Cryptography
Cryptography (or cryptology; from Greek κρυπτός kryptós, "hidden, secret"; and γράφειν graphein, "writing", or -λογία -logia, "study", respectively) is the practice and study of techniques for secure ...
Cryptography - Wikipedia
FBI chief Comey: “We have never had absolute privacy”
650 phones are "a brick to us... Those are cases unmade, evidence unfound."
Three 'Twisted' Photons In 3 Dimensions
Researchers at the Institute of Quantum Optics and Quantum Information, the University of Vienna, and the Universitat Autonoma de Barcelona have achieved a new milestone in quantum physics: they were ...
California Joins New York in Effort to Weaken Smartphone Encryption
As the argument over smartphone encryption continues on between device manufacturers like Apple, devoted to strong encryption, and U.S. federal...
How Encryption Technology Can Be Traced Back to the Kama Sutra
And more strange tales from the long and winding history of cryptology.
Dutch police 'read' Blackberry emails
A police forensics unit has claimed that it can decrypt messages on locked-down Blackberry handsets.
Paris Attack Could Renew Debate Over Encrypted Messaging Apps
The deadly terror attack in Paris could reignite the debate over whether the government should have a 'back door' to access encrypted communications. Law enforcement officials and cyberexperts have po...
Russia Reveal Giant Nuclear Torpedo In State TV 'Leak'
The Kremlin says secret plans for a Russian long-range nuclear torpedo - called "Status-6" - should not have appeared on Russian TV news.The leak happened during a report on state-run Channel One abou...
Apple Watch features, materials leak ahead of announcement
The definitive list of Apple Watch features has reportedly been leaked, including data on performance, battery life, and expected applications. Is this the device that'll reinvent the wearables catego...
The Password Is Finally Dying. Here's Mine
If you want to sample the early version of a post-password future, all you have to do is switch on a common security feature of every major Web service.
Unbreakable crypto: Store a 30-character password in your brain’s subconscious memory
It's ingenious: The system still requires that a user enters a password, but at no point does the user actually remember the password, meaning it can't be written down and it can't be obtained via coe...
Signals intelligence
Taking spy technology to new heights.
History of cryptography
Cryptography, the use of codes and ciphers to protect secrets, began thousands of years ago. Until recent decades, it has been the story of what might be called classic cryptography — that is, of met...
History of cryptography - Wikipedia
Symmetric-key algorithm
Symmetric-key algorithms are algorithms for cryptography that use the same cryptographic keys for both encryption of plaintext and decryption of ciphertext. The keys may be identical or there may be a...
Public-key cryptography
Public-key cryptography, also known as asymmetric cryptography, is a class of cryptographic algorithms which requires two separate keys, one of which is secret (or private) and one of which is public....
Public-key cryptography - Wikipedia
Cryptanalysis
Cryptanalysis (from the Greek kryptós, "hidden", and analýein, "to loosen" or "to untie") is the study of analyzing information systems in order to study the hidden aspects of the systems. Cryptanaly...
Cryptanalysis - Wikipedia
Export of cryptography
The export of cryptography is the transfer from one country to another of devices and technology related to cryptography.In the early days of the Cold War, the U.S. and its allies developed an elabora...
Clipper chip
The Clipper chip was a chipset that was developed and promoted by the United States National Security Agency (NSA) as an encryption device, with a built-in backdoor, intended to be adopted by telecomm...
Clipper chip - Wikipedia
Digital rights management
Digital rights management (DRM) is a class of technologies that are used by hardware and software manufacturers, publishers, copyright holders, and individuals with the intent to control the use of di...
Classical cipher
A cipher is a means of concealing a message, where letters of the message are substituted or transposed for other letters, letter pairs, and sometimes for many letters. In cryptography, a classical ci...
Disk encryption
Disk encryption is a technology which protects information by converting it into unreadable code that cannot be deciphered easily by unauthorized people. Disk encryption uses disk encryption software ...