Tag Archive for: Crypto

Google confirms critical Android crypto flaw used in $5700 Bitcoin heist – Ars Technica


Ars Technica

Google confirms critical Android crypto flaw used in $ 5700 Bitcoin heist
Ars Technica
which is one of the programming services for generating random numbers provided by the JCA. Contrary to many earlier reports, the flaw affects all versions of Android not just 4.2 and earlier, Android Security Engineer Adrian Ludwig told Ars.
Google confirms Android flaw that led to Bitcoin theftCNET
Google Confirms Security Compromise in Android Apps Using Java App Developer Magazine
Android SecureRandom Bitcoin wallet vulnerability could be used to hack more V3.co.uk

all 4 news articles »

“android security” – read more

Crypto experts issue a call to arms to avert the cryptopocalypse

lyudagreen

At the Black Hat security conference in Las Vegas, a quartet of researchers, Alex Stamos, Tom Ritter, Thomas Ptacek, and Javed Samuel, implored everyone involved in cryptography, from software developers to certificate authorities to companies buying SSL certificates, to switch to newer algorithms and protocols, lest they wake up one day to find that all of their crypto infrastructure is rendered useless and insecure by mathematical advances.

We’ve written before about asymmetric encryption and its importance to secure communication. Asymmetric encryption algorithms have pairs of keys: one key can decrypt data encrypted with the other key, but cannot decrypt data encrypted with itself.

The asymmetric algorithms are built on an underlying assumption that certain mathematical operations are “hard,” which is to say, that the time it takes to do the operation increases proportional to some number raised to the power of the length of the key (“exponential time”). However, this assumption is not actually proven, and nobody knows for certain if it is true. The risk exists that the problems are actually “easy,” where “easy” means that there are algorithms that will run in a time proportional only to the key length raised to some constant power (“polynomial time”).

Read 10 remaining paragraphs | Comments

    


Ars Technica » Technology Lab

Google builds bigger crypto keys to make site forgeries harder – Ars Technica


Ars Technica

Google builds bigger crypto keys to make site forgeries harder
Ars Technica
The Flame espionage malware that targeted Iran wielded a never-before-seen collision attack to hijack Microsoft's Windows Update mechanism. Researchers have estimated that the SHA1 algorithm, which is considered more resistant to collision attacks and

and more »

flame malware – read more

CeBIT 2013: Red October Had EU And German Crypto Codes – Kaspersky – TechWeekEurope UK


TechWeekEurope UK

CeBIT 2013: Red October Had EU And German Crypto Codes – Kaspersky
TechWeekEurope UK
Kaspersky, the Russian security firm which first described the malware-based snooping operation in January, presented more details during a press conference at the CeBIT show in Hanover, Germany. Red October operated for at least five years, attacking

flame malware – read more