Schema-Root.org logo

 

  cross-referenced news and research resources about

 cryptography

Schema-Root.org logo
images:  google   yahoo YouTube
spacer

updated Sun. May 6, 2018

-
Instead of attempting to mirror the lightning-fast processing speeds of current programmatic digital advertising — blockchain protocols like Ethereum are very slow in terms of real-time transactional processing — NYIAX is employing blockchain as a shared, permanent ledger to record smart contracts for ad ...
It supports read receipts, full-resolution photos and video, and group texts, among other features. Chat did not get an upgrade from SMS in the encryption department. Chat is not end-to-end encrypted, which means it is not as secure as Apple's iMessage, or WhatsApp. Critics are calling out Google for not having end-to-end ...

"Not only does this shockingly retrograde step leave Google lagging behind its closest competitors — Apple's iMessage and Facebook's WhatsApp both have end-to-end encryption in place by default — it is also a step backwards from the company's previous attempts at online messaging," Joe Westby, ...
Instead of attempting to mirror the lightning-fast processing speeds of current programmatic digital advertising — blockchain protocols like Ethereum are very slow in terms of real-time transactional processing — NYIAX is employing blockchain as a shared, permanent ledger to record smart contracts for ad ...
Protecting the tiny networks within IoT devices demands a new class of lightweight cryptography, which is why NIST has kicked off its effort to find ... One specification NIST is looking for in the submitted algorithms is an authenticated encryption with associated data (AEAD) tool so that recipients can verify ...
GnuPG is based on the PGP encryption program created by Phil Zimmerman and later bought by Symantec. Unlike Symantec's offering, GnuPG is completely free software and part of the GNU Project. The software is command-line based and offers hybrid-encryption by use of symmetric-key cryptography ...

Recent events have put data security at the top of the enterprise agenda, and big vendors are reacting. This week alone both Google and Microsoft revealed plans to make their email services more secure. That is not to say that they weren't secure already. However, what they, and other vendors building ...
Threatpost's Tom Spring talks to crypto expert Nate Cardozo, senior staff attorney with the Electronic Frontier Foundation at RSA Conference 2018 about the U.S. government's current position on device encryption and law enforcement's use of iPhone passcode cracker called GreyKey.
These benefits stem from a range of significant functionality improvements, including an enhancement of the automated encryption client registration procedure, ... "Standard interfaces and interoperability are essential to making cryptography work for everyone, and through high quality technology and ...
My response to the alleged “data breach” in the Facebook / Cambridge Analytica saga might surprise some: “It's not a breach if data was supplied with consent!” How often have we seen our friends post on their Facebook profile the results of some new personality test, IQ test, or super addictive free game?
James Comey is an controversial figure. His new book shows he's strongly opposed to Donald Trump, but he may have also helped get Trump elected President. And the former FBI director is opposed to the encryption that protects the privacy of iPhone users. Comey' s book, A Higher Loyalty, says Apple's decision to ...
“The Australian Government wants to build what they call a back door into end-to-end encryption. And the result would be, basically its weakening end to end encryption, it's not just the government that will snoop, its hackers, its bad guys, it's the Chinese and Russian governments, so this is a crazy idea,” ...
During the FBI/Apple's standoff over the San Bernardino shooter's iPhone, Trump denounced the company and called for a boycott. But while other top cabinet officials, like Attorney General Jeff Sessions, have been outspoken about the need to “overcome encryption,” the president hasn't said much on the ...
The Ukrainian regulator National Council has reissued satellite licences for the channels Inter, NTN, Mega, K1, K2, Pixel, Enter-film and Zoom, all of which are part of the Inter Media Group. According to Mediasat and Detector Media, this is due to changes in the technical characteristics of the channels, ...
Former FBI director James Comey is extremely critical about Apple, other tech companies, and their policies when it comes to encryption in his new book "A ... held by law enforcement, as well as what Comey has said all along in testimony and other public comments about data privacy and encryption.
Former FBI Director James Comey isn't only talking about President Donald Trump in his new memoir, A Higher Loyalty. In a discussion on encryption and data security, Comey said that Apple and Google's decision in 2014 to encrypt their mobile devices to improve user privacy angered the former FBI ...
Russian regulators classify Telegram as an operator of information dissemination in Russia, therefore the company is required to provide keys to its encryption service to Russia's Federal Security Service. This is so the FSS can reportedly read the messages of suspected terrorists. On March 20, the Russian ...

In a move that could have a severe impact on how the global cryptocurrency market communicates, a Russian court has ruled that telecommunications providers must block highly popular encrypted messaging app Telegram within the country. The decision was made in Moscow earlier today, approving a ...
The messaging platform has been under pressure to hand over encryption keys to Russian authorities so they can access user data — which they claim is needed for counterterrorism purposes — but has so far refused. However late last month Telegram lost a bid before the Supreme Court to block security ...
A bipartisan group of lawmakers is pressing FBI Director Christopher Wray on the bureau's efforts to unlock encrypted devices after a critical watchdog report. In a letter sent Friday, the lawmakers called into question recent statements made by Wray and others that the bureau is unable to access scores of ...
Ambuj Kumar says he'll face a higher hurdle than the other nine finalists in the RSAC Innovation Sandbox Contest on Monday, when he'll have three minutes to convince judges that his startup, Fortanix, deserves to win the prestigious competition. The Sandbox contest is one of the kick-off events at RSA ...
Honda Motor Co Ltd says that it will apply cryptographic technologies to its vehicles to be mass-produced in 2019 and later with the aim of preventing the vehicles from being hacked. Toyota Motor Corp will also start to apply cryptographic technologies to mass-produced cars in the same year. In view of the ...
Point of fact: If you outlaw strong encryption, only criminals will have it. The United States is not the only country in the world producing its own encryption products, after all, and no authority can reasonably hope to curb its importation. Encryption software is downloaded, covertly if necessary, not offloaded ...
Telegram was created by Nikolai and Pavel Durov, who refused to provide the government with encryption keys, or an equivalent backdoor. Providing such a backdoor would have allowed the Russian state to have monitored every text or call using Telegram, possibly in real-time, by users in Russia and ...
Since these numbers are public, they can't be used for encryption. But Rene Peralta, a NIST computer scientist in charge of the service, says that governments are interested in using the random number generators to prevent corruption. For example, Peralta is working with the government of Chile to ...
Fortanix Runtime Encryption Plugins further empower security architects and application owners to develop and protect custom code or business logic in an easy to use and agile manner. “SDKMS helps organizations with cryptographic agility by enabling them to adapt to new cryptography schemes,” said ...
Nearly half of organizations have an enterprise encryption strategy that is applied consistently across the entire organization, a new encryption survey revealed. Forty-three percent of respondents to Thales' “2018 Global Encryption Trends Study” said their employer had an enterprisewide encryption plan in ...
0:00. Autoplay: onoff. share; fullscreen. TK Keanini offered ZDNet's Tonya Hall a closer look at Cisco's annual cybersecurity report and his job as the company's principal engineer. The 2018 report covers the evolution of malware, malicious encrypted web-traffic, and the rise of AI. Watch the video interview ...
Raise your hand if you remember the infamous “Apple vs. FBI” feud. If you haven't been living under a rock, you probably know about this or at the very least have heard of it. And if you paid enough attention, you'd know that this debate was less about Apple and more about encryption. Since the San ...
Vance has been arguing for fresh anti-encryption laws for several years, even producing a 42-page report back in November 2015 that walked through how the ... The meetings have also prompted cryptography experts and privacy pit bull Senator Ron Wyden (D-OR) to write letters outlining their concerns, ...
Encryption and the digital keys that allow firms to scramble and descramble data are permanent parts of the payments landscape. There's a personal element to the technical wizardry, though. Data needs management, and protecting that data requires vigilance. And yet, many firms do not have the staff in place to manage ...
When the government argues that it's “going dark” because of ubiquitous end-to-end encryption, it often stresses how encryption thwarts counterterrorism investigations. When FBI Director Christopher Wray testified before Congress late last year, the first encryption-related example he gave was of FBI ...
To appreciate why bcrypt matters, some background on cryptographic defenses helps. The basic approach to shielding passwords involves “hashing,” which converts them into random strings of characters stored in a database. When someone logs in with a plain-text password, the hashed version of this is ...
This is biggest update to ProtonMail, which uses end-to-end encryption and open source cryptography, since December, when it rolled out a new bridge tool that allowed users to integrate with Thunderbird, Microsoft Outlook, and Apple Mail, a change the company hoped would bring many new users into ...
Most of the traffic on the web is encrypted. And more websites are adopting basic encryption measures every day. That means that, in theory, eavesdroppers have a hard time seeing whom you're writing to on Gmail or what you're looking up on Wikipedia. But there's a catch. Big sites like Google and ...
The document published on the Russian government's official web portal on Thursday expands the earlier order for all “organizers of information distribution on the internet network” to present encryption keys if requested by the relevant FSB directorate. The order was issued after earlier this month Russia's ...
Some call it on planned “cuts” in OPEC production, others call it fallout from more and more exhausted oil fields, but the supposed “glut” of world oil inventories (stored crude) the past 3-4 years is no more. Inventories have tightened to the desired effect, so says OPEC. Ecuador Cuts off Assange's Access to ...
But that's how cryptographic research moves forward, and we ought to put our energy into such research rather than spend it on what Herb Lin described in 2015 as a “theological clash of absolutes”: that is, the abstract “it can't be done/it can be done” debate that has dominated the encryption conversation.
The publication, titled “Energy-Efficient Encryption for the Internet of Things” that describes a chip that enables public-key cryptography while simultaneously reducing power-consumption by 99.75 percent. This feat is admirable, as public-key encryption generally relies on energy and memory resources to ...
The New York Times reports that the DOJ met with researchers that claim they can solve a key problem in regulating encryption, which is that every known expert in cryptography believes that creating a digital entryway for law enforcement risks a security catastrophe. Politico reports that the Senate Intelligence Committee ...
Digital rights campaigners are celebrating a small, symbolic victory, with the country's Senate voting to protect the integrity of cryptography. The vote, which happened just before 4pm on Tuesday March 27, at least indicates that any government legislation weakening encryption won't get free passage ...
The Senate has called on the government to back the use of strong encryption technologies and resist attempts to weaken them. A motion put by Greens Senator Jordon Steele-John was carried by the Senate today, calling on the government to support strong encryption and act against “any push from ...
MIT researchers have developed an energy-efficient, hard-wired chip that they say will benefit IoT encryption and ease authentication processes in the IoT environment. ... Usually, this authentication is done using very complicated public key cryptography, and that is the most energy-consuming part of it.
TLS 1.3 is the new version of the most commonly used encryption protocol on the internet. The upgrade reflects significant changes to the protocol that are designed to protect against attacks on TLS, especially those that exploit deprecated cryptographic algorithms like MD-5 and SHA-1; it should also help ...
Analysis On December 2, 2015 Syed Farook and his wife Tashfeen Malik attended his employer's holiday party in San Bernardino, California – and without warning started indiscriminately shooting at fellow employees. Four minutes and 75 bullets later, 14 people were dead and 17 injured. Farook and ...
He claimed his harmonic alphabet ensured strong encryption and expressed the words “perfectly to the eye as they do the harmony to the ear.” He also wrote of English philosopher Francis Bacon's music cipher technique, in which a particular number of the notes A or B equate to each alphabet letter ...
Seeking to dispel "misgivings" on Aadhaar, the Centre on Thursday asserted before the Supreme Court that biometric details of individuals were not shared with anyone and it was almost impossible to break its encryption even as the court asked questions regarding denial of benefits for want of biometric ...
Last year, an IETF working group mulled whether HTTPS is a suitable mechanism to protect internet users' domain name requests from prying eyes. Now Mozilla has decided to lend a hand by testing a DNS-Over-HTTPS (yes, the acronym is DOH) implementation. Mozilla's planned week-long test is no ...
Encryption — the act of turning understandable “plaintext” data into unintelligible “ciphertext” — is an old concept, said Fred Cate, vice president for ... But Kamara acknowledges that future cryptographic research could reveal ways of balancing law enforcement interests with the privacy of ordinary people.
CEO Pavel Durov continued to assert that Telegram encryption keys will not be shared with the FSB despite the Russian Supreme Court denying the company's appeal.


 

news and opinion


 


 


 


 


schema-root.org

   cryptography

technology:
   aquarium
   bridges
   chemical
   clothing
   computer
   cryptography
   data
   design
   energy
   engines
   finance
   flight
   fluidics
   food
   furnaces
   glass
   guns
   imaging
   knives
   knots
   laser
   magnet
   materials
   mechanics
   metrology
   motor
   nano
   nuclear
   optics
   packaging
   paper
   plastics
   printing
   pumps
   robots
   rockets
   salvage
   steam
   textiles
   tools
   toys
   water
   wells
   wheels