Assange ‘studying UK deputy PM’s remarks’

Julian Assange (Pic) says his legal team will study comments made by British Deputy PM Nick Clegg.

WikiLeaks founder Julian Assange says his legal team will study comments made by British Deputy Prime Minister Nick Clegg to see if they were defamatory.

Clegg was interviewed on LBC radio on Friday about Assange's continued stay at Ecuador's embassy in London and the STG10 million ($A19.65 million) cost of policing the building.

Assange has been at the embassy since June 2012 to avoid extradition to Sweden where he faces questions over claims of sexual assaults, which he denies.

Clegg said: "Am I frustrated that this goes on and on like this? Am I frustrated that taxpayers are picking up the tab around the Ecuadorian embassy? Yes, sure.

"Imagine the frustration of the Swedish government - hardly an illiberal rogue state.

"This is a country of impeccable democratic credentials with a well-respected judicial system who say he should go to Sweden to face very serious allegations and charges of rape, which he denies."

Assange has taken exception to use of the word "charges".

"I have instructed my legal team to examine whether the Deputy Prime Minister, Nick Clegg, should be sued for defamation," Assange said in a statement.

"Nick Clegg falsely stated to the media yesterday, in comments that were widely reported, that I had been 'charged' with an offence".

Link:
Assange 'studying UK deputy PM's remarks'

InnocentCryptoKitty 036 Epic Bitcoin VideoMix Art Innovation CryptoCurrency Funny Furry Court Comedy – Video


InnocentCryptoKitty 036 Epic Bitcoin VideoMix Art Innovation CryptoCurrency Funny Furry Court Comedy
http://www.twitter.com/VanosEnigmA http://www.facebook.com/VanosEnigma http://www.twitter.com/CryptoEEV Thank you mucho meow for your donation: Bitcoin Address: 1FJ9ZZcnKqhiiYWNhbpBaqy9QQHTBSmsP8 ...

By: VanosEnigmA Enigmaisland

Read more:
InnocentCryptoKitty 036 Epic Bitcoin VideoMix Art Innovation CryptoCurrency Funny Furry Court Comedy - Video

BBC News-Julian Assange: Costs of policing Wikileaks founder reach £10m – Video


BBC News-Julian Assange: Costs of policing Wikileaks founder reach 10m
Julian Assange: Costs of policing Wikileaks founder reach 10m Scotland Yard has spent about 10m providing a 24-hour guard at the Ecuadorean embassy in London since Wikileaks founder Julian...

By: news collection today

Continue reading here:
BBC News-Julian Assange: Costs of policing Wikileaks founder reach £10m - Video

Proofs in Cryptography: Lecture 13 ROM Proof Example – CPA secure RSA Encryption – Video


Proofs in Cryptography: Lecture 13 ROM Proof Example - CPA secure RSA Encryption
Proofs in Cryptography Lecture 13 ROM Proof Example - CPA secure RSA Encryption ALPTEKN KP Assistant Professor of Computer Science and Engineering Ko Un...

By: Kolt KU

Originally posted here:
Proofs in Cryptography: Lecture 13 ROM Proof Example - CPA secure RSA Encryption - Video

Encryption Software Market worth $4.82 Billion by 2019 – New Report by MarketsandMarkets

(PRWEB) February 06, 2015

The new market research report Encryption Software Market - Global Forecast and Analysis 2019 defines and segments the global market into various sub segments with in-depth analysis and forecasting of revenues. It also identifies drivers and restraints for this market with insights on trends, opportunities and challenges.

Browse market data tables and 57 figures spread through 72 pages and in-depth TOC on Encryption Software Market Global Forecast and Analysis 2014 - 2019 http://www.marketsandmarkets.com/Market-Reports/encryption-software-market-227254588.html

Early buyers will receive 10% customization on this report.

Speak to Analyst @ http://www.marketsandmarkets.com/speaktoanalyst.asp?id=227254588

The propagation of mobile devices across the world complemented with the ease in access to business content has comprehensively enhanced the employee efficiency. This has extensively led to the consumption and generation of vast amount of data that is transferred across these mobile devices such as smart phones, DVDs, USBs and vice versa. However, this has made this data susceptible to cyber-attacks, commercial espionage, threats and loss. Thus, to defend their sensitive and critical content, protect the authenticity of the data and evade breach of privacy, the enterprises, Small and Medium Businesses (SMBs) categorically consider encryption software solutions within their organizations. Since, the prevalent anti-virus and firewalls across companies offer the basic level of security to the content, the need for comprehensive security solution ranging from disks, file/folder, databases and communication to cloud are demanded globally.

There has been a continual technological advancement related to data accessibility techniques. With the large scale usage of mobile devices for accessing and transmitting organizational content, companies have been comprehensively leveraged in making timely and informed organizational decisions. In addition, the widespread embracement of cloud, social media and internet has further improved business functioning along with increasing the data being generated and accessed through mobile devices. These pervasive progressions and ease of data accessibility have boosted the profitability and increased the business efficiency. However, this data that resides within the companies and which constantly travels over the business networks through emails and or is stored in cloud becomes vulnerable to tampering, attacked, misuse and loss. To cohesively protect this sensitive content, the enterprises and SMBs have been primarily considering the implementation of encryption solutions ranging from disks, file/folder, databases and communication to cloud. These encryption solutions provision comprehensive security to business data that is within the organizations, in cloud and which travels beyond the companies through various means including emails, messages and mobile devices. These solutions safeguard the valuable data of the businesses from commercial espionage, cyber-attacks, fraudulent activities and privacy breaches. In addition, these encryption solutions also prevent unauthorized access and provide advanced and customized encryption for superior protection of data.

Further, these encryption solutions are expansively embraced for provisioning of continual security to large organizational content accessed and transmitted across diverse devices regardless of location. These encryption solutions can be customized to address the business needs of the SMBs and enterprises and are easily deployed on the cloud and on-premises. Currently, hosted encryption software is largely being adopted by the users to comprehensively secure their content from threats and perils of loss. Further, the commencement and provision of these prevalent encryption solutions has enabled the encryption software vendors, third-party providers and cloud vendors to offer exclusively customized encryption solutions precisely addressing the needs of the businesses. Thus, encryption plays the crucial role in protecting the data, which forms the most valuable and sensitive assets for the companies along with securing the privacy of its employees.

The major vendors of the global encryption software market are Microsoft Corporation, Symantec Corporation, Intel Corporation, and Check Point Software Technologies Ltd. The major forces driving this market are the presence of a dynamic business environment, increasing cyber-attacks, growing concern about data loss among the companies and obligatory need for adhering with standards.

MarketsandMarkets broadly segments the Encryption Software Market by regions: North America (NA), Europe, Asia-Pacific (APAC), Middle East and Africa (MEA) and Latin America (LA); by applications: Disk Encryption, File/Folder Encryption, Database Encryption, Communication Encryption and Cloud Encryption; by deployment types: cloud and on-premises; by user types: enterprise and SMB; by industry verticals: BFSI, healthcare, government and public sector, telecom, retail, aerospace, defense and others.

View original post here:
Encryption Software Market worth $4.82 Billion by 2019 – New Report by MarketsandMarkets

Elliptic curve cryptography – Wikipedia, the free encyclopedia

Elliptic curve cryptography (ECC) is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields. One of the main benefits in comparison with non-ECC cryptography (with plain Galois fields as a basis) is the same level of security provided by keys of smaller size.

Elliptic curves are applicable for encryption, digital signatures, pseudo-random generators and other tasks. They are also used in several integer factorization algorithms that have applications in cryptography, such as Lenstra elliptic curve factorization.

Public-key cryptography is based on the intractability of certain mathematical problems. Early public-key systems are secure assuming that it is difficult to factor a large integer composed of two or more large prime factors. For elliptic-curve-based protocols, it is assumed that finding the discrete logarithm of a random elliptic curve element with respect to a publicly known base point is infeasible: this is the "elliptic curve discrete logarithm problem" or ECDLP. The entire security of ECC depends on the ability to compute a point multiplication and the inability to compute the multiplicand given the original and product points. The size of the elliptic curve determines the difficulty of the problem.

The primary benefit promised by ECC is a smaller key size, reducing storage and transmission requirements, i.e. that an elliptic curve group could provide the same level of security afforded by an RSA-based system with a large modulus and correspondingly larger key: for example, a 256-bit ECC public key should provide comparable security to a 3072-bit RSA public key.

The use of elliptic curves in cryptography was suggested independently by Neal Koblitz[1] and Victor S. Miller[2] in 1985. Elliptic curve cryptography algorithms entered wide use in 2004 to 2005.

For current cryptographic purposes, an elliptic curve is a plane curve over a finite field (rather than the real numbers) which consists of the points satisfying the equation

along with a distinguished point at infinity, denoted . (The coordinates here are to be chosen from a fixed finite field of characteristic not equal to 2 or 3, or the curve equation will be somewhat more complicated.)

This set together with the group operation of elliptic curves is an Abelian group, with the point at infinity as identity element. The structure of the group is inherited from the divisor group of the underlying algebraic variety. As is the case for other popular public key cryptosystems, no mathematical proof of security has been published for ECC as of 2009[update].

The U.S. National Institute of Standards and Technology (NIST) has endorsed ECC in its Suite B set of recommended algorithms, specifically Elliptic Curve DiffieHellman (ECDH) for key exchange and Elliptic Curve Digital Signature Algorithm (ECDSA) for digital signature. The U.S. National Security Agency (NSA) allows their use for protecting information classified up to top secret with 384-bit keys.[3]

While the RSA patent expired in 2000, there may be patents in force covering certain aspects of ECC technology, though some (including RSA Laboratories[4] and Daniel J. Bernstein[5]) argue that the Federal elliptic curve digital signature standard (ECDSA; NIST FIPS 186-3) and certain practical ECC-based key exchange schemes (including ECDH) can be implemented without infringing them.

Link:
Elliptic curve cryptography - Wikipedia, the free encyclopedia

Quantum cryptography – Wikipedia, the free encyclopedia

Quantum cryptography describes the use of quantum mechanical effects (in particular quantum communication and quantum computation) to perform cryptographic tasks or to break cryptographic systems.

Well-known examples of quantum cryptography are the use of quantum communication to exchange a key securely (quantum key distribution) and the hypothetical use of quantum computers that would allow the breaking of various popular public-key encryption and signature schemes (e.g., RSA and ElGamal).

The advantage of quantum cryptography lies in the fact that it allows the completion of various cryptographic tasks that are proven or conjectured to be impossible using only classical (i.e. non-quantum) communication (see below for examples). For example, quantum mechanics guarantees that measuring quantum data disturbs that data; this can be used to detect eavesdropping in quantum key distribution.

Quantum cryptography was proposed first by Stephen Wiesner, then at Columbia University in New York, who, in the early 1970s, introduced the concept of quantum conjugate coding. His seminal paper titled "Conjugate Coding" was rejected by IEEE Information Theory but was eventually published in 1983 in SIGACT News (15:1 pp.7888, 1983). In this paper he showed how to store or transmit two messages by encoding them in two "conjugate observables", such as linear and circular polarization of light, so that either, but not both, of which may be received and decoded. He illustrated his idea with a design of unforgeable bank notes. In 1984, building upon this work, Charles H. Bennett, of the IBM Thomas J. Watson Research Center, and Gilles Brassard, of the Universit de Montral, proposed a method for secure communication based on Wiesners "conjugate observables", which is now called BB84.[1] In 1990 Artur Ekert developed a different approach to quantum key distribution based on peculiar quantum correlations known as quantum entanglement.[2]

Random rotations of the polarization by both parties (usually called Alice and Bob) have been proposed in Kak's three-stage quantum cryptography protocol.[3] In principle, this method can be used for continuous, unbreakable encryption of data if single photons are used.[4] The basic polarization rotation scheme has been implemented.[5]

The BB84 method is at the basis of quantum key distribution methods. Companies that manufacture quantum cryptography systems include MagiQ Technologies, Inc. of Boston, ID Quantique of Geneva, Switzerland, QuintessenceLabs (Canberra, Australia) and SeQureNet (Paris).

The most well known and developed application of quantum cryptography is quantum key distribution (QKD), which is the process of using quantum communication to establish a shared key between two parties without a third party (Eve) learning anything about that key, even if Eve can eavesdrop on all communication between Alice and Bob. This is achieved by Alice encoding the bits of the key as quantum data and sending them to Bob; if Eve tries to learn these bits, the messages will be disturbed and Alice and Bob will notice. The key is then typically used for encrypted communication using classical techniques. For instance, the exchanged key could be used as the seed of the same random number generator both by Alice and Bob.

The security of QKD can be proven mathematically without imposing any restrictions on the abilities of an eavesdropper, something not possible with classical key distribution. This is usually described as "unconditional security", although there are some minimal assumptions required including that the laws of quantum mechanics apply and that Alice and Bob are able to authenticate each other, i.e. Eve should not be able to impersonate Alice or Bob as otherwise a man-in-the-middle attack would be possible.

Following the discovery of quantum key distribution and its unconditional security, researchers tried to achieve other cryptographic tasks with unconditional security. One such task was commitment. A commitment scheme allows a party Alice to fix a certain value (to "commit") in such a way that Alice cannot change that value while at the same time ensuring that the recipient Bob cannot learn anything about that value until Alice decides to reveal it. Such commitment schemes are commonly used in cryptographic protocols. In the quantum setting, they would be particularly useful: Crpeau and Kilian showed that from a commitment and a quantum channel, one can construct an unconditionally secure protocol for performing so-called oblivious transfer.[6]Oblivious transfer, on the other hand, had been shown by Kilian to allow implementation of almost any distributed computation in a secure way (so-called secure multi-party computation).[7] (Notice that here we are a bit imprecise: The results by Crpeau and Kilian[6] and Kilian[7] together do not directly imply that given a commitment and a quantum channel one can perform secure multi-party computation. This is because the results do not guarantee "composability", that is, when plugging them together, one might lose security. Later works showed, however, how composability can be ensured in this setting.)

Unfortunately, early quantum commitment protocols[8] were shown to be flawed. In fact, Mayers showed that (unconditionally secure) quantum commitment is impossible: a computationally unlimited attacker can break any quantum commitment protocol.[9]

Here is the original post:
Quantum cryptography - Wikipedia, the free encyclopedia

Portable PGP – SourceForge

Portable PGP :: PGP Everywhere!

Portable PGP is a fully featured, lightweight, java based, open source PGP tool.

It allows to encrypt,decrypt,sign and verify text and files with a nice and absolutely straight graphical interface.

It's absolutely simple to use and provides everything you need to get started with PGP cryptography.

(Jun 2012) New version 1.0.7 released ! Works with Oracle Java 7, Windows 7 x64 and Ubuntu (x64) OpenJDK

Downloads

On the go USB-Stick version available ! After a long wait, the USB-Stick version of PortablePGP is ready. It's a simple zip file that you've to decompress on the root folder of your USB drive and allows to run PortablePGP on both Windows and Linux platforms without the need of installing it and without the need to have a Java virtual machine installed(a private JRE is bundled in)

Runs everywhere USB-Stick : Proceed to download

Otherwise, if you prefer to download and install it as a standard application

Fully automatic setup for Windows : PortablePGP-setup.exe

Continue reading here:
Portable PGP - SourceForge

Once starving GnuPG crypto project gets a windfall. Now comes the hard part

Aurich Lawson / Thinkstock

For almost two decades, the open source GnuPG encryption project has teetered on the brink of insolvency. Now, following word of that plight, the lone developer keeping the project alive has received more than $135,000in a single day, no less.

Short for Gnu Privacy Guard, GnuPG or simply GPG was first conceived in 1997. It makes upthe guts that run GpG4Win, GPG Tools, and Enigmail, encryption programs that run on Windows, Macs, and as a plugin for the Thunderbird e-mail program respectively. An open source version of Phil Zimmermann's PGP, GnuPG quickly surged in popularity. Because it was written by a German citizen outside the US, it wasn't subject to then-draconian US laws restricting the export of strong cryptography technologies. Former NSA whistleblower Edward Snowden relied on the program to evade monitoring as he carried out his massive leak of top-secret documents. Many journalists and security professionals also swear by it.

Despite the popularity of the program, Werner Koch has struggled to make ends meet. According to a profile published Thursday by ProPublica, the 53-year-old resident of Erkrath, Germany, grew so impatient with the lack of funding that he considered abandoning the project and taking a better paying programming job. When documents leaked in 2013 by Snowden showed the extent of NSA surveillance, he decided the time wasn't right to drop the project. He has been stuck in limbo ever since.

Things took a dramatic about-face following the ProPublica post. According to the GnuPG front page, the project brought in 120,000 (the equivalent of about $135,600) in donations in the first 24 hours following publication. That didn't include a 60,000 infusion that was recently donated from a group called the Core Infrastructure Initiative and payments of 50,000 each from Facebook and payment service Stripe.

The financial strain Koch has endured underscores a cruel irony that has only recently come to light. Developers of some of the most sensitive and mission-critical software often struggle to maintain their projects, while many who sell smartphone apps and other comparatively less crucial software are flush with cash. It wasn't until last year's surfacing of the catastrophic Heartbleed vulnerability in the OpenSSL crypto library that it became common knowledge the project had just one employee working full time and typically received just $2,000 per year in donations. In response, the Linux Foundation spearheaded the Core Infrastructure Initiative to fund OpenSSL and similar projects. The initiative gets financial support from the likes of HP, IBM, Red Hat, Intel, Oracle, Google, Cisco, and others.

It's encouraging to see the GnuPG project benefitting from similar largess. But it also raises the question: how is the money best spent? Matt Green, a professor specializing in cryptography at Johns Hopkins University, said he has looked at the GnuPG source code and found it in such rough shape that he regularly assigns chunks of it to his students for review.

"At the end I ask how they felt about it and they all basically say: 'God, please I never want to do something like this again,'" Green told Ars.

The main problem with the code, he said, is it hasn't been properly maintained over the years.

"It's overly complex," he explained. "It's not maintained by enough people, given how big it is, and it contains a lot of old cruft that should be gotten rid of. When it got re-engineered from version 1 to version 2, version 2 got re-engineered in this abstract way [so] that it's hard to figure out what's going on on the back end."

See the original post:
Once starving GnuPG crypto project gets a windfall. Now comes the hard part