Bookmark

Add to MyYahoo RSS

Cryptography News

News on Cryptography continually updated from thousands of sources around the net.

3 hrs ago | CiteULike

Statistics of Random Permutations and the Cryptanalysis Of Periodic Block Ciphers

A block cipher is intended to be computationally indistinguishable from a random permutation of appropriate domain and range.

Comment?

Related Topix: Science, Computer Science

Wed Apr 16, 2014

Hispanic Business

Patent Issued for Method and System for Secure Software Provisioning

Many efforts for improving computer security have been direct toward software protection and combating software threats such as viruses, 'Trojan horse' attacks and other malicious software attacks.

Comment?

Related Topix: Computer Security, Science / Technology, Inventions, Computers, Science, Computer Science, Outsourcing

TechSpot

Linguistic researchers claim Nick Szabo likely authored Bitcoin white paper

Students and researchers from Ashton University in Birmingham recently conducted a linguistics analyst on the Bitcoin white paper published in 2008.

Comment?

Related Topix: Economics News, Bitcoin, Science, Computer Science

PC World

Lavaboom builds encrypted webmail service to resist snooping

A new webmail service called Lavaboom promises to provide easy-to-use email encryption without ever learning its users' private encryption keys or message contents.

Comment?

Related Topix: Science, Computer Science

New Scientist

Future Nokia phones could send quantum-coded texts

Quantum cryptography could be the star feature of your next cellphone. The first pocket-sized quantum encryption device has been created in collaboration with the Finnish phone-maker Nokia, and could let you send completely secure messages although you will need to plug it into a quantum phone booth to do so.

Comment?

Related Topix: Science, Computer Science, Computer Security, Science / Technology, Australia, World News,

Tue Apr 15, 2014

Newsday

The spooky world of the 'numbers stations'

This is the era of hyper-tech espionage, encrypted emails and mindboggling cryptography.

Comment?

Related Topix: Science, Computer Science

New Scientist

Quantum phone booth lets you encrypt your calls

YOUR next mobile phone might be quantum. The first pocket-sized quantum cryptography device, created in collaboration with Nokia, could send completely secure messages using scaled-down technology.

Comment?

Related Topix: Cell Phones, Cellphones, Electronics, Science, Computer Science, Computer Security, Science / Technology

MSDN Blogs

Azure from the Linux command line

About a month ago, I wrote the first blog post of this series where I have shown how to set up the xplat-CLI on Linux and I described how to create IAAS VMs on Azure.

Comment?

Related Topix: Science, Computer Science

Mon Apr 14, 2014

Ars Technica

TrueCrypt audit finds "no evidence of backdoors" or malicious code

On Monday, after seven months of discussion and planning , the first-phase of a two-part audit of TrueCrypt was released .

Comment?

Related Topix: Science, Computer Science

InfoWorld

Stop laying the blame for Heartbleed on open source

Security experts acknowledge that open source is the best model for crypto, so how do we drive improvements to the model for creating security-critical infrastructure? I've spent the last week considering the data and opinions concerning the Heartbleed bug that was found in the widely used OpenSSL cryptography library.

Comment?

Related Topix: Science / Technology, Science, Computer Science, Open Source Software

VentureBeat

'None of the Web companies are doing anything' to protect you, say security pros

Connect with leaders from the companies in this story, in real life: Come to the fourth annual VentureBeat Mobile Summit April 14-15 in Sausalito, Calif.

Comment?

Related Topix: Sausalito, CA, Google, Startups, Emerging Technology, Search Engines, Facebook, Social Software, Science, Computer Science

CNET News.com

Akamai Heartbleed patch not a fix after all

The Web infrastructure company's patch was supposed to have handled the problem.

Comment?

Related Topix: Akamai, Science, Computer Science

Business Wire

Ixia Helps Enterprises Protect Against the OpenSSL Heartbleed Exploitation

Customers can assess and remediate this dangerous SSL vulnerability with the latest release of Ixia's Application and Threat Intelligence Program )-- Ixia announced that its Application and Threat Intelligence team has delivered the ability to simulate the exploitation of the critical OpenSSL vulnerability Heartbleed with an update to the ATI ... (more)

Comment?

Related Topix: Telecom, Electronics, Ixia, Computer Security, Science / Technology, Science, Computer Science

Sun Apr 13, 2014

I programmer

Hacking Secret Ciphers with Python

This guide on the basics of both cryptography and the Python programming language not only teaches you how to write in secret ciphers with paper and pencil but also how to write your own cipher programs and explores the hacking programs that can break the encrypted messages from these ciphers.

Comment?

Related Topix: Science / Technology, Science, Computer Science, Programming Languages

Sat Apr 12, 2014

The Globe and Mail

Outsmart Heartbleed? I can't even remember my password

There's a hole in the Internet where all your passwords could be sucked out at any moment, along with your confidential information and perhaps your bank account.

Comment?

Related Topix: Science / Technology, Computer Security, Science, Computer Science

Wired

Report: NSA Exploited Heartbleed to Siphon Passwords for Two Years

The NSA knew about and exploited the Heartbleed vulnerability for two years before it was publicly exposed this week, and used it to steal account passwords and other data, according to a news report.

Comment?

Related Topix: Computer Security, Science / Technology, Computers, Science, Computer Science

Fri Apr 11, 2014

MSDN Blogs

Internet Explorer 11 and Perfect-Forward-Secrecy

In case you missed it, the recent Windows 8.1 Update update adds four new ciphersuites and changes the ciphersuite order to prefer algorithms that offer Perfect-Forward-Secrecy.

Comment?

Related Topix: Science, Computer Science

Security Focus

Bugtraq: Esa-2012-032: Rsa Bsafe Micro Edition Suite Security Update ...

Hash: SHA1 ESA-2012-032: RSA BSAFE Micro Edition Suite Security Update for BEAST attacks EMC Identifier: ESA-2012-032 CVE Identifier: CVE-2011-3389 Severity Rating: CVSS v2 Base Score: 4.3 Affected Products: All versions of RSA BSAFE Micro Edition Suite except 4.0.5 and 3.2.6, all platforms Unaffected Products: RSA BSAFE MES 4.0.5, 3.2.6 Summary: ... (more)

Comment?

Related Topix: Computers, EMC, Science, Computer Science

The Washington Post

The NSA may have exploited Heartbleed

A new article by Michael Riley at Bloomberg makes an explosive allegation. According to "two people familiar with the matter," the NSA has known about the crippling 'Heartbleed' bug that compromises one of the core Internet security standards for at least two years.

Comment?

Related Topix: Fort Meade, MD, Computer Security, Science / Technology, Science, Computer Science, US Politics, US News

KELO-TV Sioux Falls

BBB Issues Password Recommendations Due 'Heartbleed'

First of all, the BBB says to make your passwords "long and strong." Combine capital and lowercase letters, along with numbers and symbols.

Comment?

Related Topix: Science, Computer Science

•••
•••
•••
•••
•••
•••
•••
•••