Linux Cryptography - Page 50
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
Cryptology experts are abuzz over a Harvard University professor's claim that he has discovered a way to make an unbreakable code that can be used over and over again. The mathematical proof, developed by computer science professor Michael Rabin with the . . .
Judging from recent headlines, one would think cryptography is responsible for all current evils, from child pornography to global terrorism. But is it really something to fear? There was a time when people blamed rock music for the ills of . . .
OpenPGP is an Internet Engineering Task Force (IETF) ratified standard based around PGP 5, which Hush and Zimmermann hope will become a global standard as the public demand for secure communications increases. OpenPGP as a development platform can be used to . . .
Anticryptography is based on the idea of making a message that decodes itself. The idea is closely linked with the search for extraterrestrial intelligence and is an attempt to answer the challenge of communicating with another, perhaps vastly different, intelligence. The . . .
They say that the Wired Equivalent Privacy protocol has been cracked. What's a wireless user to do? Tunnel. Secure Shell (SSH) is open, free, fast, secure, and easy to setup (once you know how). WEP has never provided much more than . . .
This document covers five pages of definitions and explanations of the elements of public key cryptograpy. "Everything you wanted to know about Public Key Infrastructure, but were too insecure to ask. Secret Key Encryption In secret key encryption, the same key . . .
Students and alumni of the Defense Department's school to train investigators in computer crime techniques are using public-key infrastructure technology to communicate via a private Web site. The Defense Computer Investigations Training Program in Linthicum, Md., started handing out digital certificates . . .
Palm-size organizers are essentially small computers--and now, you can encrypt your Palm Pilot data to protect it from prying eyes. But there is a big advantage that personal organizers have when used for encryption. Unlike even a laptop, it is practical . . .
A Harvard University computer science professor claims to have developed Internet message encryption code that he can prove is unbreakable. While other "unbreakable" codes have been developed in the past few years, the latest one, developed by Professor Michael Rabin, represents . . .
Phil Zimmermann, creator of PGP, the ubiquitous personal cryptography program, has left Network Associates after three years. Included below is his public 'resignation letter' and followed by a link to a ZDNET UK article that describes what he's doing next.. . .
In the race to improve security infrastructures faster than hackers can invent methods to penetrate firewalls, it is important to ascertain a user's identity before permitting access to protected data. Given the pervasive use of passwords and personal identification number codes . . .
CPRM copy control poses "a serious threat to civil liberties", writes cryptography expert Bruce Schneier. In an analysis of the CPRM specs that the 4C Entity has proposed for inclusion in the ATA hard drive specification in his latest Cryptogram newsletter, . . .
We came across an interesting web page today, full of details on the new 3G encryption algorithms. A researcher at AT&T Labs thought it would be a good idea if information about the new encryption algorithms or development processes was available . . .
Though more smart cards are in use in the United States than ever before, experts now say the technology may take at least four years to permeate the business or consumer sectors here and attain similar status as the ever-popular credit . . .
Demonstrating progress in its peer-to-peer efforts, Intel Wednesday unveiled security software code that other companies can use when developing peer-to-peer applications. Dubbed the Peer-to-Peer Trusted Library, the release includes full API (application programming interface) documentation and provides support for peer authentication, . . .
How cool is this. "This is a program for encrypting/decrypting streams of data using Rijndael and Cipher Block Feedback mode (CFB-128). Encrypt/decrypt stdin using the Advanced Encryption Standard winner "Rijndael" encryption algorithm in Cipher Block Feedback (stream) mode. Uses /dev/urandom to . . .
This August 2000 SANS article does a great job of describing cost-effective methods for implementing IPSec using NIST Cerberus IPSec Reference Implementation. "We experimented with different approaches to provide a cost-effective method of remote logon activities including SSH scripting and S/WAN . . .
A Filipino math whiz claimed in newspaper reports this week that he had discovered a faster way of decoding RSA's popular encryption algorithm. If proven, the claim will have called into question the validity of what has become, essentially, the . . .
The Java Cryptography Architecture is split into two different packages, part lies within the JDK, while the other lies within the Java Cryptology Extension. Sun had to split the architecture due to US export laws which prohibits software encryption technology from . . .
A SCIENTIST AT Bell Labs, the research and development wing of Lucent Technologies, has discovered a flaw in the Digital Signature Algorithm (DSA) that could affect the integrity of secure transactions on the Internet and adversely impact VPNs (virtual private networks), . . .