News on Cryptography continually updated from thousands of sources around the net.
17 hrs ago | Slashdot
CowboyRobot writes: We live in an imperfect world where routing-security incidents can still slip past deployed security defenses, and no single routing-security solution can prevent every attacks . Research suggests, however, that the combination of RPKI with prefix filtering could significantly improve routing security; both solutions are based on whitelisting techniques and can reduce the number of autonomous systems that are impacted by prefix hijacks, route leaks, and path-shortening attacks.
A screenshot used as proof that an unknown person has taken control of the e-mail address of bitcoin creator Satoshi Nakamoto. Messages demanding payment in order to out details about mysterious Bitcoin creator "Satoshi Nakamoto" have proliferated in the few days since an unknown person took control of the e-mail address historically used by the reclusive cryptographer.
The Axolotl ratchet is a protocol that provides for perfect forward secrecy in synchronous communications. It uses triple Diffie-Hellman for authentication and ECDHE for perfect forward secrecy.
The Imitation Game is ostensibly about how Alan Turing and a team of fellow cryptographers cracked Enigma, the German cipher that allowed the Nazis to communicate via open radio waves during WWII - though the film's other messages are so painfully obvious and insistent that they may as well be broadcast in neon lights. Benedict Cumberbatch plays Turing, the British mathematician who, in no small part through his Enigma efforts, came to be known as the father of modern computer science.
"'The Imitation Game': The Enigma Is Praise For This Cumberbatch Clunker" is categorized as "world".
Best-selling science-fiction writer Neal Stephenson's works cover everything from cryptography to Sumerian mythology. Ahead of next year's novel Seveneves , he talks about his influences, the stagnation in material technologies, and Hieroglyph , the forthcoming science-fiction anthology that he kick-started to stimulate the next generation of engineers.
A decade ago, a group of Johns Hopkins University grad students tried to hack one of the first commercially popular Near Field Communication payment systems - the kind of technology at the heart of Apple's new mobile payment system. It took a few thousand dollars in gear and a few months of work.
Naturally, the leaked photos of Jennifer Lawrence in the news have us all excited to see the dark side of Hollywood's most wholesome hottie, but now I wonder about online privacy. Is this an invasion of celebrities' private lives, and should I care about it at all? Also, how the heck do people manage to get pictures like that in the first place? Lawrence fell victim to "brute force" cryptanalysis, in which computers hack a security key by randomly guessing codes until they get the right one.
A cryptographer working for the National Security Agency battles to save the agency, her country, herself, and the man she loves in Digital Fortress by Dan Brown. We want to hear, did we miss an angle we should have covered? Should we come back to this topic? Or just give us a rating for this story.
Leaving aside religious symbology and questions of historical accuracy, The Da Vinci Code is just the latest in a long line of stories that follow roughly the same plot: someone discovers a series of mysterious clues that supposedly lead to an absurdly valuable treasure. The hero undertakes a perilous adventure, outwitting villains who want to steal the treasure , and eventually succeeds - only to discover that the treasure was not quite as it had been imagined after all.
ARN brings word that Canberra company Cogito Group has landed a big chunk of work with cryptography services for our own Department of Defence.
It could be difficult for the NSA to hack encrypted messages in the future - at least if a technology being investigated by scientists at the Max Planck Institute for the Science of Light in Erlangen and the University Erlangen-NA1 4rnberg will be successful: quantum cryptography. The physicists are now laying the foundation to make this technique, which can already be used for the generation of secret keys, available for a wider range of applications.
Security Innovation, a leader in software security, announces the creation of its Embedded Security Business Unit. This business unit will combine Security Innovation's widespread embedded software security products and experts into one team, providing customers with a one-stop shop for software security consulting, services and products.
An SSL certificate is a data file that uses cryptography to secure an organization's private data. In this Buzzle article, you will learn about the 3 main types of SSL certificates and their uses, along with some other special SSL certificates.
Updated: Tue Sep 16, 2014 06:30 pm
Copyright © 2014 Topix LLC