8 links
tagged with all of: security + cryptography
Click any tag below to further narrow down your results
Links
OpenSSH has implemented post-quantum key agreement algorithms to protect SSH connections against potential attacks from future quantum computers. Since version 9.0, it has defaulted to these algorithms and will issue warnings for non-post-quantum connections starting with version 10.1. Users are encouraged to update their servers to utilize these stronger cryptographic methods to prevent vulnerabilities associated with "store now, decrypt later" attacks.
The article discusses the importance of scanning for post-quantum cryptographic support as quantum computing technology advances. It emphasizes the need for organizations to assess their current cryptographic systems and prepare for potential vulnerabilities that quantum attacks may pose. Strategies for implementing post-quantum cryptography are also explored to enhance security in the future.
The article discusses the CHACHA and AES cryptographic algorithms, highlighting their simplicity and effectiveness in securing data. It delves into the design principles behind both algorithms, comparing their performance and use cases in modern cryptography. The focus is on how these algorithms balance security with efficiency in various applications.
Go has introduced native FIPS 140-3 support in its standard library, enhancing compliance for users in regulated environments. The Go Cryptographic Module v1.0.0, which is integrated into Go 1.24, simplifies the developer experience while ensuring uncompromised security and broad platform support. This new module provides a compliant and efficient solution for cryptographic operations in Go applications.
Google commissioned Trail of Bits to audit Go's cryptography packages, resulting in one low-severity finding related to memory management in the legacy Go+BoringCrypto integration and several informational findings about potential timing side-channels. The audit confirms the security of Go's cryptography libraries and highlights ongoing improvements, including a new FIPS 140-3 mode and post-quantum cryptography support.
The article reviews the cryptographic techniques employed by the Signal messaging app, highlighting its commitment to user privacy and security. It delves into the specific algorithms and protocols that underpin Signal's encryption, emphasizing the importance of robust cryptography in protecting user communications. Additionally, it discusses potential vulnerabilities and the app's response to security challenges.
Encryption is a powerful tool for securing communications, but its effectiveness can be undermined by poor key management and human errors, such as mistakenly granting access to sensitive information. The article highlights the limitations of encryption, emphasizing that the real security challenges often stem from how keys are managed rather than the cryptographic algorithms themselves. Key management remains a complex issue that significantly impacts security outcomes.
The article discusses the discovery of cryptographic vulnerabilities in Cloudflare's CIRCL library, specifically regarding its FourQ elliptic curve implementation. These issues, related to insufficient validation of points during elliptic curve computations, could potentially allow attackers to exploit the system and derive secret keys. The vulnerabilities were reported and subsequently addressed by Cloudflare.