Quantcast
Channel: Phys.org news tagged with:cryptographic key
Browsing latest articles
Browse All 16 View Live
↧

Mobile tech 'can replace cheques'

(PhysOrg.com) -- With cheques due to be phased out in the UK by 2018 new security technology developed at Oxford University could offer a replacement, allowing people a secure way to pay in almost any...

View Article


Engineers devise new method for securing location-sensitive data by using...

(PhysOrg.com) -- A research group led by computer scientists at the UCLA Henry Samueli School of Engineering and Applied Science has proved that cryptography -- the practice and study of hiding...

View Article


Secure updates for navigation systems and company

At the push of a button by the driver, control units download the car manufacturer's new software -- such as enhanced map material for the navigation system. To ensure that this data channel is...

View Article

Cryptographic attack highlights the importance of bug-free software

A padlocked icon in a web-browser or a URL starting with https provides communication security over the Internet. The icon or URL indicates OpenSSL, a cryptography toolkit implementing the SSL...

View Article

VM researchers post rude awakening about virtualization security

(Phys.org)—A virtual machine stealing information from another virtual machine running on the same piece of hardware? That's not supposed to happen. Virtual machines run various tasks on a single...

View Article


NIST proposes update to digital signature standard

The National Institute of Standards and Technology (NIST) has announced proposed changes to a standard that specifies how to implement digital signatures, which can be used to ensure the integrity of...

View Article

PlayStation 3 hack is decryption jolt for Sony

(Phys.org)—This week brings more bad security news for Sony. The unlocking of a console, called jailbreaking, is a way that the jailbreakers get to fulfill their wishes to customize their console to...

View Article

New NIST document offers guidance in cryptographic key generation

(Phys.org)—Protecting sensitive electronic information in different situations requires different types of cryptographic algorithms, but ultimately they all depend on keys, the cryptographic equivalent...

View Article


Beefing up public-key encryption

Most financial transactions on the Internet are safeguarded by a cryptographic technique called public-key encryption. Where traditional encryption relies on a single secret key, shared by both sender...

View Article


Making quantum encryption practical

One of the many promising applications of quantum mechanics in the information sciences is quantum key distribution (QKD), in which the counterintuitive behavior of quantum particles guarantees that no...

View Article

Computer scientists develop tool to make the Internet of Things safer

Computer scientists at the University of California, San Diego, have developed a tool that allows hardware designers and system builders to test security- a first for the field. One of the tool's...

View Article

Quantum key distribution technology: Secure computing for the 'Everyman'

The largest information technology agreement ever signed by Los Alamos National Laboratory brings the potential for truly secure data encryption to the marketplace after nearly 20 years of development...

View Article

Encryption for everyone

In the wake of the revelations that intelligence agencies have been engaged in mass surveillance activities, both industry and society at large are looking for practicable encryption solutions that...

View Article


Verification testing of quantum cryptographic communication system that...

Toshiba Corporation will start verification testing of the transmission of genome analysis data using quantum cryptography that is theoretically completely secure from tapping. Testing will start on...

View Article

Technology to securely turn biometric data into a cryptographic key

Fujitsu Laboratories Ltd. today announced the development of a technology that turns biometric data, such as palm veins, into a cryptographic key. This newly developed technology enhances the security...

View Article

Browsing latest articles
Browse All 16 View Live