Abstracts - faqs.org

Abstracts

Business, general

Search abstracts:
Abstracts » Business, general

Secure digital transactions just got a little less secure

Article Abstract:

A paper by researcher Paul C. Kocher states that a determined hacker could figure out the private key for a message sent using public-key encryption in a few minutes and using only a good PC. In public-key encryption, a coded message is deciphered using a key known only to the recipient. The report states that a hacker could repeatedly record the exact amount of time each unscrambling requires, then use the time data to determine the private key. An analogous undertaking would have a burglar observe the time it takes for people to enter the security code for a push-button combination lock, then use the accumulated data to reduce the number of potential combinations that could be used in the recorded time span. Other experts agree that Kocher's findings are valid, while others find them more likely in theory than practice. The problem can be addressed in new systems by adding unnecessary steps that increase the unscrambling time.

Author: Markoff, John
Publisher: The New York Times Company
Publication Name: The New York Times
Subject: Business, general
ISSN: 0362-4331
Year: 1995
Safety and security measures, Technology development, Electronic commerce, E-commerce, Data security, Digital communications, Data security issue

User Contributions:

Comment about this article or add new information about this topic:

CAPTCHA


Export laws challenged by sale of encryption software abroad

Article Abstract:

Network Associates announced that it will permit its Dutch subsidiary, Network Associates International, to begin selling an international version of its Pretty Good Privacy encryption program. The leading independent US computer security software maker's move would bypass government export policies that require encryption software to contain back doors for law enforcement surveillance. A battle over data scrambling already is taking place between the Clinton Administration and Congress, which says this method of restricting encryption software will damage the US industry's ability to compete internationally. Network Associates' move represents the biggest challenge to the Commerce Department's policy, according to the Forrester Group. The Clinton Administration says building back doors into encryption software allows law enforcement officials to secretly decode private messages.

Author: Markoff, John
Publisher: The New York Times Company
Publication Name: The New York Times
Subject: Business, general
ISSN: 0362-4331
Year: 1998
Computer software industry, Software industry, Laws, regulations and rules, Product information, Marketing, International trade, Network security software, Product marketing strategy, Network Associates Inc., NETA, United States. Department of Commerce, Security software, Systems/data security software, Systems and data security software, Pretty Good Privacy (Systems/data security software)

User Contributions:

Comment about this article or add new information about this topic:

CAPTCHA



Subjects list: Encryption, Data encryption, Encryption software
Similar abstracts:
  • Abstracts: Microsoft's accounting under scrutiny. Data-secrecy export case dropped by U.S
  • Abstracts: Advanced Micro introduces a faster chip. Intel net soars on the demand for Pentium; results are seen as sign of vigor in PC business
  • Abstracts: The three phases of implementation. How to make software proposal cost comparisons. How to choose a financial software consultant
  • Abstracts: Bosnian combatants sign peace treaty in Paris; NATO peace force deployment set in motion. Clinton accepts '96 defense spending bill
  • Abstracts: Judges turn back law to regulate Internet decency; free speech case; ruling by panel moves the First Amendment into a new era
This website is not affiliated with document authors or copyright owners. This page is provided for informational purposes only. Unintentional errors are possible.
Some parts © 2025 Advameg, Inc.