Winter School on Cryptography Symmetric Encryption: Definitions, Modes and MACs – Kenny Paterson – Video


Winter School on Cryptography Symmetric Encryption: Definitions, Modes and MACs - Kenny Paterson
The topic of the 4th Annual Bar-Ilan Winter School on Cryptography held in January 2014, was Symmetric Encryption in Theory and in Practice. The winter schoo...

By: barilanuniversity

The rest is here:
Winter School on Cryptography Symmetric Encryption: Definitions, Modes and MACs - Kenny Paterson - Video

Winter School on Cryptography Symmetric Encryption: Record layer security – Kenny Paterson – Video


Winter School on Cryptography Symmetric Encryption: Record layer security - Kenny Paterson
Record layer security notions and results, a lecture by Kenny Paterson. The topic of the 4th Annual Bar-Ilan Winter School on Cryptography held in January 2014, was Symmetric Encryption in...

By: barilanuniversity

Read more here:
Winter School on Cryptography Symmetric Encryption: Record layer security - Kenny Paterson - Video

Winter School: Authenticated encryption schemes and Misuse-resistance – Thomas Ristenpart – Video


Winter School: Authenticated encryption schemes and Misuse-resistance - Thomas Ristenpart
Authenticated encryption schemes and Misuse-resistance, a lecture by Thomas Ristenpart. The topic of the 4th Annual Bar-Ilan Winter School on Cryptography held in January 2014, was Symmetric...

By: barilanuniversity

Read the rest here:
Winter School: Authenticated encryption schemes and Misuse-resistance - Thomas Ristenpart - Video

Winter School on Cryptography Symmetric Encryption: Cryptanalysis of Hash Functions – Eli Biham – Video


Winter School on Cryptography Symmetric Encryption: Cryptanalysis of Hash Functions - Eli Biham
Cryptanalysis of Hash Functions, a lecture by Eli Biham. The topic of the 4th Annual Bar-Ilan Winter School on Cryptography held in January 2014, was Symmetric Encryption in Theory and in...

By: barilanuniversity

Originally posted here:
Winter School on Cryptography Symmetric Encryption: Cryptanalysis of Hash Functions - Eli Biham - Video

Winter School on Cryptography Symmetric Encryption: Differential Cryptanalysis – Eli Biham – Video


Winter School on Cryptography Symmetric Encryption: Differential Cryptanalysis - Eli Biham
Differential Cryptanalysis, a lecture by Eli Biham. The topic of the 4th Annual Bar-Ilan Winter School on Cryptography held in January 2014, was Symmetric Encryption in Theory and in Practice....

By: barilanuniversity

Continued here:
Winter School on Cryptography Symmetric Encryption: Differential Cryptanalysis - Eli Biham - Video

Winter School on Cryptography Symmetric Encryption: Generic Cryptanalytic Techniques – Orr Dunkelman – Video


Winter School on Cryptography Symmetric Encryption: Generic Cryptanalytic Techniques - Orr Dunkelman
Generic Cryptanalytic Techniques, a lecture by Orr Dunkelman. The topic of the 4th Annual Bar-Ilan Winter School on Cryptography held in January 2014, was Symmetric Encryption in Theory and...

By: barilanuniversity

The rest is here:
Winter School on Cryptography Symmetric Encryption: Generic Cryptanalytic Techniques - Orr Dunkelman - Video

Microsoft’s .NET Framework security updates further effort to phase out RC4 encryption

Microsoft released optional security updates Tuesday for various versions of the .NET Framework that prevent the RC4 encryption algorithm from being used in TLS (Transport Layer Security) connections.

The updates are only available through the Windows Update Catalog and the Microsoft Download Center, not Windows Update, and are part of Microsofts efforts that began in November to phase out the use of RC4 in TLS. They are in addition to the companys scheduled security patches for Windows, Internet Explorer and Office.

The Rivest Cipher 4 (RC4) was invented in 1987 by cryptographer Ronald Rivest and remained a popular encryption algorithm over the years despite cryptographic weaknesses being discovered by researchers.

Until last year, the use of RC4 as a preferred cipher in TLS was considered safe and actually recommended for a while after cipher-block chaining mode ciphers like AES-CBC were found to be vulnerable to attacks.

However, in March 2013, a team of researchers presentedfeasible attacks against RC4 as used in TLS; subsequent revelations about the U.S. National Security Agencys efforts to defeat encryption sparked concerns that breaking RC4 might be within its capabilities.

In November Microsoft released an update for Windows 7, Windows 8, Windows RT, Windows Server 2008 R2 and Windows Server 2012 that allowed system administrators to disable RC4 support using registry settings. The new optional updates released Tuesday do the same thing, but for the .NET Framework.

The use of RC4 in TLS could allow an attacker to perform man-in-the-middle attacks and recover plaintext from encrypted sessions, Microsoft said in >a security advisory Tuesday. A man-in-the-middle attack occurs when an attacker reroutes communication between two users through the attackers computer without the knowledge of the two communicating users. Each user in the communication unknowingly sends traffic to and receives traffic from the attacker, all the while thinking they are communicating only with the intended user.

While blocking RC4 is recommended, the company said that customers should plan and test the new settings prior to making this change in their environments.

TLS offers a choice of ciphers that server administrators can specify in their configurations, but versions 1.0 and 1.1 of the protocol support only CBC ciphers and RC4, all of which are now considered insecure.

The AES-GCM cipher is a safe alternative, but it is only available in TLS version 1.2 which has yet to see widespread deployment. A scan of the top 155,000 HTTPS websites performed this month by the SSL Pulse Project revealed that only around 35 percent of them supported TLS 1.2.

See more here:
Microsoft's .NET Framework security updates further effort to phase out RC4 encryption

Red Hat brings OpenShift closer to the enterprise

Red Hat continues to enhance its software portfolio for helping organizations run and manage cloud services in their own data centers, adding more features to its OpenShift Enterprise software package to accommodate enterprise requirements such as policy orchestration and multiregion availability.

OpenShift Enterprise 2.1, available now, also includes new releases of the latest open source software used in the platform-as-a-service (PaaS) hosting package, such as PHP and MySQL.

Although it gets less attention than the IaaS (infrastructure-as-a-service)-style cloud services, PaaS services can be valuable.

IaaS provides a complete OS within a cloud-based virtual machine, into which a user can install software programs. PaaS services, on the other hand, free organizations from maintaining the underlying operating systems, middleware or other underlying components that run an application. PaaS providers maintain the OS, and offer specific supporting programs, such as a database or programming language runtime, that developers can use to build their cloud-based applications.

Google, IBM, Microsoft and Safesforce.com all offer PaaS services.

Red Hat launched OpenShift Enterprise in 2012 as a version of its online OpenShift PaaS that could be run by an organization within its own data center. OpenShift Enterprise could be used as a foundation for hosting providers to offer PaaS to their customers, as well as for large organizations that may want to run PaaS services in-house.

Running OpenShift Enterprise is also designed to provide an organization an easy way to transfer their workloads over to Red Hats own OpenShift cloud offering, for purposes of disaster recovery or workload balancing.

The new version of OpenShift Enterprise, currently available, offers a number of new features to better help incorporate PaaS into the workplace.

A new plug-in will help organizations incorporate OpenShift services within their own policy orchestration engines, allowing them to incorporate services built on PaaS into their own complex workflows spanning multiple business units.

The software introduces the concept of zones and regions, allowing organizations to make their systems more reliable, but spreading out resources across multiple geographic areas. If a service stops running in one geographic area, due to a natural disaster, a duplicate of that service in another zone can pick up the work.

Read more:
Red Hat brings OpenShift closer to the enterprise