Security News

Mozilla fixes critical bug in cross-platform cryptography library
2021-12-01 17:39

NSS can be used to develop security-enabled client and server apps with support for SSL v3, TLS, PKCS #5, PKCS #7, PKCS #11, PKCS #12, S/MIME, X.509 v3 certificates, and various other security standards. "Applications using NSS for handling signatures encoded within CMS, S/MIME, PKCS #7, or PKCS #12 are likely to be impacted," Mozilla said in a security advisory issued today.

“Crypto” Means “Cryptography,” not “Cryptocurrency”
2021-11-22 14:40

I have long been annoyed that the word “crypto” has been co-opted by the blockchain people, and no longer refers to “cryptography.” I’m not the only one.

Enhancing cloud security with a two-step cryptography technique
2021-07-01 04:00

While there are many different encryption techniques, none are completely secure, and the search continues for new technologies that can counter the rising threats to data privacy and security. In a recent study published in KeAi's International Journal of Intelligent Networks, a team of researchers from India and Yemen describe a novel, two-step cryptography technique - the first to combine genetic technology with mathematical technique.

Qrypt Cloud Entropy Portal secures cryptography through the cloud
2021-06-10 02:00

Qrypt announced the launch of its Cloud Entropy Portal. The Cloud Entropy Portal democratizes the availability of quantum safe random numbers for any application, especially cryptographic key generation.

Cryptography whizz Phil Zimmermann looks back at 30 years of Pretty Good Privacy
2021-06-08 17:01

Encryption and verification package Pretty Good Privacy has celebrated a troubled 30 years of securing secrets and giving cypherpunks an excuse to meet in person, with original developer and security specialist Phil Zimmermann toasting a world where encryption is common but, he warns, still under threat. Following the end of the criminal investigation into Zimmermann, the PGP team set up PGP Inc. which was quickly gobbled up by security specialist Network Associates Inc. in 1997.

Reimagining enterprise cryptography: How to regain control in a fragmented environment
2021-06-03 05:40

From siloed to unified key management: Legacy key protection and management was comprised of different solutions for different environments and business problems. From disparate to integrated key management and key protection: Legacy key protection provides only basic management and dedicated key management solutions are often not integrated with key protection.

South Korea plans large scale quantum cryptography adoption, thanks in part to tech partnership with USA
2021-05-25 08:33

The Republic of Korea took two bold steps into the future on Tuesday, by announcing that the last of its 2G networks will go offline in June and that it will initiate large-scale adoption of communications protected by quantum encryption. The quantum tests will build on demos conducted in 2020, but this time South Korea's government hopes to involve multiple industries and to educate them on the benefits of the tech and how to adopt it.

Newly Declassified NSA Document on Cryptography in the 1970s
2021-05-10 11:21

From the dates and the title, the George Davida patent application which NSA unsuccesfully tried to block would have been US4202051A, for a key stream generator based on a LFSR combined with a non-linear feedback circuit. "In April 1978 a patent application made by Carl Nicolai for a speech scrambling device was evaluated by the NSA using Inman's new criteria. Once again, there was disagreement between NSA directorates. Neither Research and Engineering nor COMSEC believed that Nicolai's invention should be classified. Howard Rosenblum, DDC, noted that Nicolai employed"a sophisticated use of well-known, open-source techniques" of spread spectrum technology and that "so many unclassified spread spectrum systems are already in the public domain that it is too late to try to close the door by imposing secrecy orders based solely on the fact that the system uses spread spectrum techniques.

When cryptography attacks – how TLS helps malware hide in plain sight
2021-04-21 18:33

Ten years ago, even the biggest and most popular online services in the world, such as Facebook, Gmail and Hotmail didn't use TLS all the time - it was thought to be too complicated, too slow, and not always necessary. These days we expect our web browsing to be protected by TLS all the time.

PQShield appoints Ben Marshall as a Cryptography Engineer
2021-04-08 23:00

PQShield announces that it is further strengthening its cryptographic hardware team with the appointment of Ben Marshall, the editor and main author of the RISC-V "K" Cryptography Extension, as a Cryptography Engineer. Ben will continue to contribute to RISC-V International's cryptography standardisation efforts while also working on PQShield's post-quantum hardware architecture.