked . . .
Original papers are solicited on all aspects of financial data security and digital commerce for submission to the Sixth Annual Conference on Financial Cryptography (FC '02). FC '02 brings together researchers in the financial, legal, cryptologic, and data security fields to foster cooperation and exchange of ideas.. . .
Researchers at the University of California at Berkeley have discovered more vulnerabilities in Secure Shell (SSH) which allow an attacker to learn significant information about what data is being transferred in SSH sessions, including passwords. SSH was designed as a secure . . .
Wireless networks are fast to set up and flexible enough to let workers roam through an office or campus. But "you would not want to trust anything sensitive to today's 802.11b" wireless LAN standard, said Maj. David A. Nash, an . . .