Bookmark

Add to MyYahoo RSS

Cryptography News

News on Cryptography continually updated from thousands of sources around the net.

17 hrs ago | Slashdot

Why Is It Taking So Long To Secure Internet Routing?

CowboyRobot writes: We live in an imperfect world where routing-security incidents can still slip past deployed security defenses, and no single routing-security solution can prevent every attacks . Research suggests, however, that the combination of RPKI with prefix filtering could significantly improve routing security; both solutions are based on whitelisting techniques and can reduce the number of autonomous systems that are impacted by prefix hijacks, route leaks, and path-shortening attacks.

Comment?

Related Topix: Science, Computer Science

Yesterday | Python

pyaxo 0.3.3

The Axolotl ratchet is a protocol that provides for perfect forward secrecy in synchronous communications. It uses triple Diffie-Hellman for authentication and ECDHE for perfect forward secrecy.

Comment?

Related Topix: Science, Computer Science

Mon Sep 15, 2014

Python

django-recaptcha 1.0.2

Django reCAPTCHA ================ **Django reCAPTCHA form field/widget integration app.** .. image:: https://travis-ci.org/praekelt/django-recaptcha.svg?branch=develop :target: https://travis-ci.org/praekelt/django-recaptcha ..

Comment?

Related Topix: Python, Programming Languages, Science / Technology, Science, Computer Science

Fri Sep 12, 2014

Ars Technica

After e-mail takeover, copycats demand cash to expose Bitcoin's creator

A screenshot used as proof that an unknown person has taken control of the e-mail address of bitcoin creator Satoshi Nakamoto. Messages demanding payment in order to out details about mysterious Bitcoin creator "Satoshi Nakamoto" have proliferated in the few days since an unknown person took control of the e-mail address historically used by the reclusive cryptographer.

Comment?

Related Topix: Economics News, Bitcoin, Science, Computer Science

Python

pyaxo 0.3.2

The Axolotl ratchet is a protocol that provides for perfect forward secrecy in synchronous communications. It uses triple Diffie-Hellman for authentication and ECDHE for perfect forward secrecy.

Comment?

Related Topix: Science, Computer Science

Sys-Con Media

Adi Shamir, a Founding Father of Public-Key Cryptography, to Keynote Black Hat Europe 2014

Known as a visionary for his numerous contributions to the fields of cryptography and computer science, will provide attendees with an insider's view into his historical work as well as a look into where we are going as an industry. Returning for its 14th year, Black Hat Europe will welcome the world's brightest information security professionals and researchers to reveal vulnerabilities that impact everything from the latest mobile and consumer devices to critical international infrastructure.

Comment?

Related Topix: Science, Computer Science, Computer Security, Science / Technology, Mathematics, Inventions

Thu Sep 11, 2014

AmericanBankingNews.com

'The Imitation Game': The Enigma Is Praise For This Cumberbatch Clunker

The Imitation Game is ostensibly about how Alan Turing and a team of fellow cryptographers cracked Enigma, the German cipher that allowed the Nazis to communicate via open radio waves during WWII - though the film's other messages are so painfully obvious and insistent that they may as well be broadcast in neon lights. Benedict Cumberbatch plays Turing, the British mathematician who, in no small part through his Enigma efforts, came to be known as the father of modern computer science.

 "'The Imitation Game': The Enigma Is Praise For This Cumberbatch Clunker" is categorized as "world".

Comment?

Related Topix: Science, Computer Science

Hispanic Business

Studies from Sungkyunkwan University in the Area of Information...

Editor at Information Technology Newsweekly -- Current study results on Information Technology have been published. According to news reporting originating from , by VerticalNews correspondents, research stated, "We describe a mechanical approach to derive identity-based protocols from existing Diffie-Hellman-based ones."

Comment?

Related Topix: Science, Computer Science

Wed Sep 10, 2014

Nature

Q&A: The sci-fi optimist

Best-selling science-fiction writer Neal Stephenson's works cover everything from cryptography to Sumerian mythology. Ahead of next year's novel Seveneves , he talks about his influences, the stagnation in material technologies, and Hieroglyph , the forthcoming science-fiction anthology that he kick-started to stimulate the next generation of engineers.

Comment?

Related Topix: Science, Computer Science, Ames, IA, University of Iowa

The New Zealand Herald

So you want to hack Apple Pay?

A decade ago, a group of Johns Hopkins University grad students tried to hack one of the first commercially popular Near Field Communication payment systems - the kind of technology at the heart of Apple's new mobile payment system. It took a few thousand dollars in gear and a few months of work.

Comment?

Related Topix: Johns Hopkins University, Computer Security, Science, Computer Science, iPhone

San Diego Reader

Deniability problems

Naturally, the leaked photos of Jennifer Lawrence in the news have us all excited to see the dark side of Hollywood's most wholesome hottie, but now I wonder about online privacy. Is this an invasion of celebrities' private lives, and should I care about it at all? Also, how the heck do people manage to get pictures like that in the first place? Lawrence fell victim to "brute force" cryptanalysis, in which computers hack a security key by randomly guessing codes until they get the right one.

Comment?

Related Topix: Privacy, Science, Computer Science

Christian Science Monitor

Reader recommendation: Digital Fortress

A cryptographer working for the National Security Agency battles to save the agency, her country, herself, and the man she loves in Digital Fortress by Dan Brown. We want to hear, did we miss an angle we should have covered? Should we come back to this topic? Or just give us a rating for this story.

Comment?

Related Topix: Science, Computer Science, Celebrities, Dan Brown, Vocal

Interesting Thing of the Day

The Beale Ciphers / Yet another story of secret codes and hidden treasure

Leaving aside religious symbology and questions of historical accuracy, The Da Vinci Code is just the latest in a long line of stories that follow roughly the same plot: someone discovers a series of mysterious clues that supposedly lead to an absurdly valuable treasure. The hero undertakes a perilous adventure, outwitting villains who want to steal the treasure , and eventually succeeds - only to discover that the treasure was not quite as it had been imagined after all.

Comment?

Related Topix: Science, Computer Science, Bedford County, VA

Sys-Con Media

SPYRUS(R) WorkSafe Pro for Windows To Go Captures Editor's Choice Award From The SSDReview

The entire review can be read here . The editors wrote: "Our review of the SPYRUS WorkSafe Pro Windows To Go Secure Flash Drive marks the world's first independent report of the SPYRUS encrypted flash drive, a flash drive that would most definitely suit the likes of James Bond.

Comment?

Related Topix: Science, Computer Science

Tue Sep 09, 2014

Canberra City News

Canberra's Cogito Group lands a big Defence contract

ARN brings word that Canberra company Cogito Group has landed a big chunk of work with cryptography services for our own Department of Defence.

Comment?

Related Topix: Science, Computer Science, Science / Technology, Computer Security

ECNmag

Squeezed quantum communication

It could be difficult for the NSA to hack encrypted messages in the future - at least if a technology being investigated by scientists at the Max Planck Institute for the Science of Light in Erlangen and the University Erlangen-NA1 4rnberg will be successful: quantum cryptography. The physicists are now laying the foundation to make this technique, which can already be used for the generation of secret keys, available for a wider range of applications.

Comment?

Related Topix: World News, Germany, Computer Security, Science / Technology, Science, Computer Science, Physics

Hispanic Business

Security Innovation Launches Embedded Security Business Unit

Security Innovation, a leader in software security, announces the creation of its Embedded Security Business Unit. This business unit will combine Security Innovation's widespread embedded software security products and experts into one team, providing customers with a one-stop shop for software security consulting, services and products.

Comment?

Related Topix: Security Innovation, Science, Computer Science, Computer Security, Science / Technology, Computers

Buzzle.com

3 Types of SSL Certificates and Their Uses

An SSL certificate is a data file that uses cryptography to secure an organization's private data. In this Buzzle article, you will learn about the 3 main types of SSL certificates and their uses, along with some other special SSL certificates.

Comment?

Related Topix: Science / Technology, Computer Security, Science, Computer Science, Social Software

BetaNews

Geekbench offers redesigned and simplified results view, adds ARMv8 support

Primate Labs has updated its cross-platform, flagship benchmark tool with the release of Geekbench 3.2 for desktop and Android . Also available on iOS , the latest build's main highlight is a redesigned results page.

Comment?

Related Topix: Science / Technology, CPU, Science, Computer Science

Mon Sep 08, 2014

CIO

OpenSSL warns vendors against using vulnerability info for marketing

Security advisories for OpenSSL should not be used for competitive advantage, according to the development project behind the widely used cryptography component. The warning comes from the OpenSSL Project, which has published for the first time guidelines for how it internally handles security problems, part of an ongoing effort to strengthen the project following the Heartbleed security scare in April.

Comment?

Related Topix: Marketing, Science / Technology, Computer Security, Science, Computer Science

•••
•••
•••
•••
•••
•••