Skip to main content

Encryption

First Quantum Cryptography Exploit Confirmed

posted onJune 19, 2011
by l33tdawg

While in principle unbreakable, quantum cryptography is known to have weaknesses in practice. One shortcoming has now been graphically illustrated by physicists in Singapore and Norway, who have been able to copy a secret quantum key without revealing their presence to either sender or receiver. The researchers are now working to remove the loophole they have exposed.

DSD tells agencies to replace RSA tokens

posted onJune 10, 2011
by l33tdawg
Credit:

The Federal Government's peak security agency has recommended that departments and agencies accept the offer by troubled security vendor RSA to replace copies of its SecurID key fob identification tokens.

The SecurID platform sees small devices commonly known as "key fobs" distributed to staff and customers of major organisations, who then use the randomised codes created by the fobs to authenticate their credentials when they log in to sensitive systems such as internet banking platforms or government system.

Certigna publishes SSL private key by mistake

posted onJune 9, 2011
by l33tdawg

A French provider of SSL certificates appears to have made a bit of a boo-boo in its webserver configuration: publishing its private key for the world to see, and opening up a potentially serious security hole in the world's web browsers.

SSL certificates serve two purposes on the Internet: to encrypt information, and to verify a webserver's identity. An SSL certificate is what is used to keep the password you log in to your Internet banking site private, and also serves to ensure that you're genuinely logging in to the bank's own server.

Encryption firm GCrypt hopes to reap benefit

posted onJune 9, 2011
by l33tdawg

 WE'RE living in a world where sharing is fun, but that isn't necessarily the case if you're a business. So for times when hurling your data into everyone’s bedroom isn’t going to please the boss, there's always the option of encryption.

Jesmond-based GCrypt is a specialist in document and email transfer, encrypting data such as payslips and invoices and transferring it. However, it’s now also applying its talents to technology which has caught the eye of the UK government.

Russian hacker claims he cracked Skype protocol

posted onJune 3, 2011
by l33tdawg

Russian hacker Efim Bushmanov has claimed that he has reverse-engineered the well-protected source code of the popular Skype software application that allows users to make voice and video calls over the Internet.

"My aim is to make Skype open source. And find friends who can spend many hours for completely reverse it," Bushmanov wrote in his blog. Bushmanov is using a recently created Blogspot account in Google to publish the results of his "research."

Nikon's image authentication algorithm cracked

posted onApril 28, 2011
by hitbsecnews

Researchers have discovered a flaw in the system used by Nikon professional digital cameras to ensure images have not been tampered with.

Normally, in high-end SLR digital cameras a unique and encrypted signing key is appended to an image when it is taken, which is verified in Nikon's case by its proprietary Image Authentication System. If an image is edited this key will be overwritten, an action that will be picked up by the software.