Subscribe: Crypto-World - news
http://crypto-world.info/news/rss/rss.php
Added By: Feedage Forager Feedage Grade B rated
Language: Czech
Tags:
computing  crypto  cryptographic  encryption  internet  key exchange  key  law enforcement  law  quantum computing  quantum  random 
Rate this Feed
Rate this feedRate this feedRate this feedRate this feedRate this feed
Rate this feed 1 starRate this feed 2 starRate this feed 3 starRate this feed 4 starRate this feed 5 star

Comments (0)

Feed Details and Statistics Feed Statistics
Preview: Crypto-World - news

Crypto-World - news



e-zin věnovaný kryptologii a informační bezpečnosti



 



Germany´s proposed anti-cryptography bill: backdoors and hack-backs
This week, German authorities will introduce a law that will allow law enforcement agencies to order companies to insert back doors into their products to assist in law enforcement queries; the law is backed by Thomas de Maizière, Germany´s Interior Minister.

Viz také : Germany Preparing Backdoor Law.



F5 DROWNing, not waving, in crypto fail
If you're an F5 BIG-IP sysadmin, get patching: there's a bug in the company's RSA implementation that can give an attacker access to encrypted messages.



Will quantum computing break the Internet?
While the principles of quantum computing are certainly complex, at a high level, the risk from quantum computing can be understood fairly quickly. Unlike a digital computer bit, which can only be a zero or one, a quantum bit, or qubit, can be a zero, one, and everything in between – all at the same time. For those who are not quantum physicists, this can be mind-blowing, but the result is that a quantum computer can offer such a huge speed-up to solving certain problems, that some problems previously thought to be nearly impossible to solve may soon be solved.



Your Browser Could Be Mining Cryptocurrency For a Stranger
There´s something new to add to your fun mental list of invisible internet dangers. Joining classic favorites like adware and spyware comes a new, tricky threat called “cryptojacking,” which secretly uses your laptop or mobile device to mine cryptocurrency when you visit an infected site.



EU: No encryption backdoors but, eh, let´s help each other crack that crypto, oui? Ja?
The European Commission has proposed that member states help each other break into encrypted devices by sharing expertise around the bloc.

In an attempt to tackle the rise of citizens using encryption and its effects on solving crimes, the commission decided to sidestep the well-worn, and well-ridiculed, path of demanding decryption backdoors in the stuff we all use.

Instead, the plans set out in its antiterrorism measures on Wednesday take a more collegiate approach – by offering member states more support when they actually get their hands on an encrypted device.



Hacknite digitálny podpis Kaliňáka. Firma vypísala odmenu
Odmenu 1337 eur v piatok vypísala IT firma Hacktrophy za odhalenie podrobností o elektronickom podpise ministra vnútra Roberta Kaliňáka.
Urobila tak po tom, keď sám minister verejne vyzval k „hacknutiu“ svojho občianskeho preukazu s čipom, ktorý podľa oznámenia vedcov z Brna obsahuje vážne bezpečnostné riziko.

Viz také:



KRACK WPA2 protocol Wi-Fi attack: How it works and who\'s at risk
A vulnerability in the WPA2 protocol used in secured Wi-Fi networks allows hackers to force devices to install arbitrary encryption keys. Here are the details of how the attack works.






Facebook COO Sheryl Sandberg: Crypto ban won´t help trap terrorists
Facebook´s chief operating officer Sheryl Sandberg has reiterated the social network´s position that weakening the encryption of messaging apps isn´t going to give governments what they want. Governments and law enforcement agencies are increasingly going public with their frustration that encryption prevents them accessing electronic messages.



True random numbers are here — what that means for data centers
The Entropy Engine can deliver 350 Mbps of true random numbers—enough to give a data center enough random data to dramatically improve all cryptographic processes

For many decades, the term “random numbers” meant “pseudo-random numbers” to anyone who thought much about the issue and understood that computers simply were not equipped to produce anything that was truly random.

Manufacturers did what they could, grabbing some signals from the likes of mouse movement, keyboard activity, system interrupts, and packet collisions just to get a modest sampling of random data to improve the security of their cryptographic processes.
v And the bad guys worked at breaking the encryption.
We used longer keys and better algorithms.

And the bad guys kept at it. And life went on.

But something recently changed all that.



Quantum of encryption
With computing power increasing faster than ever before, it´s possible to crack previously secure encryption, and with the advent of quantum computing, that possibility gets ever closer. So now you must ask: Is your encryption good enough?



Alice and Bob: A History Of The World’s Most Famous Couple
Alice and Bob are the world’s most famous cryptographic couple. Since their invention in 1978, they have at once been called “inseparable,” and have been the subject of numerous divorces, travels, and torments. In the ensuing years, other characters have joined their cryptographic family. There´s Eve, the passive and submissive eavesdropper, Mallory the malicious attacker, and Trent, trusted by all, just to name a few.



Let´s harden Internet crypto so quantum computers can´t crack it
Draft blends asymmetric public/private key encryption and one-time pad analogs.
In case someone manages to make a general purpose quantum computer one day, a group of IETF authors have put forward a proposal to harden Internet key exchange.

While only an “informational” document at this stage, what the authors describe is how to extend Internet Key Exchange v2 (RFC 7296*, IKEv2) to support a quantum-safe key exchange.



Autorem Voynichova rukopisu psaného neznámým jazykem je Jiří III. z Lichtenštejna
Irena Hanzíková přeložila třetinu tzv. Voynichova rukopisu. Obsah ji vede k závěru, že autorem rukopisu je podle textu a s vědomím let, kdy vznikl, i z dalších indicií moravský šlechtic Jiří III. z Lichtenštejna, původem z Mikulova, tridentský biskup a římský kardinál.

Všimněte si ale pochybností (těch seriózněji formulovaných) v diskuzi k článku.



17 Security Tips for Smarter Smartphone Banking (Android)
Dobré a přehledné rady jak zabezpečit svůj Smartphone(Android)pro využívání pro internetové bankovnictví.