background preloader

Internet Security

Facebook Twitter

PHP Security Guide.

Encryptie

OpenVPN. OpenVPN has been ported and embedded to several systems.

OpenVPN

For example, DD-WRT has the OpenVPN server function. SoftEther VPN, a multi-protocol VPN server, has an implementation of OpenVPN protocol. Architecture[edit] Encryption[edit] OpenVPN uses the OpenSSL library to provide encryption of both the data and control channels. Authentication[edit] OpenVPN has several ways to authenticate peers with each other. Networking[edit] OpenVPN can run over User Datagram Protocol (UDP) or Transmission Control Protocol (TCP) transports, multiplexing created SSL tunnels on a single TCP/UDP port[7] (RFC 3948 for UDP).[8] From 2.3.x series on, OpenVPN fully supports IPv6 as protocol of the virtual network inside a tunnel and the OpenVPN applications can also establish connections via IPv6.[9] It has the ability to work through most proxy servers (including HTTP) and is good at working through Network address translation (NAT) and getting out through firewalls.

Networks

Vanish: Enhancing the Privacy of the Web with Self-Destructing Data. Lecture Slides and Video Archives. Hiding in hue. This short essay is on a small idea of Steganography, which in truth is quite limited, but with the amount of online traffic and the speed the Internet grows, even simple ideas can go unnoticed and are hopefully a bit of fun to explore.

Hiding in hue

It may be documented else where on the web, but I didn't look as I quite enjoyed experimenting with it myself and thought I should write it down before I forget all about it. Below is a standard BMP containing some hidden items, which can be seen if you split it into HSL (Hue, Saturation and Light) channels and look at the Hue channel. (In PSP the command can be found under COLORS / SPLIT CHANNEL / SPLIT TO HSL) MULTI.BMP incorporates some ideas or areas that allow some scope for hidden data in non-compressed picture formats. Firstly lets take a look at a brief explanation of Hue: Hue is the characteristic of a colour that makes blue different from red and green etc, caused by the length of the light wave, ranging from infrared to ultraviolet.

Stego for beginners. (All views are my own opinion, so if you don't like them - don't read it) What is it and what's it for?

Stego for beginners

Steganography is the art of hiding information in such a way that others would not suspect that it is there. It is closely linked to Cryptography, but offers some interesting features which Crypto, when used by itself cannot. Have a look at this example: Criminal A sends an encrpyted message to Criminal B. Enigma.swf (application/x-shockwave-flash-object) Hash Function JH; designed by Hongjun Wu. JH is a hash function submitted to the NIST hash competition (2008--2012) in October 2008.

Hash Function JH; designed by Hongjun Wu

It was selected as a finalist of the competition. There are four JH hash algorithms, namely, JH-224, JH-256, JH-384 and JH-512, constructed from the same compression function. In January 2011, the round number of JH is changed from 35.5 to 42 for better hardware efficiency and larger security margin. The hash speed of JH is about 19.6 cycles/byte on the mobile Intel Core 2 Duo T6600 2.2GHz processor running 64-bit operating system, and 23.3 cycles/byte for 32-bit operating system (bitslice C implementation with Intel C++ compiler).

JH is efficient in hardware since simple components and identical round functions are used. An Overview of Cryptography. RSA Encryption. Next: RSA Exercise Up: crypto Previous: Certification OK, in the previous section we described what is meant by a trap-door cipher, but how do you make one?

RSA Encryption

One commonly used cipher of this form is called ``RSA Encryption'', where ``RSA'' are the initials of the three creators: ``Rivest, Shamir, and Adleman''. Password recovery, 256-bit AES encryption vs. brute force - how strong and reliable is Private Disk's encryption. Summary Starting with v2.04, has a new feature – . Its purpose is to give you a chance to access the encrypted files if the password was somehow forgotten. The option is located on the "Recovery" tab of the main window. Switch to that tab, and click "Password", choose the character set and the length of the password, then click "Ok" to open the password recovery window. How it works The program performs a so-called "brute-force attack", trying all the possible combinations of characters, until the correct keyword is found.

Is there a risk that a third party person will use the tool to break my password and access all my private data? The risk is dramatically minimized, provided that you follow our recommendations on choosing a strong password . OK, but still, anyone who has enough patience can access my files. No, it does not. The password is "mypass", it has a length of 6 characters, and it uses 5 distinct letters. From the attacker's point of view, the situation is totally different.