Blog Posts Tagged with "Algorithms"

01ceb9281b3fb3dbb90c3efbe327717e

Is This the Year Quantum Computing Comes of Age?

January 21, 2013 Added by:Alan Woodward

When people became aware of the potential power of quantum computers there was much excitement. Not least that algorithms were being developed for quantum computers which could potentially solve problems that no classical computer would ever manage. However, most have become rather jaded over the years...

Comments  (0)

8a958994958cdf24f0dc051edfe29462

Cybersecurity and 'Smart Encryption'

December 20, 2012 Added by:Larry Karisny

Paul “Prem” Sobel is a Cal Tech MS in electrical engineering and has dedicated a 40-year career to protecting mission-critical systems. He worked with IBM, NASA, Northrop and Intel before launching MerlinCryption LLC. In this edited interview, Sobel discusses security technologies and critical infrastructure vulnerabilities...

Comments  (0)

3e35900ae6facc6c146a85c435c71d82

Everyday Cryptography: Fundamental Principles and Applications

November 20, 2012 Added by:Ben Rothke

Key management is one of the most important aspects of cryptography and often the most difficult. Part of the difficulty around key management is at the user level, with key updates, passphrase management and more. Ultimately, effective key management is essential to the underlying security of the cryptosystem...

Comments  (0)

68b48711426f3b082ab24e5746a66b36

Insecure Cryptographic Storage Explained

July 12, 2012 Added by:Fergal Glynn

The impact of Insecure Cryptographic Storage flaws when exploited is usually quite high due to the fact that the information that is usually encrypted are important things like personally identifiable information, trade secrets, healthcare records, personal information and credit card numbers...

Comments  (0)

65be44ae7088566069cc3bef454174a7

Big Brother Likes Big Data: Balancing Privacy with Innovation

June 05, 2012 Added by:Rebecca Herold

Big Data and associated analytics can be used to improve business and customer experiences and bring innovation and medical breakthroughs. However, organizations must make sure they don’t cross that line of customization and business improvements into creepiness and full-blown privacy invasion...

Comments  (0)

44fa7dab2a22dc03b6a1de4a35b7834a

The Future of Algorithms

May 17, 2012 Added by:Bill Gerneglia

Algorithms have infiltrated every application and industry on the planet. They cover standard operational control methods such as linear programming, process control and optimization, simulation, queuing, critical path analysis, project management and quality control...

Comments  (0)

Bddc4983168ae96da4b83bdd01b51548

Pump Up Your P@$$w0rd$

April 03, 2012 Added by:Kevin Doel

The idea is to choose phrase that you will be able to remember and a simple algorithm for converting it to a strong password. Even the best encryption systems are not going to protect your data if you use weak passwords and a hacker gains physical access to your mobile device...

Comments  (2)

99edc1997453f90eb5ac1430fd9a7c61

CISSP Reloaded Domain 4: Cryptography

March 28, 2012 Added by:Javvad Malik

Cryptography, the dark art of information security. The deus-ex-machina, the silver bullet, the be all and end all of all security measures, so profound cryptography was first classed as a munitions. Widely misunderstood, often poorly implemented...

Comments  (1)

Fc152e73692bc3c934d248f639d9e963

Encryption Key Management Primer – Requirement 3.6

February 23, 2012 Added by:PCI Guru

Requirement 3.6.4 always seems to be a sticking point because people get caught up in the key expiration concept. The thing to remember is that whether or not a key expires is typically related to the encryption algorithm such as for those using public key infrastructure...

Comments  (0)

01ceb9281b3fb3dbb90c3efbe327717e

Algorithms: When is Random Really Random?

February 21, 2012 Added by:Alan Woodward

The fact that we rely upon pseudorandom numbers is a potential problem for IT security. If a machine is using a known algorithm to generate a number that your system then treats as random, what is to stop an attacker from calculating that same number if he knows your algorithm...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Researchers Discover Widespread Cryptographic Vulnerabilities

February 15, 2012 Added by:Electronic Frontier Foundation

The consequences of these vulnerabilities are extremely serious. In all cases, a weak key would allow an eavesdropper on the network to learn confidential information, such as passwords or the content of messages, exchanged with a vulnerable server...

Comments  (0)

Fc152e73692bc3c934d248f639d9e963

Encryption: On Hashing Basics

February 08, 2012 Added by:PCI Guru

Never store the obscured value along with the truncated value. Always separate the two values and also implement security on the obscured value so that people cannot readily get the obscured value and the truncated value together without oversight and management approval...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Hacking Satellite Communications

February 06, 2012 Added by:Plagiarist Paganini

We must consider that compromised satellites are a serious risk, that the exposure could affect communications in the business and military sectors, and could also cause the loss of sensitive and strategic technological information...

Comments  (5)

01ceb9281b3fb3dbb90c3efbe327717e

The Emerging Threat to Public-Key Encryption

January 26, 2012 Added by:Alan Woodward

We are now entering a new era where we have programmable, relatively inexpensive, small, quantum computers visible on the horizon, and we know that such computers have the potential to undermine the mathematics upon which current public-key encryption depends...

Comments  (0)

Fc152e73692bc3c934d248f639d9e963

Encryption Basics: It's Not a Mystical Science

January 25, 2012 Added by:PCI Guru

Regardless of the algorithm used, they are not perfect. Over time, encryption algorithms are likely to be shown to have flaws or be breakable. Some flaws may be annoyances that you can work around or you may have to accept some minimal risk of their continued use...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Can You Explain Encryption to Me?

January 23, 2012 Added by:Javvad Malik

I assumed that senior technology managers would have half a clue about technology. I have thought long and hard about this and think the easiest way to explain this would be to replace the word encryption with witchcraft. It too is misunderstood by the masses...

Comments  (4)

Page « < 1 - 2 > »