Researchers crack unassailable encryption algorithm in two hours

(Phys.org) —A protocol based on "discrete logarithms", deemed as one of the candidates for the Internet's future security systems, was decrypted by EPFL researchers. Allegedly tamper-proof, it could only stand up to the ...

How safe is encryption today?

When checking your email over a secure connection, or making a purchase from an online retailer, have you ever wondered how your private information or credit card data is kept secure?

PlayStation 3 hack is decryption jolt for Sony

(Phys.org)—This week brings more bad security news for Sony. The unlocking of a console, called jailbreaking, is a way that the jailbreakers get to fulfill their wishes to customize their console to run their own code and ...

A user-controlled file security scheme for cloud services

By securing data files with a 'need-to-know' decryption key, researchers at Singapore's Agency for Science, Technology and Research (A*STAR) have developed a way to control access to cloud-hosted data in real time, adding ...

page 1 from 2