Friday, June 11, 2010
Detecting SSL/TLS legacy session Renegotiation
Saturday, May 29, 2010
The half-life of a YouTube video is 6 Days

The data is provided by TubeMogul.
Thursday, May 27, 2010
An advance in Encrypted Search
In such cases, it is always an open question as to whether the breakthrough will stand as an unimprovable milestone, or be the beginning of series of improvements towards a practical solution. We now have the first evidence that we are dealing with the latter case for encrypted search.
A press release from the University of Bristol in the UK reports that
Nigel Smart, Professor of Cryptology in the Department of Computer Science at the University of Bristol, will present a paper in Paris this week [Friday 28 May], which makes a step towards a fully practical system to compute on encrypted data. The work could have wide ranging impact on areas as diverse as database access, electronic auctions and electronic voting.
Professor Smart said: “We will present a major improvement on a recent encryption scheme invented by IBM in 2009.”
“Our scheme allows for computations to be performed on encrypted data, so it may eventually allow for the creation of systems in which you can store data remotely in a secure manner and still be able to access it.”
Together with Frederik Vercauteren, from the Katholieke University Leuven in Belgium, Smart has simplifed Gentry’s scheme so that it becomes more practical - not totally so, but an improvement. More information should be available after the paper is published.
Wednesday, May 26, 2010
A look back at posts in May 2009
This time last year I made some of my favourite posts. First I celebrated that I had reached about 1,000 visits and 2,000 page views a month, and now I am about double that.
Rethinking Thresholds for Account Lockouts was a simple post asking if the 3-strikes-your-out password policy makes sense. I posted my second Password Roundup #2, and reviewed from Qualys their study on The Half-life of Vulnerabilities is still 30 Days.
I also developed some thoughts why web app bugs don’t get fixed in The $28,000 Question: Project vs. Production Risk, after Jeremiah Grossman estimated that 28,000 well-spent dollars could fix the bugs at many sites.
On the crypto side I broke some news about The cost of SHA-1 collisions reduced to 2^{52}, and took a look at AES-256 and Reputational Risk. The AES post is now on the first page of a Google search for “aes 256” and has brought a steady flow of visits since last May, 1346 in total. I also asked if anyone could verify that the Total Internet computational power = 2^{85} operations, a statement I read in an ECRYPT report. I ended up contacting the authors and nope, no one knows where is came from. Sounds possible though.
I also posted The Sub-Time Crisis in Web 2.0, my thoughts on information overload in Web 2.0. I only used half the text I typed in from my written notes.
How To Password Protect Your Pen Drive
A nice how-to article on protecting USB drives with a password and encryption using Windows Vista or 7 and Bitlocker.
Do you carry sensitive data in your pen drive? Then you should carefully keep your pen drive. Oh! You mean you are not that careful too. Then I would suggest that you should password protect your pen drive. Yes folks, you can do this by a simple method. This is an added advantage to Windows Vista and Windows 7 users that they can easily password protect their pen drives with the help of BitLocker Drive Encryption. Its an inbuilt feature of both of these operating systems.
Related articles by Zemanta
- ZoneAlarm's DataLock: BitLocker for the Rest of Us (technologizer.com)
- BitLocker, USB drives not at fault - it's BIOS (seattletimes.nwsource.com)
Shark Fin Posts
What the graph shows is that there are no hits before the post is published (of course!), then a spike when it first appears and for a few days after, ending in just a few hits by a week later or so. After that it’s up to Google, industrious visitors or self-referential posting to raise the hits again.
Google could help enforce new German wireless protection law
- Fine for lax home wi-fi security (news.bbc.co.uk)
- German man fined for poor Wi-Fi security (v3.co.uk)
- German Wi-Fi networks liable for 3rd party piracy (go.theregister.com)
Tuesday, May 25, 2010
Whit Diffie does the Can Can
Related articles by Zemanta
- Diffie Named ICANN VP, Information Security and Cryptography (infosecurity.us)
- Encryption guru joins Icann (v3.co.uk)
- ICANN Hires Cryptography Pioneer (techdailydose.nationaljournal.com)
Monday, May 24, 2010
Security Bloggers Network under attack?
Update: This is a hoax mail leading to a rogue site, so please don't click it. Check out the Lijit blog for details (via Alan).
Just got this from Lijit, the hosting firm for SBN
Facebook juggernauts towards 500 million users
Privacy may yet be the Black Swan of Facebook.
Sunday, May 23, 2010
Password Strength Infographic
Saturday, May 22, 2010
Y2Gay: gay marriage from the database perspective
Perhaps the simplest solution would be to ban marriage outright. Or, better yet, to declare everybody as married to everybody else. But then what would the database engineers do all day?
Friday, May 21, 2010
Why have there been so many Natural Catastrophes of late?
Thursday, May 20, 2010
Conficker, RSA and RC4
So each Conficker client carries an RSA public key E for signature verification. A Windows binary file F is encrypted and signed as follows
- Hash F to produce a 512-bit hash M
- Encrypt F with RC4 using M as the key
- Sign M using private key D
- Using the embedded public key E, compute the signature verification to recover M
- Decrypt the encrypted binary using RC4 and M as the key
- Verify that the hash of F is in fact M