Linux Cryptography - Page 48

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Cryptography News

Digital tags stem hack attacks

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

ISPs and corporations could do more to prevent hacking attacks by using digital authentication, according to security vendor Access Research Technologies. The company said its software can generate digital tags which protect communication channels by authenticating and authorising each inbound connection . . .

SSH: SEALING THE PIPES

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

SSH is a powerful security protocol, but it can prove dangerous if used incorrectly. The paradox of the Internet is that it could never have developed without being open. But that same openness makes today's 'Net vulnerable to attacks of all kinds. The Secure Shell (SSH) protocol is one of a number of solutions developed over the past decade to address this problem.. . .

Flaw found in encrypted e-mail programs

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

There is a fundamental flaw in numerous popular encrypted e-mail programs that calls into question the authenticity of digitally signed and encrypted e-mail messages, according to a security researcher who has published a paper on the subject. But, as is usually the case in the security community, the revelation has sparked a debate over the merits of the disclosure.. . .

Cracking e-security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

If the governments of the world are to be believed, Public Key Infrastructure (PKI) is playing straight into the hands of the criminal underworld. According to some, it is just too strong, which means that Big Brother finds it very difficult to keep his beady eyes locked onto our every movement.. . .

Secure FTP via SSH Tunnel

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This article will point out the differences between standard FTP and secure FTP using some real-world examples. Secure FTP solves the password security and port control problems by allowing the entire connection to take place through a single tunneled SSH connection. . . .

The Key to Encryption

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Encrypting data that passes over the Internet from customers to e-commerce sites is a good thing. But it's not necessarily enough. In fact, personal data used in online transactions is often encrypted at the least significant time. . . .

VPNs aren't the answer to everything

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

In October 2000, Microsoft discovered that someone had broken into its internal network, evidently using a Trojan horse program to commandeer the PC of an employee who was working remotely. The widely reported intrusion wasn't just bad publicity for Microsoft. It . . .

Smashing the SSL Speed Trap

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Whether you're boarding an airplane or sending a credit-card number into cyberspace, you want to feel secure -- it's a basic human need. Lately, however, we've noticed how often this need is at odds with our yen to stay on the . . .

OpenPGP Alliance secures email

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A group of security companies have teamed up to form the OpenPGP Alliance, a body that aims to ensure compatibility between secure email systems. OpenPGP is a widely used email encryption system based on an Internet Engineering Task Force . . .

The Crypto Myth

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

For more than 15 years, we have been deluged with the idea that Internet encryption, SSL in particular, is sine qua non--an absolutely indispensable component of enterprise and e-commerce security. The argument goes like this: Because the Internet uses packet switching . . .

VPNs securely deliver the goods

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The most popular technique, tunneling, entails wrapping private network packets inside TCP/IP data sent via the Internet. Hardware or software on both ends of this VPN connection use a shared encryption key to encrypt and wrap and then unwrap and decipher . . .

Secure Your Sockets with JSSE

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

In this column, I'll show you how to install JSSE and use it to implement HTTPS (i.e., HTTP over SSL). I'll provide you with an example of a mini-HTTPS server and Java clients that support SSL. I'll then show you how . . .

AES Encryption Products Expected Soon

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Products certified for the new Advanced Encryption Standard should be available almost as soon as the proposed standard receives formal approval, officials at the National Institute of Standards and Technology said last week. NIST last October selected the powerful Rijndael algorithm . . .

Crypto City Lifts the Drawbridge

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Seated in the lobby of the National Cryptologic Museum, between a German Enigma machine and a KGB mannequin, James Bamford couldn't have picked a more perfect place to sign copies of his new spy book, "Body of Secrets." But the amazing . . .

Using SSL Acceleration to Improve SLAs

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This paper is designed to provide HSPs with an understanding of the business case for value added services and presents the rationale for offering SSL acceleration services to hosting service customers. Included are ROI (return on investment) indicators, marketing tips and . . .