15 hrs ago
Cryptography: The solace of quantum
Our cookies policy has changed. Review our cookies information for more details.
17 hrs ago
One-Time Pad From Caltech Offers Uncrackable Cryptography
However, the ability to copy electronic code makes one-time pads vulnerable to hackers.
20 hrs ago
iCrypter 1.0 for iOS - Impregnable Encryption/Decryption, Military Style
ProtectStar today is pleased to introduce iCrypter 1.0 for iOS, its new utility that provides strong 256-bit encryption for incoming and outgoing messages sent via SMS, email, Facebook, Twitter, WhatsApp, or iMessage.
Wed May 22, 2013
Steganography In Ubuntu, Hide Your Files Inside An Image
Nowadays, our personal computer is not only a work tool, it is also our private space where we store our little secrets.
Liberty Students Visit Math Museum
Math came alive for some middle school students earlier this month. A total of 36 students went to the new MoMath Museum in New York City on May 10 th .
Fri May 17, 2013
Pakistan Hit By Targeted Attack Out Of India
Another reminder that cyberespionage isn't all about China targeting the U.S.: Researchers have discovered a family of information-stealing malware targeting Pakistan that appears to originate out of India.
Polluting Password Files Can Make Attacks Detectable: Researchers
By adding a large number of fake entries, or "honeywords," to the password database, researchers believe they can better detect attacks.
Wed May 15, 2013
Ephemeral: Encrypted Temporary Files ======== Ephemeral is a library that adds an encryption layer on top of python's standard ```tempfile``` module.
Tue May 14, 2013
A Polynomial Time Version of LLL With Deep Insertions
To insert individual citation into a bibliography in a word-processor, select your preferred citation style below and drag-and-drop it into the document.
New SPYRUS Patents Transparently Upgrade Legacy Security Solutions...
SPYRUS, Inc. announced today that Israeli patent 198362, "Method and System for Deploying Advanced Cryptographic Algorithms," has been issued to the company.
Should We Abandon Digital Certificates, Or Learn to Use Them Effectively?
A frightening trend is observable in the advance of targeted attacks. That is the realization on the part of attackers of the value of credentials; be they username password pairs, strong authentication tokens, or digital certificates.
Mon May 13, 2013
The Code Project
OTP (One Time Password) Demystified - Part 1
At the beginning of 2004, I was working with a small team of Gemplus on the EAP-SIM authentication protocol.
Dear hacker: Please help us eavesdrop on our customers
Mobily, a Saudi Arabian telecommunications company with 4.8 million subscribers, is working on a way to intercept encrypted data sent over the Internet by Twitter, Viber, and other mobile apps, a security researcher said Monday.
Startup Gridcom uses photons and quantum physics for smart grid security
Can quantum computing be the key to a much safer power grid? A California startup, GridCOM, plans to show just how quantum encryption could be a nearly fail-proof shield against cybersecurity breaches.
Say a final goodbye to SHA-1
Due to recent attacks on the SHA-1 hash function specified in FIPS 180-2, Secure Hash Standard, NIST is initiating an effort to develop one or more additional hash algorithms through a public competition, similar to the development process for the Advanced Encryption Standard .
When we say zero-knowledge we mean it
A true zero-knowledge web application knows nothing about its users and their data.
Sun May 12, 2013
Do We Even Have Strong Cryptography For Civilians Any More?
I don't know enough math, enough about crypto, or enough about the intersections between the two to make the judgement as to whether what this machine does has anything to do with cracking strong cryptographic systems.
The New Zealand Herald
Finance sleuths to speak on forensic accounting
The chief executive of Kim Dotcom's latest start-up, the boss of the Financial Markets Authority, a former police detective and a Buddhist nun are the among the speakers at a fraud and forensic accounting conference beginning in Auckland today.
Sat May 11, 2013
The Code Project
Counting how many times a letter appears in a string
This Tip doesn't invent anything new, brilliant or fancy. It just describes a little helper tool I wrote to learn a bit about the Caesar cipher , which I was told to get in touch with by my teacher.
NCP Virtual Private Network Client Supports Android BYOD Security
The NCP VPN Client for Android 4.x is a full-function virtual private network client.