Cryptography
19 views | +0 today
Follow
Your new post is loading...
Your new post is loading...
Scooped by Join Webcyber
Scoop.it!

Standard Cryptographic Algorithm Naming

Standard Cryptographic Algorithm Naming http://t.co/0xS5HFwT6E
more...
No comment yet.
Scooped by Join Webcyber
Scoop.it!

Hard to Crack: The Government's Encryption Conundrum - New Yorker (blog)

Hard to Crack: The Government's Encryption Conundrum - New Yorker (blog) | Cryptography | Scoop.it
New Yorker (blog) Hard to Crack: The Government's Encryption Conundrum New Yorker (blog) But in an asymmetric encryption scheme like the one described by Diffie and Hellman, for instance, a user has two keys: a public one that is shared openly to...
more...
No comment yet.
Scooped by Join Webcyber
Scoop.it!

If public key cryptography were really broken - ZDNet (blog)

If public key cryptography were really broken - ZDNet (blog) | Cryptography | Scoop.it
If public key cryptography were really broken
ZDNet (blog)
Summary: The solution to a mathematical problem generally considered insolvable would doom almost all trust on the Internet. Could it actually happen?
more...
No comment yet.
Rescooped by Join Webcyber from JavaScript for Line of Business Applications
Scoop.it!

Testing Security of HTML5 WebSockets

Recently I became faced with my first Web Application Security Assessment which relied heavily on HTML5′s WebSockets.

The first clue that the application was using WebSockets was when the application kept giving me a timeout error while using my proxy of choice, Burp Suite. Looking at the HTTP requests/responses in Burp I noticed that a large JavaScript file was requested and downloaded from the server. Within this file I noticed a URL with the ws:// scheme, the WebSocket scheme.

For some reason the WebSocket handshake was not captured by Burp’s Proxy (even though the WireShark capture shows that the handshake was over HTTP), however, it can be viewed within Google Chrome’s Developer Tools and OWASP’s ZAP Proxy.


* Encryption (SSL/TLS)
* Origin
* Authentication
* Authorisation
* Input Sanitisation

 


Via Jan Hesse
more...
Benjamin Dean's curator insight, September 3, 2013 1:13 AM

As web apps move to be more "real-time" via socket connections, this is probably a good discussion.

Scooped by Join Webcyber
Scoop.it!

Exclusive: Army Admits To Major Computer Security Flaw - BuzzFeed

Exclusive: Army Admits To Major Computer Security Flaw - BuzzFeed | Cryptography | Scoop.it
Exclusive: Army Admits To Major Computer Security Flaw BuzzFeed The United States Army's Deputy of Cybersecurity Roy Lundgren has confirmed with BuzzFeed the existence of a major computer security flaw that enables unauthorized access to users...
more...
No comment yet.
Scooped by Join Webcyber
Scoop.it!

Tutorial with code : Symmetric-key Encryption and Decryption in Java | Java Query : Java, Simply Coded

Tutorial with code : Symmetric-key Encryption and Decryption in Java | Java Query : Java, Simply Coded | Cryptography | Scoop.it
#security #java #encryption #decryption #symmetric... http://t.co/D03G9JnBJv
more...
No comment yet.
Scooped by Join Webcyber
Scoop.it!

Email Encryption: Worth the Trouble? - Tom's Guide

Email Encryption: Worth the Trouble? - Tom's Guide | Cryptography | Scoop.it
Email Encryption: Worth the Trouble?
Tom's Guide
It's not easy.
more...
No comment yet.
Scooped by Join Webcyber
Scoop.it!

Leaked US spying budget shows investments in 'groundbreaking' cryptanalysis - CSO

Leaked US spying budget shows investments in 'groundbreaking' cryptanalysis - CSO | Cryptography | Scoop.it
Leaked US spying budget shows investments in 'groundbreaking' cryptanalysis CSO Some crypto experts believe that there is not reason to believe the NSA can crack strong encryption algorithms vetted by scientists, but others said that the...
more...
No comment yet.
Scooped by Join Webcyber
Scoop.it!

Lavabit is defunct – so what's a fan of secure email to do now? - The Guardian

Lavabit is defunct – so what's a fan of secure email to do now? - The Guardian | Cryptography | Scoop.it
The Guardian
Lavabit is defunct – so what's a fan of secure email to do now?
The Guardian
And what is asymmetric encryption? It's a complicated way of scrambling email messages to prevent the wrong people reading them.
more...
No comment yet.
Scooped by Join Webcyber
Scoop.it!

Quantum cryptography is the last, best defense - InfoWorld (blog)

Quantum cryptography is the last, best defense - InfoWorld (blog) | Cryptography | Scoop.it
Quantum cryptography is the last, best defense
InfoWorld (blog)
Most of today's popular cipher algorithms (especially public/private key exchanges) work because the math involved is very difficult for conventional (nonquantum) computers to solve.
more...
No comment yet.