Linux Cryptography - Page 47

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Cryptography News

Tool dumbs down wireless hacking

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A hacking tool which can recover the encryption keys used to "protect" data sent over wireless networks has been released on the Internet. AirSnort is one of the first tools that automates the process of breaking in wireless networks and . . .

Handheld VPNs in the works

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

"Security is the big concern for most enterprises developing handheld wireless strategies," said Alex Slawsby, an analyst who covers "smart" handheld devices for IDC. The best way to secure such access would be to use virtual private network technology, which sets . . .

Wireless Networks in Big Trouble

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Wireless networks are a little less secure today with the public release of "AirSnort," a tool that can surreptitiously grab and analyze data moving across just about every major wireless network. When enough information has been captured, AirSnort can then piece together the system's master password.. . .

The Encryption Effort

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

There have been many articles recently extolling the virtues of encrypting your communications via the internet. But there is another side to this debate. Russell Kay, senior reviews editor of Computerworld in the US, gives us his view. Some writers . . .

AirSnort Wireless LAN Tool

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

AirSnort is a wireless LAN (WLAN) tool which recovers encryption keys. AirSnort operates by passively monitoring transmissions, computing the encryption key when enough packets have been gathered. 802.11b, using the Wired Equivalent Protocol (WEP), is crippled with numerous security flaws. . . .

So much for secure e-mail

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Encrypted e-mail has flopped in the enterprise. More than five years after standards were created and vendors rushed to support them, virtually no one secures e-mail today, despite widespread concerns about prying eyes and corrupted data.. . .

128 Bit Wireless Encryption Cracked

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

We implemented an attack against WEP, the link-layer security protocol for 802.11 networks. The attack was described in a recent paper by Fluhrer, Mantin, and Shamir. With our implementation, and permission of the network administrator, we were able to recover the . . .

Encryption cores ramp for pervasive security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

With subtle distinctions, intellectual-property (IP) core vendors are readying implementations of the Advanced Encryption Standard (AES) security algorithm. The vendors, established and startup, are banking on applications from miniature wireless devices to massively parallel Web servers to support the rapid and . . .

Will PKI bring trust to e-business?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Security vendors continue to tout Public Key Infrastructure (PKI) as a salve to our e-commerce anxieties, but the technology has been slow to catch on. Ovum's Graham Titterington argues that the future of PKI lies in scaling down expectations and focusing . . .

IETF stops work on VPN protocol

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The protocol widely used to set up VPN tunnels is potentially insecure and work on extending its use should be halted, according to The Internet Engineering Task Force. Administrative groups within the IETF have put a temporary moratorium on extensions to Internet Key Exchange (IKE) without saying how long that moratorium should last.. . .

Understanding RSA/DSA authentication

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

In this series, you'll learn how RSA and DSA authentication work, and see how to set up passwordless authentication the right way. In the first article of the series, Daniel Robbins focuses on introducing the RSA and DSA authentication protocols and . . .

Securing the Future for Privacy and Mobility

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Pretty Good Privacy, better known as PGP, is marking its tenth anniversary this year. Free and easy to use, the encryption tool has become one of the most prevalent ways to secure messages traveling the Internet - it is a standard cryptographic solution for users globally.. . .

Symmetric Cryptography in Perl

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Most well-known symmetric ciphers are block ciphers. The plaintext to be encrypted must be split into fixed-length blocks (usually 64 or 128 bits long) and fed to the cipher one at a time. The resulting blocks (of the same length) are . . .

The End of Trust as We Know It?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The recent security announcement from Microsoft acknowledging that an errant code-signing certificate is in the wild (http://www.microsoft.com/) is a clear call to action for those of us charged with the design, deployment and operation of solid information security infrastructure. The question of the moment is, "Exactly what should that action be?". . .