Skip to main content

Home/ Math 1111: Cryptography/ Group items tagged Key

Rss Feed Group items tagged

Hannah Lee

Computer Scientists Break Security Token Key in Record Time - NYTimes.com - 0 views

  •  
    A breach in supposedly secure keys given to employees by private companies vindicates previous warnings by cryptographers that companies should use more difficult keys, and that companies have not been cautious enough using such keys because of their assumed security.
nate_clause

Beefing up public-key encryption | MIT News Office - 0 views

  •  
    Interesting article on how public-key encryption is used to keep information safe during financial transactions online. The article discusses weakness in basic public-key encryption schemes and how some of these schemes have been improved.
chrisr22

The NSA Can Probably Break Tor's Encryption Keys - 0 views

  •  
    When it turned out that the Firefox JavaScript Tor vulnerability shenanigans were originating from the NSA not the FBI, it was pretty clear that the agency was looking to undermine and access Tor's anonymous internet. It's like a moth to a flame. But now security expert Robert Graham has outlined his reasons for believing that the NSA doesn't even need tricks and paltry exploits to access Tor, because they have the keys to the kingdom. Or can.
  •  
    When it turned out that the Firefox JavaScript Tor vulnerability shenanigans were originating from the NSA not the FBI, it was pretty clear that the agency was looking to undermine and access Tor's anonymous internet. It's like a moth to a flame. But now security expert Robert Graham has outlined his reasons for believing that the NSA doesn't even need tricks and paltry exploits to access Tor, because they have the keys to the kingdom. Or can.
Riley Dankovich

Meet the seven people who hold the keys to worldwide internet security | Technology | T... - 1 views

  •  
    This doesn't quite follow the guidelines of the blogging assignment, I don't think, but I found it pretty interesting, so I'll share this one too. This is basically about the people who are going to be holding the keys to the building blocks of the internet. I'm not sure I understand it completely, but it sounds fascinating!
  •  
    Excellent find! I heard about this security system when the author of this piece, James Ball, was interviewed for the "On the Media" podcast: http://www.onthemedia.org/story/so-many-keys/. Great stuff.
Derek Bruff

Lockpickers 3-D Print TSA Master Luggage Keys From Leaked Photos | WIRED - 2 views

  •  
    Print your own TSA master keys!
Derek Bruff

Sony lets slip its PlayStation 3 Master Key - oops! - PS3 - News - HEXUS.net - 0 views

  •  
    Oops.
Siegfried Schlunk

Quantum cryptography keys ride the lightning on existing fiber lines - 1 views

  •  
    Quantum computing has teased us with its potential for some time, but we won't be seeing qubits in our laptops anytime soon. However, science has also sought to leverage quantum physics in cryptography, and a recent breakthrough will allow for quantum encryption over fiber optic cables already in use.
junqing-shi

How internet encryption works - 0 views

  •  
    This is a nice intro to public-key cryptography, and a bit of the math behind the "classic" public-key algorithms.
hamzapatel123

Unbreakable encryption comes to the U.S. - 2 views

  •  
    Although it doesn't directly deal with online privacy, I thought this was really cool. It is a new form of encryption involving sending a beam of two photons with only one of them acting as a "key." It could very well be the new method of securing privacy.
nate_clause

CrypTool-Online / Ciphers / Gronsfeld - 3 views

  •  
    This outlines the gronsfeld cipher, which is a modification of the vigenere cipher. I like and find this cipher interesting because of it using numbers instead of letters, and I like cryptography which uses numbers.
  •  
    Interesting. Gronsfeld ciphers then form a subset of Vigenere ciphers. That is, there's a one-to-one correspondence between Gronsfeld ciphers and Vigenere ciphers where keywords are formed from the letters A through J.
aconn55

Visual Cryptography - 0 views

  •  
    What is Visual Cryptography Visual Cryptography is a special encryption technique to hide information in images in such a way that it can be decrypted by the human vision if the correct key image is used. The technique was proposed by Naor and Shamir in 1994. Visual Cryptography uses two transparent images.
Derek Bruff

Cotton squares off against Apple CEO | TheHill - 0 views

  •  
    Apple CEO Tim Cook was on 60 Minutes yesterday, reiterating his company's support for strong encryption. Today, Senator Tom Cotton called on Apple and other companies to install "back doors" for law enforcement agencies. I wonder if Tom Cotton has read the "Keys Under Doormats" report by Schneier, Rivest, Diffie, et al.
krschroeder9

The Importance of Understanding Encryption in Cybersecurity - 0 views

  •  
    Any sensitive information that could be accessed by hackers should be encrypted, especially when communicating over wireless networks. Make sure to keep your private key confidential.
1 - 20 of 27 Next ›
Showing 20 items per page