3 hrs ago
Statistics of Random Permutations and the Cryptanalysis Of Periodic Block Ciphers
A block cipher is intended to be computationally indistinguishable from a random permutation of appropriate domain and range.
Trending on the Topix Network
Wed Apr 16, 2014
Patent Issued for Method and System for Secure Software Provisioning
Many efforts for improving computer security have been direct toward software protection and combating software threats such as viruses, 'Trojan horse' attacks and other malicious software attacks.
Linguistic researchers claim Nick Szabo likely authored Bitcoin white paper
Students and researchers from Ashton University in Birmingham recently conducted a linguistics analyst on the Bitcoin white paper published in 2008.
Lavaboom builds encrypted webmail service to resist snooping
A new webmail service called Lavaboom promises to provide easy-to-use email encryption without ever learning its users' private encryption keys or message contents.
Future Nokia phones could send quantum-coded texts
Quantum cryptography could be the star feature of your next cellphone. The first pocket-sized quantum encryption device has been created in collaboration with the Finnish phone-maker Nokia, and could let you send completely secure messages although you will need to plug it into a quantum phone booth to do so.
Tue Apr 15, 2014
The spooky world of the 'numbers stations'
This is the era of hyper-tech espionage, encrypted emails and mindboggling cryptography.
Quantum phone booth lets you encrypt your calls
YOUR next mobile phone might be quantum. The first pocket-sized quantum cryptography device, created in collaboration with Nokia, could send completely secure messages using scaled-down technology.
Azure from the Linux command line
About a month ago, I wrote the first blog post of this series where I have shown how to set up the xplat-CLI on Linux and I described how to create IAAS VMs on Azure.
Mon Apr 14, 2014
TrueCrypt audit finds "no evidence of backdoors" or malicious code
On Monday, after seven months of discussion and planning , the first-phase of a two-part audit of TrueCrypt was released .
Stop laying the blame for Heartbleed on open source
Security experts acknowledge that open source is the best model for crypto, so how do we drive improvements to the model for creating security-critical infrastructure? I've spent the last week considering the data and opinions concerning the Heartbleed bug that was found in the widely used OpenSSL cryptography library.
'None of the Web companies are doing anything' to protect you, say security pros
Connect with leaders from the companies in this story, in real life: Come to the fourth annual VentureBeat Mobile Summit April 14-15 in Sausalito, Calif.
Akamai Heartbleed patch not a fix after all
The Web infrastructure company's patch was supposed to have handled the problem.
Ixia Helps Enterprises Protect Against the OpenSSL Heartbleed Exploitation
Customers can assess and remediate this dangerous SSL vulnerability with the latest release of Ixia's Application and Threat Intelligence Program )-- Ixia announced that its Application and Threat Intelligence team has delivered the ability to simulate the exploitation of the critical OpenSSL vulnerability Heartbleed with an update to the ATI ... (more)
Sun Apr 13, 2014
Hacking Secret Ciphers with Python
This guide on the basics of both cryptography and the Python programming language not only teaches you how to write in secret ciphers with paper and pencil but also how to write your own cipher programs and explores the hacking programs that can break the encrypted messages from these ciphers.
Sat Apr 12, 2014
The Globe and Mail
Outsmart Heartbleed? I can't even remember my password
There's a hole in the Internet where all your passwords could be sucked out at any moment, along with your confidential information and perhaps your bank account.
Report: NSA Exploited Heartbleed to Siphon Passwords for Two Years
The NSA knew about and exploited the Heartbleed vulnerability for two years before it was publicly exposed this week, and used it to steal account passwords and other data, according to a news report.
Fri Apr 11, 2014
Internet Explorer 11 and Perfect-Forward-Secrecy
In case you missed it, the recent Windows 8.1 Update update adds four new ciphersuites and changes the ciphersuite order to prefer algorithms that offer Perfect-Forward-Secrecy.
Bugtraq: Esa-2012-032: Rsa Bsafe Micro Edition Suite Security Update ...
Hash: SHA1 ESA-2012-032: RSA BSAFE Micro Edition Suite Security Update for BEAST attacks EMC Identifier: ESA-2012-032 CVE Identifier: CVE-2011-3389 Severity Rating: CVSS v2 Base Score: 4.3 Affected Products: All versions of RSA BSAFE Micro Edition Suite except 4.0.5 and 3.2.6, all platforms Unaffected Products: RSA BSAFE MES 4.0.5, 3.2.6 Summary: ... (more)
The Washington Post
The NSA may have exploited Heartbleed
A new article by Michael Riley at Bloomberg makes an explosive allegation. According to "two people familiar with the matter," the NSA has known about the crippling 'Heartbleed' bug that compromises one of the core Internet security standards for at least two years.
KELO-TV Sioux Falls
BBB Issues Password Recommendations Due 'Heartbleed'
First of all, the BBB says to make your passwords "long and strong." Combine capital and lowercase letters, along with numbers and symbols.