Cryptography Newswire

Comprehensive Real-Time News Feed for Cryptography.

Results 1 - 20 of 1,706 in Cryptography

  1. "A System for Distributed Minting and Management of Persistent Identifiers"Read the original story

    42 min ago | Scholarly Electronic Publishing Weblog

    ... persistent identifiers is distributed, and the integrity of the distributed system is guaranteed by public-key cryptography. We describe the general architecture of the system, analyse its robustness and discuss potential deployment scenarios

    Comment?

  2. Logjam Flaw Puts Web Surfers at RiskRead the original story w/Photo

    5 hrs ago | NewsFactor

    ... a man-in-the-middle attacker to downgrade vulnerable TLS connections to 512-bit export-grade Diffie-Hellman cryptography, according to Matthew Green, an assistant research professor in the department of computer science at Johns Hopkins University. ...

    Comment?

  3. Client Certificate AuthenticationRead the original story

    8 hrs ago | MSDN Blogs

    SSL/TLS certificates are commonly used for both encryption and identification of the parties. In this blog post, I'll be describing Client Certificate Authentication in brief.

    Comment?

  4. How to Secure an OpenStack CloudRead the original story w/Photo

    11 hrs ago | CNet News

    Providing security in OpenStack is not as easy as simply deploying a firewall and enabling antivirus. Many additional controls need to be deployed.

    Comment?

  5. LOGJAM - Can The NSA Break 1024-bit DHM Keys?Read the original story

    Monday | I programmer

    The difference between security done right and not quite right can make what is theoretically secure into something that is practically crackable. New results demonstrate how falling back to a small encryption key can make the data readable by almost anyone with the need - this is the LOGJAM vulnerability.

    Comment?

  6. John Nash Dies In Car CrashRead the original story w/Photo

    Monday | I programmer

    ... trap-door function - easy to compute but difficult to invert. Nash's letter contains the basic ideas of modern cryptography which took

    Comment?

  7. Secrets and LiesRead the original story

    Sunday May 24 | I programmer

    ... myths that often mislead IT managers as they try to build secure systems. Schneiera 2s tutorial on just what cryptography (a subset of computer security) can and cannot do for them, has received far-reaching praise from both the technical and ...

    Comment?

  8. NOVARead the original story

    14 hrs ago | KISU-TV Pocatello

    ... the people involved in scientific pursuits. This episode goes behind the scenes of the fast-paced world of cryptography to meet the scientists battling to keep the world's data safe. It tells the story of how a new global geek squad is harnessing ...

    Comment?

  9. How to mine Bitcoin on a 55-year-old IBM 1401 mainframeRead the original story w/Photo

    17 hrs ago | Ars Technica

    ... hardware. Mining requires a task that is very difficult to perform but easy to verify. Bitcoin mining uses cryptography, with a hash function called double SHA-256. A hash takes a chunk of data as input and shrinks it down into a smaller hash value ...

    Comment?

  10. BitQuick Goes Passwordless Using Clef's Two-factor AuthenticationRead the original story w/Photo

    18 hrs ago | PRWeb

    ... Wave to seamlessly sync with the computer and log the user in. The process is backed by the same public key cryptography as Bitcoin wallets and is available for free on any iOS or Android device. About Clef Clef is an Oakland startup building the ...

    Comment?

  11. socket-gatekeeper 1.1Read the original story

    21 hrs ago | Python

    It listens on a socket and waits for a connection. Upon connection, it sends a 1024-bit RSA public key to the client.

    Comment?

  12. All-outdoor microwave delivers secure, scalable backhaul for public-safety networksRead the original story

    23 hrs ago | Mobile Radio Technology

    ... seen as the de facto method used. ) issued the FIPS 140 Publication Series to coordinate the requirements of cryptography modules and systems, including microwave systems. A full list of validated FIPS 140-2 systems, can be found at ...

    Comment?

  13. David VenableRead the original story w/Photo

    23 hrs ago | InformationWeek

    David Venable, Director of Professional Services at Masergy Communications, has over 15 years' experience in information security, with expertise in cryptography, network and application security, vulnerability assessments, penetration testing, and compliance. David is a former intelligence collector with the National Security Agency, with extensive experience in Computer Network Exploitation, Information Operations, and Digital Network Intelligence.

    Comment?

  14. NTT Docomo Takes Another Step into a Future Without PasswordsRead the original story w/Photo

    Yesterday | Wall Street Journal

    Docomo said Tuesday that it has become the first mobile network operator to join the board of directors of FIDO Alliance, a non-profit industry consortium that is trying to strengthen online security by creating password-less, interoperable standards for online authentication based on cryptography and biometric technologies. "Docomo expects to become the world's first mobile operator to integrate online services with smartphones capable of FIDO-enabled multiple biometric authentication," Docomo said in a statement.

    Comment?

  15. IBM DataPower Gateway Firmware V7.2Read the original story

    Monday | MC Press Online

    ... applications from security exposures with enhanced TLS protocol support by using Elliptic Curve Cryptography (ECC), Perfect Forward Secrecy (PFS), and Server Name Indication (SNI). Quickly build DataPower automation and deployment migration scripts ...

    Comment?

  16. Bitcoin Might Be The Next Big Thing In The Remittance MarketRead the original story w/Photo

    Monday | TechCrunch

    ... All the transactions are registered in the blockchain that is used to validate a transaction using cryptography technology: it ensures that you can't use a bitcoin you don't own or you don't use the same bitcoin more than once. This last action ...

    Comment?

  17. John Nash dead in taxi crash: 'Beautiful Mind' inspiration and wife killedRead the original story w/Photo

    Monday | Examiner.com

    ... following summary of the non-fiction flick. "After a brilliant but asocial mathematician accepts secret work in cryptography, his life takes a turn for the nightmarish." Crowe posted a tribute to John Nash on Twitter upon hearing about his passing. ...

    Comment?

  18. 'A Beautiful Mind': mathematician John Nash dies aged 86Read the original story w/Photo

    Sunday | Engadget

    ... in math and other fields extended beyond the game theory work that won him the Nobel Prize. Dr. Nash's work in cryptography was also ahead of its time: In 2011, the NSA declassified letters written by him in the 1950s, where he had anticipated many ...

    Comment?

  19. signxml 0.4.2Read the original story

    Sunday May 24 | Python

    ... components of the standard, and most recommended ones. Its features are: Note: SignXML depends on lxml and cryptography , which in turn depend on OpenSSL , LibXML , and Python tools to interface with them. On Ubuntu, you can install those with: ). ...

    Comment?

  20. John Forbes Nash, Jr.Read the original story w/Photo

    Sunday May 24 | MetaFilter

    ... ry, with which theoretical computer scientists occupy themselves with to this day, but also its applications in cryptography. These ideas are some of the building blocks of current secure communication over the Internet today.

    Comment?