Tag: Public-key cryptography

NSA infiltrated RSA security more deeply than thought – study

CyberAttack_0204131-617x416

(Reuters) – Security industry pioneer RSA adopted not just one but two encryption tools developed by the U.S. National Security Agency, greatly increasing the spy agency's ability to eavesdrop on some Internet communications, according to a team of academic researchers.

RSA Tells Its Developer Customers: Stop Using NSA-Linked Algorithm

ggfgfgffggfddfdffd.jpg.1000x297x1

Amidst all of the confusion and concern over an encryption algorithm that may contain an NSA backdoor, RSA Security released an advisory to developer customers today noting that the algorithm is the default in one of its toolkits and strongly

REVIEW: Cryptography Decrypted

cryptode

by H. X. Mel/Doris Baker, 2001, Addison-Wesley Publishing Co. , 352 p. ______________________________________________________________________________________________________________________________ The book seems to be rather ambitious, since the preface says that it is addressed to any (and therefore all) audience(s), without any limitation on the stated

REVIEW: Internet Cryptography

9780201924800

by Richard E. Smith, Publisher: Addison-Wesley Professional, Copyright 1997 _______________________________________________________________ According to the preface, this book is aimed at non-specialists who need to know just enough about cryptography to make informed technical decisions. As an example, Smith suggests systems administrators

REVIEW: Modern Cryptography: Theory and Practice

205908-200x200

by Wenbo Mao, 2004, 0-13-066943-1, U$54.99/C$82.99 ___________________________________________________________________________________________________________   A "Short Description of the Book" states that it is intended to address the issue of whether various crypto algorithms are "practical," as opposed to just theoretically strong.  This seems odd, since