Security News

Syndikovat obsah
e-zin věnovaný kryptologii a informační bezpečnosti
Aktualizace: 6 min 40 sek zpět

Některé převodové tabulky pro agenturní systémy z doby studené války

6 min 40 sek zpět
Různé verze tabulky DEIN STAR, které byly používány agenty BND v NDR do roku 1989 lze vyhledat na tomto zajímavém webu.
Kategorie: Aktuality

A deep dive into blockchain and Bitcoin

6 min 40 sek zpět
In (In)secure Magazine Issue 27, March 2018.

Blockchain technology promises to solve many complex problems across different business sectors and industries, and Bitcoin is breaking value records seemingly every hour. But many don’t understand how the two really work, and use the two words interchangeably as if they were synonymous.
One important thing to remember is that blockchain can exist without Bitcoin, but Bitcoin cannot exist without a blockchain.
Bitcoin is a digital currency that was created in 2009. Only 21 million Bitcoins can ever be created (mined), and it is estimated that the last coin will be produced in 2140.
It is exchanged on a decentralized, peer-to-peer network, meaning that there is no central server or authority (i.e., a central bank) that regulates it. In the beginning, the Bitcoin network was operated by volunteers who had a full Bitcoin protocol stack installed on their private computers. However, the network’s operation has mostly been taken over by specialized data centers.
Bitcoin operates on a cryptographic protocol, is fully transparent and open source. As it’s not backed by a real authority, the health of the system depends entirely on the trust people have in it. The value of Bitcoin is determined by the amount people are willing to pay for it.
Kategorie: Aktuality

Google expands work in quantum computing with 72-qubit Bristlecone processor

6 min 40 sek zpět
Google has announced the release of the 72-qubit square array Bristlecone quantum processor, which the company believes is adequate to demonstrate quantum supremacy.

Bristlecone is the evolution of Google´s prior 9-qubit linear quantum processor, which had error rates of 1% for readout, 0.1% for single-qubit gates, and 0.6% for two-qubit gates.
Kategorie: Aktuality

Crypto-gurus: Which idiots told the FBI that Feds-only backdoors in encryption are possible?

6 min 40 sek zpět
Four cryptography experts have backed a US Senator´s campaign to force the FBI to explain how exactly a Feds-only backdoor can be added to strong and secure encryption.

The four are: Stanford professor Martin Hellman, of Diffie-Hellman fame and who helped invent the foundations of today´s crypto systems; Columbia professor and USENET co-creator Steve Bellovin; top cryptographer Paul Kocher; and information security guru Bruce Schneier.

All four this week signed a letter (link in article) to Senator Ron Wyden (D-OR) applauding his "effort to find out with whom the bureau has been consulting and which cryptographic experts believe an exceptional access system can be built securely."
Kategorie: Aktuality

Report finds little being done about security threat posed by quantum computing

6 min 40 sek zpět
A report, conducted by the Quantum Safe Security Working Group (QSS WG) within the Cloud Security Alliance (CSA), looks to assess the overall awareness and understanding of quantum security risk and is part of the group's larger effort to develop a future framework for addressing quantum computing threats.
Kategorie: Aktuality

18 Cryptography Attacks to Watch Out For

6 min 40 sek zpět
Cryptanalysis is the study of ciphertext, ciphers and cryptosystems with the aim of understanding how they work and finding and improving techniques for defeating or weakening them. For example, cryptanalysts seek to decrypt ciphertexts without knowledge of the plaintext source, encryption key or the algorithm used to encrypt it; cryptanalysts also target secure hashing, digital signatures and other cryptographic algorithms.
Kategorie: Aktuality

Cryptographic Hashes: What They Are, and Why You Should be Friends

6 min 40 sek zpět
Description of cryptographic hashes and practical examples of how to calculate them.
Kategorie: Aktuality

Did Codebreakers Crack This Mysterious Medieval Manuscript?

6 min 40 sek zpět
The 600-year-old Voynich Manuscript is one of the biggest mysteries in cryptology. Scientists are using AI to try to read it.

A pair of Canadian codebreakers may have deciphered a 600-year-old book that has been baffling cryptologists for centuries. But, more likely, they probably haven't.

In a study published in the journal Transactions of the Association of Computational Linguistics, computing scientists from the University of Alberta used an algorithm to try to decode parts of the Voynich Manuscript, a medieval book written in an undecipherable code with an unknown language.

But other scholars are skeptical, and the manuscript remains a document very much shrouded in mystery.
Kategorie: Aktuality

The Ransomware Survival Handbook

6 min 40 sek zpět
When a ransomware infection spreads through your network, its goal is to encrypt any files it can access (even backups) as quickly as possible. That can happen in a matter of minutes or even seconds. And from there, the clock starts ticking. Because everyone is expecting you to get things back up and running.

Read The Ransomware Survival Handbook and learn how to recover quickly and effectively (and not get hit again).
Kategorie: Aktuality

Authentication today: Moving beyond passwords

6 min 40 sek zpět
A new global study from IBM Security examining consumer perspectives around digital identity and authentication, found that people now prioritize security over convenience when logging into applications and devices.
Kategorie: Aktuality

What cryptographic key generation needs is a good source of entropy

6 min 40 sek zpět
… algorithms, we know, are not always correctly implemented …
Kategorie: Aktuality

What is SSL/TLS? (And why it’s time to upgrade to TLS 1.3)

6 min 40 sek zpět
The TLS protocol encrypts internet traffic of all types, making secure internet communication (and therefore internet commerce) possible. Here are the basics of how it works and what comes next.
Kategorie: Aktuality

Skype users are finally getting end-to-end encryption

6 min 40 sek zpět
The move was announced on Thursday by Open Whisper Systems, the software organization behind the open source Signal Protocol, which has been implemented by Microsoft to offer the feature.

The option, named Private Conversations, is currently being tested by Skype Insiders and has some temporary limitations.
Kategorie: Aktuality

Germany´s proposed anti-cryptography bill: backdoors and hack-backs

6 min 40 sek zpět
This week, German authorities will introduce a law that will allow law enforcement agencies to order companies to insert back doors into their products to assist in law enforcement queries; the law is backed by Thomas de Maizière, Germany´s Interior Minister.

Viz také : Germany Preparing Backdoor Law.
Kategorie: Aktuality

F5 DROWNing, not waving, in crypto fail

6 min 40 sek zpět
If you're an F5 BIG-IP sysadmin, get patching: there's a bug in the company's RSA implementation that can give an attacker access to encrypted messages.
Kategorie: Aktuality