In the News

Breakthrough in MPC cryptography could make cloud computing more secure

A recent breakthrough in multi-party computation (MPC) cryptography may result in a “sea change” in computing security according to Peter Scholl, a researcher in the Cryptography and Information Security group at the University of Bristol.

Read More >>

E-Commerce Security: What Every Enterprise Needs to Know

“If a cybercriminal can steal the secret keys that are used to encrypt user data and credit card numbers, then the encryption no longer helps,” Lindell observes. “The data can be stolen as well. It’s like locking the door and keeping the keys under the doormat. Make sure no single individual—either inside employee, or an attacker for this matter—has full access to the encryption keys.”

Read More >>

SECURITY COMPANY’S CRYPTOGRAPHY PLAY AIMS AT TECH FIRMS, FINANCE

“The company’s Crypto Suite product,” says CEO Avner Mor, “Is aimed at the software, financial, and health care industries.” According to Mor, a major part of the system is the fact that it can protect secret, sensitive cryptography keys. In some contexts, it extracts information from data without actually accessing files, which is an advantage for very security-sensitive industries like finance.

Read More >>

Why Verizon’s “zombie cookies” are scarier than ever

“The tokens Verizon passes to advertisers are not encrypted, according to Yehuda Lindell, chief scientist of Dyadic Security, an Israeli security firm. If they’re intercepted, the information is there to be read. Advertisers that receive tokens won’t be able to link the information to specific users, but Verizon can, because the carrier has detailed information on its customers, Lindell says. Even if we assume that Verizon won’t do anything untoward with the information, its network could be hacked, and the unencrypted data could fall into the wrong hands, according to Lindell.”

Read More >>

Breakthrough in cryptography could result in more secure computing

The SPDZ protocol (pronounced “Speedz”) is a co-development between Bristol and Aarhus and provides the fastest protocol known to implement a theoretical idea called “Multi-Party Computation.” The idea behind Multi-Party Computation is that it should enable two or more people to compute any function of their choosing on their secret inputs, without revealing their inputs to either party. One example is an election, voters want their vote to be counted but they do not want their vote made public.

Read More >>
Page 25 of 25« First...10...2122232425