Linux Cryptography - Page 47
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
A hacking tool which can recover the encryption keys used to "protect" data sent over wireless networks has been released on the Internet. AirSnort is one of the first tools that automates the process of breaking in wireless networks and . . .
"Security is the big concern for most enterprises developing handheld wireless strategies," said Alex Slawsby, an analyst who covers "smart" handheld devices for IDC. The best way to secure such access would be to use virtual private network technology, which sets . . .
Wireless networks are a little less secure today with the public release of "AirSnort," a tool that can surreptitiously grab and analyze data moving across just about every major wireless network. When enough information has been captured, AirSnort can then piece together the system's master password.. . .
There have been many articles recently extolling the virtues of encrypting your communications via the internet. But there is another side to this debate. Russell Kay, senior reviews editor of Computerworld in the US, gives us his view. Some writers . . .
AirSnort is a wireless LAN (WLAN) tool which recovers encryption keys. AirSnort operates by passively monitoring transmissions, computing the encryption key when enough packets have been gathered. 802.11b, using the Wired Equivalent Protocol (WEP), is crippled with numerous security flaws. . . .
Today a group of Princeton computer scientists will present a research paper that has spurred debate over the freedom of scientific research and a 1998 digital copyright law that places restrictions on the dissemination of decryption information. The paper, which reveals . . .
Encrypted e-mail has flopped in the enterprise. More than five years after standards were created and vendors rushed to support them, virtually no one secures e-mail today, despite widespread concerns about prying eyes and corrupted data.. . .
Dmitri Sklyarov rarely reads electronic books. "There are almost no e-books in Russian," said Mr. Sklyarov, the 26-year- old Moscow cryptographer who was arrested in Las Vegas last month under a 1998 digital copyright law. "I prefer paper books. They're much . . .
Noted cryptographer Bruce Schneier has produced a damning critique of the way the Digital Millennium Copyright Act was used to jail Russian software researcher Dmitry Sklyarov. Schneier, chief technology officer of Counterpane Internet Security, and inventor of the Blowfish algorithm, will . . .
We implemented an attack against WEP, the link-layer security protocol for 802.11 networks. The attack was described in a recent paper by Fluhrer, Mantin, and Shamir. With our implementation, and permission of the network administrator, we were able to recover the . . .
With subtle distinctions, intellectual-property (IP) core vendors are readying implementations of the Advanced Encryption Standard (AES) security algorithm. The vendors, established and startup, are banking on applications from miniature wireless devices to massively parallel Web servers to support the rapid and . . .
Security vendors continue to tout Public Key Infrastructure (PKI) as a salve to our e-commerce anxieties, but the technology has been slow to catch on. Ovum's Graham Titterington argues that the future of PKI lies in scaling down expectations and focusing . . .
The protocol widely used to set up VPN tunnels is potentially insecure and work on extending its use should be halted, according to The Internet Engineering Task Force. Administrative groups within the IETF have put a temporary moratorium on extensions to Internet Key Exchange (IKE) without saying how long that moratorium should last.. . .
PKI is a catchall term for the infrastructure required to manage digital certificates and highly secure encryption. It encompasses a great deal: industry standards, software and hardware systems, business processes and security policies ? even human resources within a company responsible . . .
In this series, you'll learn how RSA and DSA authentication work, and see how to set up passwordless authentication the right way. In the first article of the series, Daniel Robbins focuses on introducing the RSA and DSA authentication protocols and . . .
Pretty Good Privacy, better known as PGP, is marking its tenth anniversary this year. Free and easy to use, the encryption tool has become one of the most prevalent ways to secure messages traveling the Internet - it is a standard cryptographic solution for users globally.. . .
Most well-known symmetric ciphers are block ciphers. The plaintext to be encrypted must be split into fixed-length blocks (usually 64 or 128 bits long) and fed to the cipher one at a time. The resulting blocks (of the same length) are . . .
The recent security announcement from Microsoft acknowledging that an errant code-signing certificate is in the wild (http://www.microsoft.com/) is a clear call to action for those of us charged with the design, deployment and operation of solid information security infrastructure. The question of the moment is, "Exactly what should that action be?". . .
File-encrypting Trojans are becoming so complex that the security companies could soon be powerless to reverse their effects, a new report from Kaspersky Lab has said.
In this article, I discuss our experience of integrating a hardware cryptographic token under Linux, using another open-source project known as OpenSSL. Public Key Infrastructure (PKI) is a critical technology in today's computer oriented world. Without it there would be . . .