A pair of Japanese researchers have developed an improvement on an existing technique for attacking wireless LAN traffic that enables them to intercept and decrypt encrypted packets in about a minute, significantly lowering the barrier to entry for attackers looking to listen in on supposedly private connections.
Browsing Category: Cryptography
Martin Hellman, the co-inventor of public key cryptography, uses his background in security and cryptography to bring insights to two seemingly unrelated issues: nuclear weapons and soaring.
This Google Tech Talk features researcher Nate Lawson discussing recent vulnerabilities in crypto libraries, why public key cryptography is like a Ford Pinto in a demolition derby and the password-hashing mess created by Web 2.0 sites.
[img_assist|nid=8327|title=|desc=|link=none|align=right|width=100|height=100]Dennis Fisher talks with researcher Moxie Marlinspike about the innovative research on attacking the inherent weaknesses in the SSL infrastructure that he presented at Black Hat, and the tools he has released to demonstrate the attacks, SSLSniff and SSLStrip.
Dennis Fisher talks with Joe Grand of Grand Idea Studio about the design for this year’s DEFCON badge, the secret feature he added that no one has uncovered yet and his research on hacking smart parking meters.
The cryptographic underpinnings of the Internet are beginning to show some serious wear, and the outlook for better days ahead is not particularly rosy. In just the last week there has been news of major new attacks on perhaps the two most widely used encryption technologies: SSL and AES. We’ve heard talk of cracks in both protocols before, but this time, even the most conservative observers are worried.
From Network World (Michael Cooney)
Researchers at IBM have developed software that uses optical character recognition and screen scraping to identify and cover up confidential data.
According to IBM the driving idea behind the MAGEN (Masking Gateway for Enterprises) system is to prevent data leakage and allow the sharing of data while safeguarding sensitive business data. Read the full story [Network World].
It’s been quite a week in the world of cryptography. For a field in which advancements are measured in the smallest of terms and major breakthroughs can take decades, the three big news stories involving cryptography in the last few days comprise an epochal event.
Dennis Fisher talks with Jon Callas, CTO of PGP, about the history of cryptography, the evolution of PGP itself and the future of cloud security.
Dennis Fisher talks with Nate Lawson of Root Labs about the proliferation of crypto flaws in Web applications and the market for hardware security bugs.