L33tdawg: Here we go again...
Wannabe code-crackers have a fresh challenge to rise to, if DeTron has its way. The encryption company ran a full page ad in the New York Times late last week challenging code breakers, hackers and cryptographers to crack a message encrypted by Quantum Direct Key (QDK) – a personal identification encryption technology aimed at eliminating multiple passwords for cloud services and web apps.
Bringing to a close a five-year selection process, the U.S. National Institute of Standards and Technology (NIST) has selected the successor to the encryption algorithm that is used today to secure much of the information on the Internet.
For SHA-3 (Secure Hash Algorithm), NIST has selected Keccak (pronounced "catch-ack"), an algorithm authored by Guido Bertoni, Joan Daemen and Gilles Van Assche of STMicroelectronics, as well as MichaA<
Quantum cryptography is one of those amazing tools that came along before anyone really asked for it. Somehow there are companies out there selling very high end, and "provably secure" cryptography gear, all based on fundamental principles of quantum mechanics. Yet, despite being fundamentally unbreakable, there have been quite a few publications on more-or-less practical ways for Eve to eavesdrop on people whispering quantum sweet-nothings in darkened rooms.
A group of German researchers has taken a step closer to achieving quantum key distribution with satellites, receiving quantum keys transmitted by a moving airplane.
The experiment is described in this paper (PDF) presented to the QCrypt conference in Singapore last week.
Led by Sebastian Nauerth at the Ludwig Maximilian University of Munich, the researchers achieved a stable connection over 20 Km for ten minutes, and in that time achieved a key rate of 145 bits/s. While that’s far too slow for a data channel, this only refers to the rate at which the keys are transmitted.
Security researchers Juliano Rizzo and Thai Duong – who released details of an attack on SSL/TLS last year, along with a tool called BEAST – are preparing to present a new attack on SSL/TLS at the Ekoparty Security Conference in Argentina later this month, according to Threatpost. The new attack has been given the name CRIME by the researchers.