Sources on this Page

> Headlines by Category

 Home / Technology / Security / Authentication & Encryption

You are using the plain HTML view, switch to advanced view for a more complete experience.

Факторизация числа, проблемы ее теории и позиция автора
     Проблема факторизации чисел возникла не вчера, она насчитывает тысячелетия. Можно лишь гадать почему в 1900 г на Математическом конгрессе Д. Гильберт не включил ее в список своих 23 проблем, а позднее она не попала в список нерешенных математических задач С. Улама. Особое внимание и интерес математиков к проблеме обозначился лишь в последние десятилетия. Возможно, стимулом стало открытие нового направления — двухключевой криптологии, появление шифров с открытым ключом. Можно предположить, что сегодняшний интерес к проблеме факторизации чисел продиктован некоторой неопределенностью относительно теоретического обоснования стойкости к раскрытию весьма популярного сегодня двухключевого шифра (личного ключа) RSA, который в принципе может быть взломан и без знания закрытого ключа. Бесключевое дешифрование. Просто в теории алгебраических колец до сих пор не найдены необходимые для этого результаты. Но есть не менее важный аспект этой проблемы — отсутствие операции обратной к умножению чисел. Простое быстрое и доступное мультипликативное разложение составных чисел может стать такой арифметической операцией, и пополнит арсенал вычислительных средств математики.
Rigged industrial software site points to watering hole attack

Attackers have rigged the website of an industrial software firm with a sophisticated reconnaissance tool, possibly in preparation for attacks against companies from several industries.

The incident was detected last week by researchers from security firm AlienVault who found rogue code injected into the website of a big industrial company that wasn't named. "The website is related to software used for simulation and system engineering in a wide range of industries, including automotive, aerospace, and manufacturing," said Jaime Blasco, director of the AlienVault Labs in a blog post.

To read this article in full or to leave a comment, please click here

Asus Laptop can't find wireless connections?
I have an Asus K53E and my wireless Icon says "Not connected - no connections are available" !Now what I've got and what I've tried . . . .1) Intel I3 2350M CPU, 8 gb Ram, X64 ...
CryptoWall ransomware held over 600,000 computers hostage, encrypted 5B files

A file-encrypting ransomware program called CryptoWall infected over 600,000 computer systems in the past six months and held 5 billion files hostage, earning its creators more than $1 million, researchers found.

The Counter Threat Unit (CTU) at Dell SecureWorks performed an extensive analysis of CryptoWall that involved gathering data from its command-and-control (C&C) servers, tracking its variants and distribution methods and counting payments made by victims so far.

CryptoWall is "the largest and most destructive ransomware threat on the Internet" at the moment and will likely continue to grow, the CTU researchers said Wednesday in a blog post that details their findings.

To read this article in full or to leave a comment, please click here

Bitcoin and Crypto-Currency NOT READY!!
Recently I started getting interested in Bitcoin and Darkcoin and all the Crypto-Currency Hype, so I got all fired up one day and thought to myself "I'm gonna go BUY some Darkcoin"...
Enhancing Security in Palm Print Recognition Systems Using Encryption Algorithms
Now-a-days, the use of biometric characteristics (e.g., palm prints, irises, and fingerprints) is incrementing for individual recognition and many applications of biometrics are al...
Hillary Clinton wants a global pact on surveillance and data collection

Former U.S. Secretary of State Hillary Clinton called for a "global compact" on surveillance and the use of collected data, saying the U.S. isn't the only country that does it and American technology companies are unfairly targeted for the government's actions.

"The U.S. government doesn't use information for commercial purposes," while other countries do, Clinton said.

"We need to make it clear to other countries that our technology companies are not part of our government, and that we have more legal processes than any other country that I'm aware of" covering government requests for information, Clinton said during her appearance at the Nexenta OpenSDx Summit, a technology conference in San Francisco.

To read this article in full or to leave a comment, please click here

Review Paper on Securing the PKI Using the ECDS
In the present time, MANET is one of the current areas and it established excellent devotion due to its capabilities of configuration and maintenance. Whereas quick research work s...
Memory Authentication Using Soft PUFs
Physical Unclonable Functions (PUFs) are circuits that exploit chip-unique features to be used as signatures which can be used as good silicon biometrics. These signatures are base...
Countering Cyber Threats by Modeling “Normal” Website Behavior
This white paper chronicles the evolution of web and mobile threats, the economic impact of cybercrime and business logic abuse, and how organizations could be leveraging the data ...
Post Selected Items to:

Showing 10 items of 243

home  •   advertising  •   terms of service  •   privacy  •   about us  •   contact us  •   press release design by Popshop •   Official PR partner B2BLogger.com •   © 1999-2014 NewsKnowledge