Mobile tech 'can replace cheques'
(PhysOrg.com) -- With cheques due to be phased out in the UK by 2018 new security technology developed at Oxford University could offer a replacement, allowing people a secure way to pay in almost any...
View ArticleEngineers devise new method for securing location-sensitive data by using...
(PhysOrg.com) -- A research group led by computer scientists at the UCLA Henry Samueli School of Engineering and Applied Science has proved that cryptography -- the practice and study of hiding...
View ArticleSecure updates for navigation systems and company
At the push of a button by the driver, control units download the car manufacturer's new software -- such as enhanced map material for the navigation system. To ensure that this data channel is...
View ArticleCryptographic attack highlights the importance of bug-free software
A padlocked icon in a web-browser or a URL starting with https provides communication security over the Internet. The icon or URL indicates OpenSSL, a cryptography toolkit implementing the SSL...
View ArticleVM researchers post rude awakening about virtualization security
(Phys.org)—A virtual machine stealing information from another virtual machine running on the same piece of hardware? That's not supposed to happen. Virtual machines run various tasks on a single...
View ArticleNIST proposes update to digital signature standard
The National Institute of Standards and Technology (NIST) has announced proposed changes to a standard that specifies how to implement digital signatures, which can be used to ensure the integrity of...
View ArticlePlayStation 3 hack is decryption jolt for Sony
(Phys.org)—This week brings more bad security news for Sony. The unlocking of a console, called jailbreaking, is a way that the jailbreakers get to fulfill their wishes to customize their console to...
View ArticleNew NIST document offers guidance in cryptographic key generation
(Phys.org)—Protecting sensitive electronic information in different situations requires different types of cryptographic algorithms, but ultimately they all depend on keys, the cryptographic equivalent...
View ArticleBeefing up public-key encryption
Most financial transactions on the Internet are safeguarded by a cryptographic technique called public-key encryption. Where traditional encryption relies on a single secret key, shared by both sender...
View ArticleMaking quantum encryption practical
One of the many promising applications of quantum mechanics in the information sciences is quantum key distribution (QKD), in which the counterintuitive behavior of quantum particles guarantees that no...
View ArticleComputer scientists develop tool to make the Internet of Things safer
Computer scientists at the University of California, San Diego, have developed a tool that allows hardware designers and system builders to test security- a first for the field. One of the tool's...
View ArticleQuantum key distribution technology: Secure computing for the 'Everyman'
The largest information technology agreement ever signed by Los Alamos National Laboratory brings the potential for truly secure data encryption to the marketplace after nearly 20 years of development...
View ArticleEncryption for everyone
In the wake of the revelations that intelligence agencies have been engaged in mass surveillance activities, both industry and society at large are looking for practicable encryption solutions that...
View ArticleVerification testing of quantum cryptographic communication system that...
Toshiba Corporation will start verification testing of the transmission of genome analysis data using quantum cryptography that is theoretically completely secure from tapping. Testing will start on...
View ArticleTechnology to securely turn biometric data into a cryptographic key
Fujitsu Laboratories Ltd. today announced the development of a technology that turns biometric data, such as palm veins, into a cryptographic key. This newly developed technology enhances the security...
View Article