Open source TrueCrypt suddenly shutters, conspiracy theories abound

The official pages for cryptography tool TrueCrypt have suddenly changed, claiming that users shouldn't use the utility as development has ceased and it may "contain unfixed security issues." A new version of the app has been posted, removing the ability to create new encrypted volumes, but still allowing decryption of existing volumes.

TrueCrypt was an open-source freeware application used for on-the-fly encryption. It could create a virtual encrypted disk within a file, encrypt a disk partition, or the entire storage device with pre-boot authentication. In the wake of the Snowden revelations, a non-profit agency was crowdfunded and created to audit the utility's encryption methodology, with the first phase of the report having been completed in April.

The full posting at the TrueCrypt site says that "This page exists only to help migrate existing data encrypted by TrueCrypt. The development of TrueCrypt was ended in 5/2014 after Microsoft terminated support of Windows XP. Windows 8/7/Vista and later offer integrated support for encrypted disks and virtual disk images. Such integrated support is also available on other platforms. You should migrate any data encrypted by TrueCrypt to encrypted disks or virtual disk images supported on your platform." It is unclear what the support termination of Windows XP has to do with the death of the TrueCrypt platform.

Despite some Internet uncertainty and conspiracy theories around the sudden death of the popular tool, the new release is certified with the TrueCrypt private signing key, suggesting that the release is authentic from the secretive developer team. The repository hosting the utility, SourceForge claims that there is "no indicator of account compromise" and "current usage is consistent with past usage." Additionally, the last major update was over two years ago with limited support on newer operating systems, so all signs point to the program being abandoned, rather than interfered with by external forces.

By Electronista Staff

Read more here:
Open source TrueCrypt suddenly shutters, conspiracy theories abound

Cryptography ( Windows ) – MSDN – the Microsoft …

Purpose

Cryptography is the use of codes to convert data so that only a specific recipient will be able to read it, using a key.

Microsoft cryptographic technologies include CryptoAPI, Cryptographic Service Providers (CSP), CryptoAPI Tools, CAPICOM, WinTrust, issuing and managing certificates, and developing customizable public key infrastructures. Certificate and smart card enrollment, certificate management, and custom module development are also described.

CryptoAPI is intended for use by developers of Windows-based applications that will enable users to create and exchange documents and other data in a secure environment, especially over nonsecure media such as the Internet. Developers should be familiar with the C and C++ programming languages and the Windows programming environment. Although not required, an understanding of cryptography or security-related subjects is advised.

CAPICOM is a 32-bit only component that is intended for use by developers who are creating applications using Visual Basic Scripting Edition (VBScript) programming language or the C++ programming language. CAPICOM is available for use in the operating systems specified in Run-Time Requirements. For future development, we recommend that you use the .NET Framework to implement security features. For more information, see Alternatives to Using CAPICOM.

For information about run-time requirements for a particular programming element, see the Requirements section of the reference page for that element.

CAPICOM 2.1.0.2 is supported on the following operating systems and versions:

CAPICOM is available as a redistributable file that can be downloaded from Platform SDK Redistributable: CAPICOM.

Certificate Services requires the following versions of these operating systems:

About Cryptography

Read the original:
Cryptography ( Windows ) - MSDN – the Microsoft ...

Quantum Cryptography with Ordinary Equipment

Researchers in Japan have come up with a way of doing quantum cryptography that could overcome two of the technology's big problems. The new protocol is designed to work with off-the-shelf equipment and use less bandwidth than existing methods. Its just a mathematical proposal, but it could help make quantum key distribution more commercially viable.

With an encrypted message, the sender and recipient share a key that unscrambles its contents. Ensuring that the key hasn't been stolen is the problem. With quantum cryptography, the key is created at the sender and receiver by transmitting photons over fiber-optic lines. The polarity of a photona quantum property that says whether it is oscillating vertically or at anglecan be determined by the receiver and compared with a second "entangled" photon created at the same time. The polarity of the photons is translated into bits that make up a key to decrypt messages.

With quantum key distribution, the security of the transmission is assured by the Heisenberg uncertainty principle. If an eavesdropper tries to intercept the key, it will change the state of the paired photonsan event that can be detected by the sender of the key.

In research published in Nature last week, the Japanese team describes a method for securing communications that doesnt rely on the uncertainty principle and needs no regular measurement to see if the key's been tampered with.

With this technique, photons are sent over an optical fiber using ordinary lasers, rather than specialized equipment usually needed to create quantum keys. The laser emits a train of photons and a device called a phase modulator imparts a phase on them.

The receiver splits the signal into two separate signals with a randomly generated delay between them. Then those two signals, which are oscillating waves, are superimposed and detected on the receiving end. The combined waves could be out of phase and cancel each out or they could be in phase and create a bigger wave.

The phase difference between pulses can then act as bits that can make up a key to decrypt the message. For example, pulses with the same phase are a bit value of zero, while pulses with a different phase are a bit value of one. When the receiverwho, by convention, is called Bobdetects a photon, he learns whether the superimposed pulses have the same or different phase. Then he tells the sender, called Alice, what the relevant pulse numbers are. Because the sender records all the pulses, she can determine the bit value based on what Bob tells her, explains co-author Masato Koashi from the University of Tokyo.

In an email, Koashi from the University of Tokyo describes how the key is protected from theft by an intruder, called Eve:

One of the keys to securing the communication is to send a large number of optical pulses but they are very weak such that they amount to only a few photons in total. Hence, even if Eve waits forBob to announce the numbers for two pulses and then measures Alice's signal, the chances of Eve's detecting any photon in the two relevant pulses are very low.

Another key is the fact that Bob generates the delay randomly. Eve may measure Alice's signal immediately and learn the phases of a few pulses. Eve then tries to manipulate Bob's announcement to fall on those pulses for which she has learned the phases. The random delayprevents such a manipulation.

Read more:
Quantum Cryptography with Ordinary Equipment

Heads or tails: Experimental quantum coin flipping cryptography performs better than classical protocols

5 hours ago by Stuart Mason Dambrot Experimental setup of the plug-and-play Clavis2 system. This type of interferometric setup does not necessitate continuous polarization control and alignment, and therefore guarantees excellent system stability for quantum communications. Courtesy: Anna Pappa, LTCI, CNRSTlcom ParisTech

(Phys.org) Cryptography the practice and study of techniques for secure communication in the presence of third parties, referred to as adversaries has a long and varied history. In ancient Greece, for example, the Spartan military may have used the so-called scytale transposition cipher to encrypt and decrypt messages. Steganography (hiding the existence of a message) was also first developed at that time as, according to Herodotus, a message tattooed on a slave's shaved head and then hidden under regrown hair and is still in use in the form of invisible ink, microdots, and digital watermarks. That said, applying complexity cryptography to quantum communication is and will continue to be essential and while quantum cryptographic primitives are in principle more secure than classical protocols, demonstrating this in a practical system has proven difficult.

Recently, however, scientists at Laboratory for Communication and Processing of Information (LTCI), Paris a joint research lab between Centre National de la Recherche Scientifique (CNRS) and Tlcom ParisTech have experimentally implemented a quantum coin flipping protocol that performs better than any classical system over a distance suitable for deployment in metropolitan area optical networks. Based on an enhanced commercial quantum key distribution (QKD) device, the approach is nearly perfectly secure against bounded adversaries a feature the researchers state make it a practical toolbox for designing secure quantum communications systems.

Researcher Anna Pappa discussed the paper she and her co-authors published in Nature Communications with Phys.org beginning with the challenge of addressing the historical difficulty of demonstrating the known information-theoretic security advantages of quantum versions of coin flipping and other primitives (basic cryptographic algorithms used to construct more complicated cryptographic tools) relative to classical protocols in a practical communication scenario. "Quantum cryptography is a relatively new field that emerged after Bennett and Brassard's groundbreaking paper in19841, which introduced the idea of using quantum mechanics to enhance classical cryptographic protocols like key distribution and coin flipping," Pappa tells Phys.org, adding that the main difference between classical and quantum computing is that in the latter, information is contained in the physical properties of the exchanged messages.

"This provides a strong advantage but also hinders straightforward applications of quantum protocols," Pappa point out. "Historically, many protocols that were in theory secure were completely broken in practice, because of limitations in current technology. For example," she illustrates, "previous coin flipping protocols necessitated a single-photon source or an entangled source in order to be secure but the first is not currently available, while the second cannot be easily deployed for long-distance communications since entanglement is very fragile, and cannot be maintained for long periods of time due to quantum memory limitations. In our research, while we are exploiting the effects of superposition in quantum mechanics, we do not use entangled states and this is what makes our implementation easily implementable with standard photonic sources."

Another important factor, she notes, is that coin flipping is a protocol used when participants do not trust each other, which makes correcting transmission errors more difficult. At the same time, trusted setting protocols like quantum key distribution (QKD) have in recent years achieved security for distances of more than 100 kilometers. This is due to the fact that measuring a quantum system disturbs that system, and any third party trying to gain knowledge of the key can therefore be detected by the two communicating users.

The researchers also faced the challenge of experimentally implementing a quantum coin flipping protocol that performs strictly better than classically possible over a distance suitable for communication over metropolitan area optical networks. "The Clavis2 platform that we used was developed by IdQuantique, a company based in Geneva, Switzerland that works closely with researchers worldwide in order to test and verify their systems," Pappa recalls. "There were many challenges that we faced during the implementation of our coin flipping protocol using a commercial plug-and-play system originally designed to perform key distribution between two parties (commonly referred to as Alice and Bob) who trust each other and want to establish a common secret key.

"In quantum coin flipping," Pappa explains, "the players do not trust each other, since both want to win the coin flip, so they try to cheat by numerous ways for example, by increasing the average photons contained in the pulses, or by declaring that they lost some message when they do not like the result of the protocol. Furthermore, they could try to exploit the physical properties of the system, like an asymmetry in the creation of the different quantum states used, or in the detection of the different states. We therefore needed to account for all imperfections of the system and come up with detailed security proofs in order to show the quantum advantage of our implementation."

Relatedly, the scientists sought to provide combined quantum coin flipping protocols that were almost perfectly secure against bounded adversaries. "We wanted to find a way to provide security against an adversary of unknown abilities, so we used two schemes that are secure against adversaries of limited power that is, noisy storage and computationally bounded and enhanced them with our protocol." To do this, they we analyzed the bounded protocols and found the exact step where an unbounded adversary would be able to perfectly cheat, and then strengthened that step using our protocol."

"A problem that we faced," Pappa tells Phys.org, "was that, since the players do not trust each other, they cannot perform error-correction and other procedures that necessitate collaboration between the parties, therefore limiting the tolerance to errors. We therefore needed to make some changes to the system in order to observe a quantum advantage for a considerable channel length. For example," Pappa explains, "the detectors on Bob's side had to be replaced because they had low detection efficiencies and high dark counts, and we could not observe any quantum advantage for any channel length. By substituting them with better quality detectors, we managed to experimentally demonstrate a quantum advantage for a channel distance of 15km. In addition," she continues, "photon source attenuation was very high. This meant that essential Clavis2 procedures could not be executed, requiring significant reprogramming." Finally, Pappa notes, in order for the players to decide on the protocol parameters, the scientists had to perform detailed careful system analyses to identify system component losses and errors in order to, for example, estimate how many times they need to run the protocol and how much attenuation needs to be applied.

Read this article:
Heads or tails: Experimental quantum coin flipping cryptography performs better than classical protocols

The quest for true randomness and uncrackable codes

May 22, 2014 by Senne Starckx

Quantum cryptography is said to be uncrackable. It will stay safe, but only if true randomness, the generation and use of intrinsically random numbers, can be achieved.

Each time we read our e-mail, login to online shopping sites, watch a movie online or use our mobile phone, we are using random numbers to establish a secure connection. Randomness is a crucial ingredient in practically every area of information processing. And, most importantly, in cryptography. But because all conventional computing processes are based on classical physics, looking for true randomness is like searching for the pot of gold at the end of the rainbow. This explains why even the most sophisticated present-day encryption systems can fall prey to hackers.

Enter quantum computing. Incorporating the inherent random nature of the quantum world in a computer yields a revolutionary new way of producing true random numbers. Thanks to this, real uncrackable codes are in sight. The EU funded project RAQUEL, started in October 2013, evaluates the role played by randomness in quantum information processing. Project coordinator Jan Bouda, a researcher in Informatics at Masaryk University in Brno, in the Czech Republic, talks to youris.com why true randomness is so important and what it will mean for cryptography.

Why can my computer not produce true random numbers?

Conventional computing is based on classical physical principles. And in classical physics, there is not a single process that is intrinsically random. Hence, the randomness generated by classical devices, like your PC, is rather a consequence of our ignorance of the initial setup. On the contrary, randomness obtained from quantum computers is true, as the measurement is supposed to be intrinsically random. (ironically) That is if quantum physics is right.

So why is randomness so important?

Randomness is used in a huge number of efficient algorithms. In fact, for many problems, algorithms using random choices are far more efficient than the best-known deterministic algorithms. These algorithms are used to reduce the amount of communication for distributed computation, such as, in cloud computing, and more importantly, for cryptography. Any application that should work securely needs random numbers.

On the other hand, to produce high-quality random numbers is not easy. Even in specialised devices, like in quantum random number generators, the amount of random numbers you can produce per second is strictly limited. Random numbers are important in all areas of computer science. But in cryptography the quality is a deal breaker. In many applications, even a minor flaw in randomness can completely jeopardise the security.

What are your current research goals?

Link:
The quest for true randomness and uncrackable codes

Denis Zagumennov: "Cryptography: History of Information Security – Then and Now" – Video


Denis Zagumennov: "Cryptography: History of Information Security - Then and Now"
2014 - English Language Conference at the Faculty of Mathematics, Mechanics Computer Science (SFedU). Best presenters among 29 speakers at four sessions.

By: English classes that inspire

More:
Denis Zagumennov: "Cryptography: History of Information Security - Then and Now" - Video

Compact Network Storage System suits Big Data applications.

May 21, 2014 - Consisting of network file server inconduction-cooled ATR chassis, Model CNS4 is suited for SWaP-constrained military applications that require cryptography to ensure integrity of critical data-at-rest. System can support 4 FSM-C memory modules, each with 2 TB capacity, for total capacity of 8 TB. To support avionics and sensor management systems, CNS4 offers 1 GbE or 10 GbE Ethernet connectivity. Chassis also accommodates 3U VPX inline media encryptor certified for SABI in attended systems. Curtiss-Wright Corp. 1200 Wall St. W Lyndhurst, NJ, 07071 USA Press release date: May 13, 2014

New scalable Compact Network Storage (CNS4) system doubles storage capacity with four removable memory modules, supports variety of encryption levels, and provides flexible I/O front-end

AUVSI (Booth #653), ORLANDO, Fla. Curtiss-Wright Corporation (NYSE: CW) today announced that its Defense Solutions division has introduced the new rugged CNS4 Compact Network Storage subsystem, a conduction-cooled, high-performance network file server (NFS) with scalable storage, flexible IO, and encryption options. This rugged, high-capacity storage solution was designed for size, weight and power (SWaP) constrained military applications that require cryptography to ensure the integrity of critical data-at-rest in demanding military environments such as those endured by transports, helicopters, UAVs and mobile radar systems. The CNS4, with its high-density storage capacity, broad support for multiple network protocols and expansion, and flexible encryption capabilities, enables system designers to address all their data, audio and video storage requirements with a single solution, eliminating the need for multiple dedicated data recorders. Able to support up to 8TB of Type 1 encrypted storage, CNS4 provides Ethernet connectivity for maximum network-agility. It also supports a wide variety of industry standard protocols, including CIFS, NFS, HTTP, FTP, and PXE, making it ideal for sharing critical data in network centric architectures. The modular CNS4 supports a variety of encryption levels and can be configured with up to four (4) Curtiss-Wright Flash Storage Modules (FSM-C) in a fully rugged, conduction-cooled ATR chassis, doubling the storage capacity available with the original CNS. The CNS4 features 100,000 insertion cycle connectors which are critical for mobile applications such as Mission Recorders, Unmanned Vehicle Data Loader, Mobile ISR Systems and Ground Vehicles.

Curtiss-Wright is proud to support our warfighters by offering the industrys leading rugged storage solution for mobile applications that require NSA Type 1 encrypted data-at-rest, said Lynn Bamford, Senior Vice President & General Manager, Curtiss-Wright Defense Solutions division. Built to meet evolving storage, protocol and encryption requirements, this data recorder provides future-proofing to ensure that your data recorder keeps pace with your applications expanding needs.

Scalable Storage Up To 8TB The CNS4 can support 4 FSM-C memory modules, each with a current capacity of 2TB, for a total storage capacity of 8TB. With NAND Flash density doubling every 18 to 24 months, a 16TB capacity for the CNS4 is expected to be available in 2016. The FSM-C modules plug into the CNS4 backplane and are located behind an easy-to-open access door. They are easily removed from the CNS4 chassis with tool-less wedge-locks. With 100,000 insertion cycle connectors, FSM-C can be used in mobile applications for many years.

Flexible I/O To support modern avionics and sensor management systems, the CNS4 is designed with 1GbE or 10GbE Ethernet connectivity. In addition to its four (4) built-in 1GbE ports, CNS4 also provides a 3U VPX slot for additional I/O. For example, using a VPX carrier card, the CNS4 can host a 10GbE XMC I/O card to provide connection to any 10GbE network to support very high-speed file server applications.

The CNS4 also supports a Universal Capture Card that enables the system to record Serial FPDP data as well as act like a networked attached storage (NAS) device.

Data Protection with Type 1 Encryption In addition to its VPX I/O slot, the CNS4 chassis also accommodates a 3U VPX inline media encryptor (IME) certified for Secret and Below Information (SABI) in attended systems. A Crypto Ignition Key (CIK) is mounted on the CNS4 front panel when this IME is used. By the end of 2014, the IME is expected to support Pre-Placed Keys (PPK) and 4 SATA lanes. Via a DS101 key-fill port, the PPKs can be loaded so the IME can be left in place.

Additional Information Please contact the factory for additional information and availability. Click here for more information on the CNS4.

Sales inquiries: Please forward all Sales and reader service inquiries to Kavita Williams, Curtiss-Wright Defense Solutions, Tel: (661) 705-1142; Fax: (661) 705-1206; email: defensesales@curtisswright.com.

See original here:
Compact Network Storage System suits Big Data applications.