Linux Cryptography - Page 49
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
A security system startup venture has taken the wraps off a new type of encryption-processing scheme that it claims can increase performance over competing technologies by as much as tenfold. As a result, Andes Networks Inc. expects to see the cost . . .
However, most people simply connect via SSH, enter their passwords, and type away. They don't realize that SSH has advanced key-management features that allow them to avoid having to retype their passwords; that its port-forwarding options can secure other, normally insecure, . . .
The government finally did something right. That seemed to be the common theme at the RSA Data Security Conference on Monday afternoon with encryption experts praising the U.S. government's selection of an Advanced Encryption Standard, or AES. "I would like to . . .
Cryptographer Bruce Schneier today reiterated his managed security services gospel in a talk here on the opening day of the RSA Security Conference. But if his message is really being heard, there should be general panic among . . .
One of the most common kinds of access control for secure web servers is Basic Authentication, in which a login and password are required. Access controls can apply to part or all of a web site. The restricted area is called . . .
To set up a digital signature in Java, you first need to set up a private key, usually by using keytool or the security API methods. Programmers often use the Java Certificate feature to securely verify public key authenticity. . . .
BitArts, a company founded by a group of ex-computer software crackers, has developed a revolutionary encryption system they claim is all but unbreakable. John Safa, BitArt's founder and chief technical officer, told Newsbytes that the encryption system works by changing the . . .
Despite accepting its own taskforce recommendation two weeks ago, the Home Office now says there will be no independent enquiry into the effects of the controversial RIP Act The Home Office has backtracked on a promise to commission an independent . . .
The use of encryption and authentication can improve network and host security. But there are many steps that must be taken, and done correctly, before cryptography becomes part of a secure solution.. . .
The Czech group which recently found vulnerabilities in OpenPGP has released two documents outlining the attack. . .
The Internet engineering community rebuffed one of its own security gurus this week, by rejecting a request from the inventor of the popular Secure Shell protocol to change the technology's acronym to protect his company's trademark on the term. Tatu Ylonnen . . .
Two cryptologists announced Tuesday that they had found a flaw in the most widely used program for sending encrypted, or coded, e-mail messages. If confirmed, the flaw would allow a determined adversary to obtain secret codes used by senders of encrypted . . .
IBM is backing a standards proposal that would allow generic functions to be programmed into removable media such as DVDs, flash memory and Zip drives that, among other things, could limit what a user copies to or from his computer. IBM . . .
The Pythagoreans were reputed, whether rightly or wrongly, to be a shamanistic cult which jealously guarded the higher mysteries of mathematical knowledge to maintain social power and political influence in their day. Of course they weren't as advanced as we are; . . .
In this issue, Bruce Schneier talks about, the "Security Patch Treadmill", the future role of insurance in network security, Harvards "new" and "uncrackable" cryptosystem, the TCP/IP sequence number bug, the "closed' cryptosystem of iBallot.com, some problems with conventional IDS, and how . . .
Paranoia is alive and well at the European Union (EU) Commission, which has been forced to officially deny its encryption system has been compromised by the NSA (National Security Agency). Fears of eavesdropping by the ultra-secretive US spy agency grew out of comments by a Commission employee, Briton Desmond Perkins, who told a EU Parliamentary committee of regular but unsuccessful attempts by the NSA to crack the Commission's encryption system.. . .
MIT student Keith Winstein and alum Marc Horowitz say they're out to prove a point: Publishing code that decrypts and plays DVD movies is not a crime. In their case, they assert it's about teaching copyright issues and is thus protected . . .
The Motion Picture Association of America is taking a closer look at a seven-line Perl script claimed by its authors to show just how "trivial" DVD encryption really is. The algorithm was written by Keith Winstein and Marc Horowitz - one . . .
MIT student Keith Winstein and alum Marc Horowitz say they're out to prove a point: Publishing code that decrypts and plays DVD movies is not a crime. In their case, they assert it's about teaching copyright issues and is . . .
The push towards egovernment in the US is being hindered by the use of various encryption technologies in different government agencies. According to a new report released by the General Accounting Office (GAO), the US government has to ensure the . . .