Linux Cryptography - Page 50

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Cryptography News

Sex, drugs, and technology

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Judging from recent headlines, one would think cryptography is responsible for all current evils, from child pornography to global terrorism. But is it really something to fear? There was a time when people blamed rock music for the ills of . . .

OpenPGP set to become global standard

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

OpenPGP is an Internet Engineering Task Force (IETF) ratified standard based around PGP 5, which Hush and Zimmermann hope will become a global standard as the public demand for secure communications increases. OpenPGP as a development platform can be used to . . .

Using SSH Tunneling

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

They say that the Wired Equivalent Privacy protocol has been cracked. What's a wireless user to do? Tunnel. Secure Shell (SSH) is open, free, fast, secure, and easy to setup (once you know how). WEP has never provided much more than . . .

PKI Primer

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This document covers five pages of definitions and explanations of the elements of public key cryptograpy. "Everything you wanted to know about Public Key Infrastructure, but were too insecure to ask. Secret Key Encryption In secret key encryption, the same key . . .

Cyberdefense students using PKI

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Students and alumni of the Defense Department's school to train investigators in computer crime techniques are using public-key infrastructure technology to communicate via a private Web site. The Defense Computer Investigations Training Program in Linthicum, Md., started handing out digital certificates . . .

Cryptography in Your Pocket

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Palm-size organizers are essentially small computers--and now, you can encrypt your Palm Pilot data to protect it from prying eyes. But there is a big advantage that personal organizers have when used for encryption. Unlike even a laptop, it is practical . . .

Unbreakable Code Said To Leave Hackers 'Helpless'

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A Harvard University computer science professor claims to have developed Internet message encryption code that he can prove is unbreakable. While other "unbreakable" codes have been developed in the past few years, the latest one, developed by Professor Michael Rabin, represents . . .

Zimmermann Leaves NAI

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Phil Zimmermann, creator of PGP, the ubiquitous personal cryptography program, has left Network Associates after three years. Included below is his public 'resignation letter' and followed by a link to a ZDNET UK article that describes what he's doing next.. . .

Layered biometric tools boost security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

In the race to improve security infrastructures faster than hackers can invent methods to penetrate firewalls, it is important to ascertain a user's identity before permitting access to protected data. Given the pervasive use of passwords and personal identification number codes . . .

3G crypto a go-go

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

We came across an interesting web page today, full of details on the new 3G encryption algorithms. A researcher at AT&T Labs thought it would be a good idea if information about the new encryption algorithms or development processes was available . . .

Intel locks up security code for P2P

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Demonstrating progress in its peer-to-peer efforts, Intel Wednesday unveiled security software code that other companies can use when developing peer-to-peer applications. Dubbed the Peer-to-Peer Trusted Library, the release includes full API (application programming interface) documentation and provides support for peer authentication, . . .

AESCrypt: Rijndael encryption for shell scripts.

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

How cool is this. "This is a program for encrypting/decrypting streams of data using Rijndael and Cipher Block Feedback mode (CFB-128). Encrypt/decrypt stdin using the Advanced Encryption Standard winner "Rijndael" encryption algorithm in Cipher Block Feedback (stream) mode. Uses /dev/urandom to . . .