Key (cryptography)
In cryptography, a key is a piece of information (a parameter) that determines the functional output of a cryptographic algorithm or cipher. Without a key, t...
By: Audiopedia
Excerpt from:
Key (cryptography) - Video
Key (cryptography)
In cryptography, a key is a piece of information (a parameter) that determines the functional output of a cryptographic algorithm or cipher. Without a key, t...
By: Audiopedia
Excerpt from:
Key (cryptography) - Video
#5 computer security techniques, continued + cryptography primitives
surveillance - choke point - need to know - don #39;t do crypto yourself Cryptographic primitives - hash functions and their basic properties - pseudo-random n...
By: ralienpp
Go here to see the original:
#5 computer security techniques, continued + cryptography primitives - Video
Remote control for virtualized desktops
While the application of quantum computers to cracking cryptography is still, for now, a futuristic scenario, crypto researchers are already taking that future seriously.
It came as a surprise to Vulture South to find that in October of this year, researchers at GCHQ's information security arm the CESG abandoned work on a security primitive because they discovered a quantum attack against it.
Presented to the ETSI here, with the full paper here, the documents outline the birth and death of a primitive the CESG called Soliloquy.
Primitives are building blocks in the dizzyingly-complex business of assembling a cryptosystem: individual modules that are expected to be very well-characterised before they're accepted into security standards (and, in the case of crypto like RC4, dropped when they're no longer safe).
Given that improving computer power is one of the ways a primitive can be broken, there's a constant background research effort into both creating the primitives of the future, and testing them before they're adopted and that's where Soliloquy comes in.
As the CESG paper states, Soliloquy was first proposed in 2007 as a cyclic-lattice key exchange primitive supporting between 3,000 and 10,000 bits for the public key. Between 2010 and 2013 presumably as part of their effort to case-harden the primitive before releasing it into the wild the boffins (Peter Campbell, Michael Groves and Dan Shepherd) developed what they call a reasonably efficient quantum attack on the primitive, and as a result, they cancelled the project.
The quantum algorithm they describe would work by creating a quantum fingerprint of the lattice Soliloquy creates; discreteise and bound the control space needed; and run a quantum Fourier transform over that control space, iteratively to get lots of samples approximating the lattice.
That's where the quantum attack is complete: after that, the samples would get fed into a classical lattice-based algorithm to recover the values you want in other words, the key.
The main challenge, the authors write, is to define to define a suitable quantum fingerprinter that could handle the control space.
Read the original here:
GCHQ boffins quantum-busted its OWN crypto primitive
Matthew Green, cryptography professor at Johns Hopkins, knows all about iPhone security and apparently so does his 7-year-old son, Harrison. According to CNN Money, the child was able to bypass Apple's Touch ID security measures and access Angry Birds Transformers using a simple physical attack.
But Tuesday morning at dawn, little Harrison crept into his parents' bedroom and walked over to his dad's side of the bed. He quietly reached for his father's iPhone, grabbed his right hand and pressed his large thumb onto the fingerprint scanner.
Apple recently increased iPhone and iPad security in iOS 8, encrypting data by default and protecting it in such a way that nobody, except the original owner, can access it via passcode or the biometrics of Touch ID. This improved security has caught the attention of the FBI, which claims these new security measures will hinder investigations and assist criminals. A recent court decision lessened the impact of this security, ruling that Touch ID was not protected by the Fifth Amendment.
Read the rest here:
7-year-old boy cleverly thwarts Apple's iPhone security measures
Wikileaks Iraq: data journalism maps every death
By: Joseph Hirsch
Read the original post:
Wikileaks Iraq: data journalism maps every death - Video
Julian Assange WikiLeaks Press Conf On Iraq War Document Release pt.2
October 23, 2010 C-SPAN http://MOXNews.com/
By: Breaking NEWS
More here:
Julian Assange WikiLeaks Press Conf On Iraq War Document Release pt.2 - Video
NSA whistleblower Edward Snowden is stuck in Russia, only being able to reach out to the world by video link. The same goes for Wikileaks Julian Assange, in limbo at Ecuadors embassy in London. Journalist and web activist Barret Brown spends his time in custody, waiting to be sentenced after looking too close into outsourcing of US national security matters.
This is in a way better for the US government than just throwing people in jail.
If you compare this tothe case of whistleblower Chelsea Manningher 35 year prison sentence for exposing the truth is clearly a stain on US reputation.
Its more convenient for government to corner trouble makerselsewhere in the world or to constrain their actions with seemingly endlesslegal proceedings. It might not silence thembut it will hamper their work seriously. And you can (normally) do thiswithout enraginghuman rights activists, hacktivists, the media and the general public too much.
It all bears a chillingresemblance to the way the Soviets treated many of their dissidentsduring the Cold War.
/ HAX
Read more:
Chelsea Manning – Henrik “HAX” Alexandersson
Free Bradley (Chelsea) Manning
1 minute clip from a 2012 Free Bradley Manning Rally. He got sentenced to 35 years in prison August of 2013.
By: Cali Will
Go here to see the original:
Free Bradley (Chelsea) Manning - Video
Sen. Menendez and Rep. Royce `This Week` Intervie
Sen. Robert Menendez and Rep. Ed Royce on Edward Snowden and tensions with Russia.
By: AB world news
Here is the original post:
Sen. Menendez and Rep. Royce `This Week` Intervie - Video
2014: Das Internet im Jahr 1 nach Edward Snowden | Valentina Kerst | TEDxKoelnSalon
This talk was given at a local TEDx event, produced independently of the TED Conferences. Edward Snowden deckt 2013 auf, wie Staaten und Organisationen das Internet nutzen. Sascha Lobo ...
By: TEDx Talks
See the rest here:
2014: Das Internet im Jahr 1 nach Edward Snowden | Valentina Kerst | TEDxKoelnSalon - Video