2015 Dec 13, 2:34
Imagine a world where FBI director Comey talked about guns the way he talks about cryptography
2012 Jun 7, 9:12
So this is another Stuxnet by Israel/US?
The analysis reinforces theories that researchers from Kaspersky Lab, CrySyS Lab, and Symantec published almost two weeks ago. Namely, Flame could only have been developed with the backing of a
wealthy nation-state. … “It’s not a garden-variety collision attack, or just an implementation of previous MD5 collisions papers—which would be difficult enough,” Matthew Green, a professor
specializing in cryptography in the computer science department at Johns Hopkins University, told Ars. “There were mathematicians doing new science to make Flame work.”
2010 May 27, 8:53
2010 Apr 21, 6:51
Adds SHA 256 & 512 to HTTP instance digest: 'The IANA registry named "Hypertext Transfer Protocol (HTTP) Digest Algorithm Values" defines values for digest algorithms used by Instance Digests in
HTTP. Instance Digests in HTTP provide a digest, also known as a checksum or hash, of an entire representation of the current state of a resource. This document adds new values to the registry and
updates previous values.'
2010 Apr 20, 9:34 2009 Aug 14, 6:20
"This paper presents efficient off-line anonymous e-cash schemes where a user can withdraw a wallet containing coins each of which she can spend unlinkably."
2008 Oct 27, 1:39
Rubber-hose cryptanalysis is first defined by Marcus J. Ranum on Oct 15 1990: "..unless you resort to the rubber-hose technique of cryptanalysis. (in which a rubber hose is applied forcefully and
frequently to the soles of the feet until the key to the cryptosystem is discovered, a process that can take a surprisingly short time and is quite computationally inexpensive)"
2008 Oct 14, 11:14
Similar in concept to the Pirate Bay suggestion of encrypting all TCP/IP connections if both server and client support it: "Obfuscated TCP is a transport layer protocol that adds opportunistic
encryption. It's designed to hamper and detect large-scale wiretapping and corruption of TCP traffic on the Internet."
2008 Jul 10, 4:44
More on IPETEE w/ some of the politics and commentary. "The Pirate Bay has ambitious plans to bring end-to-end encryption to all network activity..."
2008 Jul 10, 4:43
"The goal is to implement IP-transport encryption in a way that is transparent both to the IP-layer (including nodes in the network path) and to the applications that benefit from the encryption."
Seems like a good idea to me.
2008 Apr 9, 2:36
History of Enigma in WW2: "One particular German code clerk continually used his girlfriend's name, Cillie, for his messages, and so these easy-to-guess indicators became known as "Cillies.""
2008 Apr 4, 9:48
I wonder if my car uses KeeLoq: "Hence, using the methods described by us, an attacker can clone a remote control from a distance and gain access to a target that is protected by the claimed to be
"highly secure" KeeLoq algorithm."
2007 Nov 15, 4:03
Colossus set to compete against modern PC in decrypting Nazi messages in promotion of museum.
2007 Nov 15, 12:27
Article on encrypted email company Hushmail giving email up to The Man. Includes interview with Hushmail CTO Brian Smith.
2007 Oct 15, 1:33
Info on a plugin for FireFox that gives GMail S/MIME support. This is a similar idea to the last but these folks have executed the idea in a different fashion.
2007 Sep 12, 1:06
As close to the Cryptonomicon as you'll be able to find. The first few chapters of a rare 17th century work on cryptography.
2007 Sep 11, 12:01
Blog post about password security. A bit of a shot at:
2007 Aug 13, 2:05
From : "Rarely do we think of mathematicians as glamorous. But during the 1980s, the rising importance of cryptography injected a certain amount of glitz into the discipline.
2007 Apr 8, 9:02
Bookmark things on delicious very privately. This is an actual tool this time that uses encryption to ensure that even delicious doesn't know what you bookmarked.
2007 Mar 19, 1:23
A site dedicated to creating a tool for leaking documents in an uncensorable fashion.