Cryptography

Showing results 1 to 20 of 186

Sponsored by Red Hat and Intel

August 14, 2014 by

Building trust and security through open source governance

Adoption of open source software in the enterprise continues to grow, with research suggesting the two largest factors fueling this growth are security and quality. Surprising, perhaps, given revelations of the much-publicised Heartbleed vulnerability discovered in a widely used open source cryptography library earlier this year.

May 6, 2014 by

SHA-2 takes off, thanks to Heartbleed

Industry and standards bodies had announced the transition from SHA-1 hashes to SHA-2 in certificates some time ago, but adoption was weak. Now Heartbleed has created an opportunity to jumpstart the transition.

February 5, 2014 by

NIST makes a hash of SHA-1 ban

The National Institute of Standards and Technology has declared that "SHA-1 shall not be used for digital signature generation after December 31, 2013." So why are they still using it?

December 12, 2013 by

Intel, Via hardware crypto not to be trusted

[UPDATE] In light of government attempts to subvert products and standards, both Linux and FreeBSD add extra entropy/randomness to the output of Intel's and Via's opaque hardware-based random number generators. Smart move.

Newsletters

You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
Subscription failed.
See All
See All

Most Popular