The makers of a network security device that uses quantum cryptography have an ingenious plan to gain government approval despite the absence of standards specific to the technology.
Senetas, the Australian developer of the CypherNet Cerberis encryption device, has a partnership with quantum cryptography leader id Quantique. The two companies hope to gain early accreditation for Cerberis from Australia's Defence Signals Directorate (DSD).
Call it the Harold and Kumar effect.
Now that Blu-ray has won the format war, the public and security industry will get a chance to see how well the novel encryption scheme that Blu-ray publishers and manufacturers works.
What makes the strategy somewhat novel is that is relies as much on consumer tastes and behavior as it does on technology, according to Paul Kocher, president and chief scientist of Cryptography Research, which helped devise the strategy.
An encryption code used to protect billions of credit cards, subway passes and security badges is safe no more.
A University of Virginia graduate student and two fellow hackers say they have cracked the code used for tiny chips found inside many "smartcards" with readily available equipment that cost less than $1,000.
Twenty-six-year-old Karsten Nohl and his two German partners dismantled the chip and mapped out its secret security algorithm. They ran the formula through a computer program and broke the encryption after a few hours.
A research team at Princeton University has found a method to break into an encrypted hard drive to access protected information.
The method involves freezing the DRAM or Dynamic Random Access Memory in a computer. Freezing the memory can be easily done by spraying the memory chips with the cold canned air found in duster spray. Researchers said in a report published on Thursday that doing this, allows the chip to retain data for minutes or even hours after the computer is out of power.
BitLocker, meet UnBitLocker.
Word arrives from The Electronic Frontier Foundation that a crack team of researchers - including the Foundation's own Seth Schoen - have discovered a gaping security flaw in everyday disk encryption technologies, including Microsoft's BitLocker as well as TrueCrypt, dm-crypt, and Apple's FileVault.
If a machine is screen-locked or left in sleep or hibernation mode, Schoen and his cohorts proclaim, an attacker can circumvent disk encryption simply by powering the machine down and quickly re-booting to an external hard drive.