Bookmark

Add to MyYahoo RSS

Cryptography News

News on Cryptography continually updated from thousands of sources around the net.

11 hrs ago | Pam's House Blend

Congressman Grayson Requests Answers on NSA's Weakening of Encryption Standards

Democratic congressman Alan Grayson, who serves on the Science, Space, and Technology Committee in the US House of Representatives, has written a letter to Director of National Intelligence James Clapper.

Comment?

Related Topix: James R. Clapper, National Institute of Standards and Technology, Science, Computer Science, Computer Security, Science / Technology

22 hrs ago | The Code Project

Crypt Library Demo

In simple terms, cryptography is the application of selected processes for encoding data so that the information can be stored and transmitted securely.

Comment?

Related Topix: Computer Security, Science, Computer Science

Sat Jul 26, 2014

Examiner.com

Barrington Stage's 'Breaking the Code' tells little-known story of WWII genius

Just over six months after he was posthumously pardoned by Queen Elizabeth II, Alan Turing , the cryptologist who led Britain's successful efforts to crack the German's Enigma code during World War II, turns up on the Mainstage of the Barrington Stage Company in the person of actor Mark H. Dold , who gives a remarkable and memorable performance as ... (more)

Comment?

Related Topix: Science, Computer Science, Europe, World News, United Kingdom

CIO

Mystery 'Onion/Critroni' Ransom Trojan Evolves to Use More Sophisticated

Kaspersky Lab has added more detail on the fiendish 'Onion' ransom Trojan that uses the Tor anonymity service to hide its command and control as well as displaying a level of thoughtfulness about its encryption design that bodes ill for future attacks.

Comment?

Related Topix: Science, Computer Science

Thu Jul 24, 2014

CiteULike

Lightweight Diffusion Layer from the $k^th$ root of the MDS Matrix

The Maximum Distance Separable mapping, used in cryptography deploys complex Galois field multiplications, which consume lots of area in hardware, making it a costly primitive for lightweight cryptography.

Comment?

Related Topix: Science / Technology, Computer Security, Science, Computer Science

TechTarget

Heartbleed security bug offers lessons in incident response

Perhaps the biggest security bug of this generation, Heartbleed offers a number of lessons for improving incident response.

Comment?

Related Topix: Science / Technology, Computer Security, Science, Computer Science

CiteULike

Comparative Evaluation of Elliptic Curve Cryptography Based...

In this paper, we focus on Elliptic Curve Cryptography based approach for Secure Multiparty Computation problem.

Comment?

Related Topix: Science / Technology, Computer Security, Science, Computer Science

Hispanic Business

Patent Issued for Systems and Methods for Creating a Form for...

Cryptography relies on the existence of codes that are 'hard to break': that is, one-way functions that are believed to be computationally infeasible to invert.

Comment?

Related Topix: Inventions, Science, Computer Science, Computer Security

Wed Jul 23, 2014

Freshnews

Case Study from Intel Showcases Collaboration with Virginia Tech

A document from Intel highlights a successful, ongoing effort at Virginia Polytechnic Institute and State University .

Comment?

Related Topix: Core Security Technologies, Computer Security, Science / Technology, Science, Computer Science, Computers

Linux Today

The world's most secure OS may have a serious problem

The Tails operating system is one of the most trusted platforms in cryptography, favored by Edward Snowden and booted up more than 11,000 times per day in May. But according to the security firm Exodus Intelligence , the program may not be as secure as many thought.

Comment?

Related Topix: Science / Technology, Computer Security, Science, Computer Science

Softpedia

TES - Text Encrypter 1.0.0.0

Encryption ensures file and data privacy, as it makes them inaccessible to others that do not have the proper password or cypher used for decryption.

Comment?

Related Topix: Privacy, Science, Computer Science

Tue Jul 22, 2014

BBC News

UK 'still exporting arms' to Russia

Britain is exporting millions of pounds worth of arms and other dual-use military equipment to Russia despite concerns Moscow is arming separatist rebels in Ukraine, MPs have warned.

Comment?

Related Topix: Science, Computer Science

BroadwayWorld.com

Elevation Pictures' the Imitation Game & Nightcrawler to Premiere at 2014 Tiff

Canadian distributor Elevation Pictures is pleased to be a part of the premiere lineup, today announced at the Toronto International Film Festival press conference.

Comment?

Related Topix: Benedict Cumberbatch, Science, Computer Science

NixCraft

Secure Password Hashing for Python Developers

There have been many high profile incidents where a security breach resulted in hackers obtaining database dumps of user passwords.

Comment?

Related Topix: Science / Technology, Computer Security, Science, Computer Science

Bit-tech.net

Tor-busting techniques pulled from Black Hat schedule

A talk on methods of de-anonymising Tor traffic has been cancelled by the legal department of the researcher's employer, for reasons yet unknown.

Comment?

Related Topix: Science, Computer Science

Mon Jul 21, 2014

Ask MetaFilter

Fictional characters to arrange key exchange over unsecure channel?

I'm presenting a cryptography demonstration to a small group of nerdy teenagers soon.

Comment?

Related Topix: Science, Computer Science, Family, Teenagers

Not Even Wrong

The NSA, NIST and the AMS

Among the many disturbing aspects of the behavior of the NSA revealed by the Snowden documents, the most controversial one directly relevant to mathematicians was the story of the NSA's involvement in a flawed NIST cryptography standard .

Comment?

Related Topix: Science, Computer Science, Science / Technology, Computer Security, Mathematics

CIO

Stealthy ransomware 'Critroni' uses Tor, could replace Cryptolocker

Cybercriminals are spreading a new file-encrypting ransomware program that's more powerful and resilient than Cryptolocker, a threat recently shut down by the U.S. Department of Justice.

Comment?

Related Topix: US News, Economics News, Bitcoin, Science, Computer Science, Computer Security, Science / Technology

InfoWorld

Net neutrality a key battleground in growing fight over encryption, activists say

Plans to favor some Internet packets over others threaten consumers' hard-won right to use encryption, a digital privacy advocate says.

Comment?

Related Topix: Computer Security, Science / Technology, Science, Computer Science, Internet Service Providers

ComingSoon.net

The Trailer for The Imitation Game, Starring Benedict Cumberbatch

The Weinstein Company has revealed the trailer for The Imitation Game , opening in theaters on November 21 and starring Benedict Cumberbatch, Keira Knightley, Matthew Goode, Mark Strong, Rory Kinnear, Charles Dance, Allen Leech and Matthew Beard.

Comment?

Related Topix: Science, Computer Science, Movies, Entertainment

•••
•••
•••
•••
•••
•••
•••