L33tdawg: Much love to Fyodor Yarochkin for the heads up on this ;)
SHA-1 has been broken. Not a reduced-round version. Not a simplified version. The real thing.
The research team of Xiaoyun Wang, Yiqun Lisa Yin, and Hongbo Yu (mostly from Shandong University in China) have been quietly circulating a paper describing their results:
Voltage Security is expected to announce on Monday that cell phone maker Siemens is putting its encryption technology to the test.
Ten corporate customers of Siemens' communications group will take part in a beta of Voltage's identity-based encryption, or IBE, toolkit, set to be unveiled Monday. The technology takes identity information--such as an e-mail address, phone number or IP address--and uses that for the public key for a cryptographic system, said Matt Pauker, company co-founder.
Researchers have discovered cryptographic vulnerabilities in the RFID technology used in high-security car keys and petrol pump payment systems. The attack against Texas Instruments DST tags used in vehicle immobilisers and ExxonMobil's SpeedPass system was identified by experts at Johns Hopkins University and RSA Laboratories.
Steve Wozniak's Wheels of Zeus is beginning to roll, and enterprise data protection is one destination on the Apple Computer Inc. co-founder's mind. Wozniak offered a peek into his vision for the company on Ziff Davis Media's Security Virtual Tradeshow, where he introduced "wOz Location-Based Encryption," an application that uses GPS tracking within a wireless hub to encrypt and decrypt sensitive data for large businesses.
Wireless networks running the open-source MeshAP will be able to handle encrypted traffic almost as fast as unencrypted
A hardware-based cryptographic technology developed by VIA Technologies could allow distributed wireless networks to transmit encrypted data much faster than before.
The VIA PadLock ACE (Advanced Cryptography Engine) runs on top of VIA's C5P Nehemia core processor. It is capable of encrypting or decrypting data at a maximum rate of 12.8 Gigabits per second, and can cope with 128-bit, 196-bit and 256-bit keys.