Tag: cryptography

  • Book review: Serious Cryptography

    This year, Alice and Bob will have been exchanging messages for 40 years. In terms of their contribution to cryptography, they have been almost as important as that other invention of their creators Rivest, Shamir and Alderman: the RSA cryptosystem. Alice and Bob have helped a great many people understand the basics of what is…

  • Book review: Serious Cryptography

    This year, Alice and Bob will have been exchanging messages for 40 years. In terms of their contribution to cryptography, they have been almost as important as that other invention of their creators Rivest, Shamir and Alderman: the RSA cryptosystem. Alice and Bob have helped a great many people understand the basics of what is…

  • Review: BSides London 2017

    This month, for the first time in its 28-year history, Virus Bulletin became the sponsor of another industry conference: BSides London . I have to admit to having been more than a little proud to see the VB logo displayed on the screens in between sessions. Of course, I was also happy to see lots…

  • Review: BSides London 2017

    This month, for the first time in its 28-year history, Virus Bulletin became the sponsor of another industry conference: BSides London . I have to admit to having been more than a little proud to see the VB logo displayed on the screens in between sessions. Of course, I was also happy to see lots…

  • Why the SHA-1 collision means you should stop using the algorithm

    Unexpected though it may have been, the SHA-1 collision found by researchers at CWI Amsterdam and Google earlier this year is one of the biggest security stories of 2017 thus far. Now, stories about breaking cryptographic protocols tend to attract a disproportionate amount of media attention compared to the likelihood of them ever being exploited…

  • Why the SHA-1 collision means you should stop using the algorithm

    Unexpected though it may have been, the SHA-1 collision found by researchers at CWI Amsterdam and Google earlier this year is one of the biggest security stories of 2017 thus far. Now, stories about breaking cryptographic protocols tend to attract a disproportionate amount of media attention compared to the likelihood of them ever being exploited…

  • The SHA-1 hashing algorithm has been ‘shattered’

    Researchers from Google and CWI Amsterdam have created the first publicly known SHA-1 collision. SHA-1 is a hashing algorithm: it turns data of arbitrary size (such as a string of text, or a file) into a fixed-length string, with a number of cryptographic properties . Hash functions are ubiquitous in IT in general and security in…

  • The SHA-1 hashing algorithm has been ‘shattered’

    Researchers from Google and CWI Amsterdam have created the first publicly known SHA-1 collision. SHA-1 is a hashing algorithm: it turns data of arbitrary size (such as a string of text, or a file) into a fixed-length string, with a number of cryptographic properties . Hash functions are ubiquitous in IT in general and security in…

  • VB2016 paper: Great crypto failures

    “More malware is using cryptography, and more malware is using better cryptography,” said Check Point researcher Yaniv Balmas on stage during VB2016. While the increased use of cryptography in general in recent years has been a great development, it is rather frustrating to find malware authors having joined the bandwagon – with ransomware being the ultimate…

  • VB2016 paper: Great crypto failures

    “More malware is using cryptography, and more malware is using better cryptography,” said Check Point researcher Yaniv Balmas on stage during VB2016. While the increased use of cryptography in general in recent years has been a great development, it is rather frustrating to find malware authors having joined the bandwagon – with ransomware being the ultimate…