Book Review: Security Without Obscurity

benrothke (2577567) writes Having worked at the same consulting firm and also on a project with author J.J. Stapleton (full disclosure); I knew he was a really smart guy. In Security without Obscurity: A Guide to Confidentiality, Authentication and Integrity, Stapleton shows how broad his security knowledge is to the world. When it comes to the world of encryption and cryptography, Stapleton has had his hand in a lot of different cryptographic pies. He has been part of cryptographic accreditation committees for many different standard bodies across the globe. Keep reading for the rest of Ben's review.The premise of the author and the need for the book is that the traditional information security CIA triad (confidentiality, integrity, availability) has led to the situation where authentication has to a large part gotten short shrift. This is a significant issue since much of information security is built around the need for strong and effective authentication. Without effective authentication, networks and data are at direct risk for compromise.

The topic itself is not exactly compelling (that is, unless you like to read standards such as ANSI X9.42-2003: Public Key Cryptography for the Financial Services Industry: Agreement of Symmetric Keys Using Discrete Logarithm Cryptography, ISO/IEC 9798-1:2010: Information technology Security techniques Entity authentication,etc.), so the book is more of a detailed technical reference. Those looking for a highly technical overview, interoperability guidance, and overall reference will find the book most rewarding.

For those who don't have a general background on the topic; it may be a book too deep and technical for those looking for something more in line of a CISSP preparation guide.

For those that want to know the deep underpinnings of how encryption algorithms work; they can simply read the RFC's and standards themselves. What the book brings to the table are details about how to effectively implement the standards and algorithms in the enterprise; be it in applications, policies; or the specific procedures to meet compliance and standards requirements. And that is where Stapleton's many decades of experience provide significant and inestimable value.

There are many reasons why authentication systems fail and many times it is due to interoperability issues. Stapleton details how to ensure to minimize those faults in order to achieve seamless authentication across multiple technologies and operating systems.

The 7 chapters cover a dense amount of information around the 3 core topics. The book is for the reader with a solid technical background. While it may be listed as an exploratory text, it is not like a For Dummies title.

As per its title, it covers confidentiality, authentication and integrity; in addition to other fundamental topics of non-repudiation, privacy and key management.

One of the ways Stapleton brings his broad experience to the book is in the many areas where he compares different types of cryptosystems, technologies and algorithms. This enables the reader to understand what the appropriate type of authentication is most beneficial for the specific requirement.

For example, in chapter 7, the book provides a really good comparison and summary of different cryptographic modules, including how they are linked to various standards from NIST, NSA, ANSI and ISO. It does the same for a comparison of cryptographic key strengths against various algorithms.

An interesting observation the book makes when discussing the DES encryption algorithm, is that all of the talk of the NSA placing backdoors in it are essentially false. To date, no known flaws have been found against DES, and that after being around for over 30 years, the only attack against DES is an exhaustive key attack. This type of attack is where an adversary has to try each of the possible 72 quadrillion key (256permutations as the key is 56 bits long) until the right key is discovered.

See the rest here:
Book Review: Security Without Obscurity

Watch What will happen if Assange leaves Ecuador’s Embassy… – Video


Watch What will happen if Assange leaves Ecuador #39;s Embassy...
It #39;s been two years since Julian Assange #39;s gained asylum in the Ecuadorian embassy in London. During the time of his refuge there he #39;s grown a beard, given a couple of balcony speeches, and...

By: IN THE NOW

Continue reading here:
Watch What will happen if Assange leaves Ecuador's Embassy... - Video

Assange cheers on Ecuador in World Cup

There's only one team WikiLeaks founder Julian Assange is supporting in the World Cup and it's not Australia.

Thursday marks the second anniversary of Assange entering the Ecuadorean embassy in London to seek political asylum which was granted in mid-August 2012.

It's perhaps understandable then that the Queensland-born whistleblower is backing the South American country he hopes to one day call home.

"I have been watching the World Cup although the reception in this building is quite difficult," Assange told reporters during a phone conference on Wednesday.

"Of course Ecuador undoubtedly deserves to win the World Cup (and) it also has a pretty decent team."

But with so much prestige on the line for the host nation Assange is predicting Brazil is "the most likely victor".

This time last year, Assange launched a blistering attack on the Gillard government for abandoning him.

He said Labor "bent over more than any other country in the world" to appease the US.

Twelve months on he says the election of the conservative Abbott government in September 2013 "produced no change in the situation".

"Sadly it is the state of the Australian government ... that both sides of politics have been extremely close to the United States," he said.

Read this article:
Assange cheers on Ecuador in World Cup

Peercoin

Peercoinis the first cryptocurrency to introduce a proof-of-stake and proof-of-work hybrid system. The coins are initially mined through the commonly-used proof-of-work hashing process but as the hashing difficulty increases over time, users are rewarded with coins by the proof-of-stake algorithm. Proof-of-stake block generation is based on the coins held by individuals; thus, someone holding 1% of the currency will be rewarded with 1% of all proof-of-stake coin blocks.

Block generation through proof-of-stake requires minimal energy as compared to generating hardware-intensive proof-of-work hashes. Thus as the proof-of-work blocks become less rewarding, there is a transition to using theproof-of-stake portion of the algorithm, which requiresminimal energy for generating blocks. This means that over time, the network of Peercoin will consume less energy. In addition, the hybrid system of block generation also helps to increase security. The use of proof-of-stake system raises the cost of an attack, since acquiring 51% of all existing coins is more difficult than acquiring 51% of all mining power.

Read the rest here:
Peercoin

A Plan Only Banksters Will Love WikiLeaks Reveals Trade Deal Pushing Global Financial Deregulation – Video


A Plan Only Banksters Will Love WikiLeaks Reveals Trade Deal Pushing Global Financial Deregulation
The pro-transparency group WikiLeaks has released the secret draft text for the Trade in Services Agreement, TISA, a trade agreement covering 50 countries an...

By: freespeechtv

View post:
A Plan Only Banksters Will Love WikiLeaks Reveals Trade Deal Pushing Global Financial Deregulation - Video

Julian Assange calls on U.S. to drop WikiLeaks investigation

LONDON, June 19 (UPI) --WikiLeaks founder Julian Assange called on the U.S. to end its investigation into his organization as he marks two years avoiding extradition.

"I call on [U.S. Attorney General] Eric Holder today to immediately drop the ongoing national security investigation against WikiLeaks or resign," he said on a conference call with reporters.

Assange also took a shot at President Obama for targeting individuals with the U.S. drone program.

"It must be at odds with a former professor of constitutional law to have a legacy that not only involves the construction of extrajudicial kill lists of individuals, including American citizens," he said.

As promised by Assange, WikiLeaks released the secret draft of the Trade in Services Agreement (TISA) Financial Services Annex, which covers 50 countries and 68.2 percent of world trade in services.

In addition to slamming proponents of the agreement for encouraging deregulation after the financial crisis, WikiLeaks noted that "the leaked draft also shows that the U.S. is particularly keen on boosting cross-border data flow, which would allow uninhibited exchange of personal and financial data."

London Metropolitan police officers have stood outside the embassy every day for two years, costing a reported 6 million pounds ($10.2 million).

Ecuadorian President Rafael Correa said this week that the WikiLeaks founder can stay "as long as he needs."

See the article here:
Julian Assange calls on U.S. to drop WikiLeaks investigation