Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment Re:AES? Yeah right (Score 2) 407

The thing with encryption (follow the Coursera course by Dan Boneh) is that the code doesn't have to be compromised for the encryption to be insecure.
And showing the encryption is secure or not. Well. That is not so easy.
Some smart ass thought doing DES twice was safer than just DES. Wrong. Meet In The Middle Attacks.
Think of the scenario where random primes are picked every time directly after a device boots. A random generator didn't have enough time to get random. Those primes that are not random but in fact very predictable.
There is a thing called an s-box. It shuffles data around in a pseudo random way. One algorithm used 5 of those. Too bad one of them was a fraction less random than the others.
Implementation mistakes or lack of understanding are the worst enemies. They are very hard to recognize. They might even require quite some research to be found.
With the complexity of encryption it's far from unthinkable that mistakes are made that cripple the strength of the algorithm.

Comment In other news (Score 1) 778

This week I read about a virus scanner that removes the option to use advances features.
Hold your horses!
What they meant was people were used to the advances features and it wasn't needed any more to call them advanced features.
The features stayed in, but were now called standard features.

Comment Hero (Score 1) 442

Spying on that many innocent people is an act of war on the innocent people.
The americas should be happy that he exposed this horror, so they can change their politics.
Same will be said about other countries when information about them is leaked.

Last thing: my friends don't spy on me.
Those who spy one me are terrorists.

Slashdot Top Deals

"If I do not want others to quote me, I do not speak." -- Phil Wayne

Working...