Skip to main content

Encryption

PGP Launches Encryption Product for iOS

posted onMay 5, 2009
by hitbsecnews

PGP last week announced PGP Command Line for IBM Power Systems, a newly named version of its encryption software designed specifically for IBM i (i5/OS) environments. The product replaces a previous product that ran in the System i server's Linux environment.

Quantum cryptography breakthrough

posted onMay 3, 2009
by hitbsecnews

AUSTRIAN physicists say a breakthrough in next-generation quantum cryptography could allow encrypted messages to be bounced off satellites, the British journal Nature reported on Sunday.

A team from Austria's Institute for Quantum Optics and Quantum Information (IQOQI) managed to send entangled photons 144km between the Spanish islands of Las Palmas and the Balearics.

The Facts about Brute Force Search of DES Keyspace

posted onApril 12, 2009
by hitbsecnews

Ok, please calm down. Most of you here might haven’t hear about “Brute Force Search of DES Keyspace” before. For those that want to know more about it, then you should stick with us…

For your information, there is a machine named “DES cracker”, where it’s built by the Electronic Frontier Foundation (EFF). The main purpose of this stuff is to perform a brute force search of DES keyspace.

How to recover EFS-encrypted data when it gets lost

posted onApril 8, 2009
by hitbsecnews

The Encrypting File System (EFS) was first introduced in Windows 2000 and, as Microsoft claims, is an excellent encryption system with no back door. However, the most secure encryption can be ambiguous. It would efficiently prevent hackers and other illegal intruders from breaking into your system and getting access to your well-encrypted data. The other side of the coin is that both a regular user and a seasoned administrator can lose important data due to unforeseen circumstances. It is also the case with EFS.

Guidelines on unsafe cryptographic algorithms

posted onMarch 18, 2009
by hitbsecnews

Experts in the security community have indicted many commonly used cryptographic algorithms as insecure. Bases for these claims of insecurity often include advances in cryptographic research that have demonstrated previously unknown weakness in algorithms and advances in the computational power of readily available hardware.

The right way to handle encryption with Firefox 3

posted onMarch 12, 2009
by hitbsecnews

Secure data transmission on the internet relies on encryption and security certificates. Mozilla has revised the way Firefox 3 handles certificates, but not always for the better. A few modifications will sort things out – and give you more security.

All sorts of information – even critical stuff like passwords and account information – is commonly sent over a connection in the clear, but if you want to keep eavesdroppers at bay, you have to use encryption. Encrypted web sites can be recognised by the "https" ("s" for "secure") instead of "http" in the URL.

Use of PGP by UK MPs is "not recommended"

posted onMarch 5, 2009
by hitbsecnews

A written question asking if MPs could install PGP (Pretty Good Privacy) encryption on their computers in the Houses Of Parliament has received an unhelpful answer from the House authorities.

SHA-3 Round 1: Buffer Overflows

posted onFebruary 23, 2009
by hitbsecnews

NIST is currently holding a competition to choose a design for the SHA-3 algorithm (Bruce Schneier has a good description of secure hashing algorithms and why this is important). The reference implementations of a few of the contestants have bugs in them that could cause crashes, performance problems, or security problems if they are used in their current state. Based on our bug reports, some of those bugs have already been fixed. Here's the full story:

Encryption top IT security initiative in 2009

posted onFebruary 16, 2009
by hitbsecnews

IT security budgets are increasing in 2009 to consume 12.6% of the entire IT operating budget, up from 11.7% in 2008, according to Forrester Research's survey of 942 IT and security managers in North America and Europe.

Full disk encryption not a quick and easy fix

posted onFebruary 12, 2009
by hitbsecnews

Full disk encryption (FDE) is tipped to be the top security technology for IT departments in 2009, but it may not offer a quick and easy fix. IT user organisations and security experts warn that while encryption could keep auditors, regulators and other stakeholders happy, IT departments should not rush into it.

The biggest benefit of FDE is that it makes it unnecessaryfor organisations to separate their sensitive data from their non-sensitive data andit offers protection against all but the most sophisticated hackers.