Rumored to exist for years, D-Wave sells what they claim is a true quantum computer.

For many years in the hidden spaces of the Net, rumors have spread that cryptographic systems as we know them are worthless. Some claim that every cryptographic system out there has already been compromised because the National Security Agency only permits those systems that it has been able to tamper with in subtle ways to be published. Cryptographers they can't compromise, so the stories go, silently disappear and are never to be heard from again. More recently, advances in quantum computing have caused brand new stories to appear on forums and in IRC channels, with the requisite flame wars hot …

Read more...

Practical man in the middle attack against quantum crypto published.

A long-standing problem in cryptography has been the sharing of secrets (understatement of the century, right?) Assuming that your communication medium can't be trusted because anyone and everyone could be listening in, how do you distribute keys to everyone you want to securely contact? The most obvious method is to meet up with everyone and hand them the keying material personally. However that way fraught with problems, from your courier getting ganked for the keying material to a simple matter of common sense: if you're going to meet with the intended recipient, why not just tell them and not bother …

Read more...

Serious vulnerability found in elliptic curve PRNG - cryptographers freak out.

A major component of cryptographic systems are pseudorandom number generators used to pull values out of thin air for the purposes of generating session keys and the bignum components of crypto keys, among other things. This is done so that an eavesdropping attacker can't predict ahead of time what a particular key is going to be and decrypt traffic as it's transmitted. Another reason is that it's easier to generate a pseudorandom number and check it for certain properties all at once than it is to work up such a number by hand and check it against those properties every …

Read more...

How the mighty have fallen!

The encryption algorithms for Blu-Ray and HD-DVD content have been cracked!

The processing key is one of the keys used in the process of generating the media key, the unique key that encrypts the contents of a particular DVD. Due to the encryption algorithm used in Blu-Ray and HD-DVD technologies, they keys seem to work in a hierarchial manner: If you compromise a key lower in the hierarchy, you crack media. Compromise a key higher up in the hierarchy, and you crack all of the media encrypted underneath it.. meaning that all of the new generation DVDs may be freely …

Read more...