background preloader

Kriptópolis - Criptografía y Seguridad.

Kriptópolis - Criptografía y Seguridad.
Related:  _Crypto Tools

Encryption For Beginners In an Era of Total Surveillance. By @AnonyOdinn If you’ve read the news lately, you’ve pretty much caught the drift of what’s going on. Surveillance is fast spreading to become a universal problem, governments are becoming the largest sponsors and purchasers of intrusive malware, and for all intents and purposes, all so-called “secure” systems are, simply put, not secure – at least not from governmental intrusion, and certainly not from the steady increase of corporate intrusion – a growing problem in a world where the concept of an open and free net is more at risk than ever. The purpose of this simple tutorial is to provide some encryption for beginners. This is not a tutorial on hacking. A couple of points before you proceed. If you are a journalist, or if you have special reason to believe you may be the subject of an active investigation due to your being named in a pending case or other similar matter, you should take other precautions, including reducing your online exposure when you are active in the field.

Security Art Work Can quantum cryptography work in the real world ? Can quantum cryptography work in the real world? By William JacksonOct 28, 2013 Battelle Memorial Institute has built what it claims is the nation’s first production system for quantum distribution of cryptographic keys and announced plans to create a 400-mile link enabling quantum-key distribution (QKD) between Columbus, Ohio, and Washington, D.C., by 2015. The project links two facilities in central Ohio and is a demonstration of the R&D organization’s faith in the ability of the emerging technology to future-proof cryptography threatened by increasingly powerful computers. “Practical QKD systems have existed for about 10 years,” said Don Hayford, director of research at Battelle. Although new in the United States, banks and government agencies in Europe have been using QKD for several years. Not everyone is so sanguine about the current capabilities of QKD. “It’s still a work in progress,” said Alan Mink, electronic engineer in NIST’s Advanced Networking division.

CRYPTEX - Seguridad de la Información Geli (software) geli is a block device-layer disk encryption system written for FreeBSD, introduced in version 6.0. It utilises the GEOM disk framework. It was designed and implemented by Paweł Jakub Dawidek.[1] geli was initially written to protect data on a user's computer in situations of physical theft of hardware, disallowing the thief access to the protected data. This has changed over time with the introduction of optional data authentication/integrity verification.[2] geli allows the key to consist of several information components (a user entered passphrase, random bits from a file, etc.), permits multiple keys (a user key and a company key, for example) and can attach a provider with a random, one-time key. Jump up ^ "Encrypting disk partitions".

| Apuntes de seguridad de la información Este post quiero dedicarlo a mi fuente de inspiración, la mesa redonda "Encuentro de blogueros de seguridad 2012" del evento ENISE de Inteco donde no he podido estar y donde estos cinco compañeros blogeros y "monstruos de la seguridad" a los que admiro han sabido transmitir con precisión cual es la sensación que tenemos los profesionales de la seguridad y sobre todo, nuestras inquietudes respecto a lo que habría que hacer y no estamos afrontando. Los figuras han sido Alonso Hurtado @ahurtadobueno, Samuel Linares @Infosecmanblog, Román Ramírez @patowc, Antonio Ramos García @antonio_ramosga y Pablo Teijeira @JpabloTG han expuesto desde diferentes puntos de vista (economista, abogado, informático, consultor, fabricante medidas de seguridad) qué cosas deberían empezar a preocuparnos. [Actualización] Inteco hoy ya permite el acceso a las diferentes charlas y mesas redondas en la dirección . "Diario de un consultor de seguridad de la información.

Linux Unified Key Setup - LUKS In computing, the Linux Unified Key Setup or LUKS is a disk-encryption specification created by Clemens Fruhwirth and originally intended for Linux. While most disk encryption software implements different and incompatible, undocumented formats, LUKS specifies a platform-independent standard on-disk format for use in various tools. This not only facilitates compatibility and interoperability amongst different programs, but also assures that they all implement password management in a secure and documented manner.[1] The design of LUKS aimed to conform to the TKS1 secure key setup scheme.[2] See also[edit] References[edit] External links[edit] Official website

Leading Blog on ISO 27001 & ISO 22301 dm-crypt Some Linux distributions support the use of dm-crypt on the root file system. These distributions use initrd to prompt the user to enter a passphrase at the console, or insert a smart card prior to the normal boot process.[3] Frontends[edit] The dm-crypt device mapper target resides entirely in kernel space, and is only concerned with encryption of the block device – it does not interpret any data itself. cryptsetup[edit] cryptsetup also provides commands to deal with the LUKS on-disk format. cryptmount[edit] Features[edit] The fact that disk encryption (volume encryption) software like dm-crypt only deals with transparent encryption of abstract block devices gives it a lot of flexibility. dm-crypt can also be configured to provide pre-boot authentication through an initrd, thus encrypting all the data on a computer – except the bootloader, the kernel and the initrd image itself.[3] Compatibility[edit] See also[edit] Comparison of disk encryption software References[edit] External links[edit]

Noticias de Seguridad Informática - Segu-Info La gente está en vilo debido a Heartbleed, un error de programación que inadvertidamente arrasó con la seguridad de muchos servicios de Internet. La revelación de esta semana sorprendió al mundo. Y los nuevos informes que llegan sobre Heartbleed solo parecen inspirar más preocupaciones, no menos. El desafortunado resultado es la circulación de una gran cantidad de información errónea. ¿Quiere unirse conmigo en una pequeña sesión de descrédito? Mito 1: Heartbleed es un virus Esta falla de OpenSSLno es un virus. Cuando funciona como debería, OpenSSL ayuda a asegurar que las comunicaciones por red estén protegidas de ser espiadas. Mito 2: La falla solo afecta a sitios web Las potenciales brechas de seguridad para servidores y ruteadores son cuestiones masivas, ya que permiten la fuga de grandes volúmenes de información. "Por lo general en el cliente, la memoria se asigna sólo al proceso que se está ejecutando. Mito 3: Los Hackers pueden usarla para tomar control remoto de sus teléfonos

DiskCryptor is an open encryption solution. Xavier Ribas Cryptography Tools. Cryptography tools provide command-line tools for code signing, signature verification, and other cryptography tasks. Introduction to Code Signing The software industry must provide users with the means to trust code including code published on the Internet. Many webpages contain only static information that can be downloaded with little risk. Some pages, however, contain controls and applications to be downloaded and run on a user's computer. Packaged software uses branding and trusted sales outlets to assure users of its integrity, but these guarantees are not available when code is transmitted on the Internet. Currently, CryptoAPI Tools supports Microsoft Authenticode technology by allowing software vendors to sign the following types of files for Authenticode verification. For information about digital signing, see the following documents: Note These resources may not be available in some languages and countries or regions. Microsoft Cryptography Tools