30 Nov '12, 4pm

New King of Security Algorithms Crowned

New King of Security Algorithms Crowned

A new cryptographic hash algorithm, proclaimed the winner of a five-year competition in October, is literally a solution in search of a problem.
 Basically, cryptographic hash algorithms are a way to ensure information security. They are typically used in digital signatures and in establishing connections with secure websites. Data that is run through a hash algorithm produces a shorter string of bits; this string acts as a kind of digest of the data. Any change to the data changes the bit string. The resulting string, therefore, acts as a fingerprint of the data, guaranteeing that no one has tampered with it. 
 The winning algorithm, called Keccak , was submitted by a team of four researchers from European semiconductor company STMicroelectronics: Guido Bertoni, Joan Daemen, Gilles Van Assche, and Michaël Peeters (who now works at NXP Semiconductors). 
 Keccak is the culm...

Full article: http://spectrum.ieee.org/computing/software/new-king-of-s...

Tweets

#MURPHY'S LAW: How Good Politics Makes Bad Netw...

strategypage.com 01 Dec '12, 10am

December 1, 2012: The U.S. Navy and Air Force have created an automated supply system (ALIS, Autonomic Logistics Informati...

(LIVE) NATO Special Representative for Women, P...

nato.int 30 Nov '12, 7pm

“We encourage states and our partners to ensure women’s participation in the prevention, management and resolution of conf...

New Post: Eat Breakfast Like A King

New Post: Eat Breakfast Like A King

runeatrepeat.com 05 Dec '12, 6pm

Good Morning! I woke up feeling fanfreakingtastic I think it was a combination of the amazing Runaroni I carbed up with la...

New Detailed Data For US Nuclear Forces Counted Under New START Treaty

New Detailed Data For US Nuclear Forces Counted...

fas.org 30 Nov '12, 8pm

All of these bombers carry equipment that makes them accountable under New START, but only a portion of them are actually ...

#ISO27001 Ciberparaisos fiscales y lavado de di...

securityaffairs.co 02 Dec '12, 12am

In the last decade the cybercrime had made a substantial leap forward of the main threats to the security of each governme...

WebmasterTools in Dangerous Security Flaw

davidnaylor.co.uk 27 Nov '12, 10pm

It has been seen tonight that WebmasterTools has suffered a major security hole and opened up and reverified all old accou...

Volvo V60 Plug-in Hybrid crowned safest EV of them all: Modern electric and hybrid cars are gaining a reputation...

Volvo V60 Plug-in Hybrid crowned safest EV of t...

thegreencarwebsite.co.uk 28 Nov '12, 11am

Modern electric and hybrid cars are gaining a reputation for their safety, with a number of models have scored a top five ...

Turkey's King of Nuts

Turkey's King of Nuts

eatingasia.typepad.com 25 Nov '12, 5pm

When you say Turkey folks tend to think pistachios -- if they are thinking of nuts, that is. Pistachios are a huge crop in...

My video report from ZDNet Asia's Big Debate - ...

zdnet.com 30 Nov '12, 10am

SINGAPORE--Big data can help companies gain a competitive advantage, but knowing the context behind the data collection is...

Andrej Pejic, Rana Wehbe-Flinter and Yvette King at Digital Fashion Week 2012.

Andrej Pejic, Rana Wehbe-Flinter and Yvette Kin...

bonjoursingapore.com 06 Dec '12, 1am

While this is absolutely true and definitely great – hey I’ve managed to score some bargains as well – it actually leaves ...

Kicks On Court: King James Swaps LeBron X PE for Ambassador 5 in Second Half

Kicks On Court: King James Swaps LeBron X PE fo...

nicekicks.com 30 Nov '12, 4pm

took a break from his 10th signature shoe only for one half last night. After having a subpar first half in his Nike Air M...