Skip to main content

Posts

TrashCoders

As I'm forming a Club "TrashCoders" after our Summer Holidays (May 2nd week), and going to share the knowledge I have, I created a new blog to upload all of the works we do in the Club. Hope you guys have some ideas and/or tips. Trash Coders  Happy Holidays..

Raising cryptography’s standards

Calculating encryption schemes’ theoretical security guarantees eases comparison, improvement. Most modern cryptographic schemes rely on computational complexity for their security. In principle, they can be cracked, but that would take a prohibitively long time, even with enormous computational resources. There is, however, another notion of security — information-theoretic security — which means that even an adversary with unbounded computational power could extract no useful information from an encrypted message. Cryptographic schemes that promise information-theoretical security have been devised, but they’re far too complicated to be practical. In a series of papers presented at the Allerton Conference on Communication, Control, and Computing, researchers at MIT and Maynooth University in Ireland have shown that existing, practical cryptographic schemes come with their own information-theoretic guarantees: Some of the data they encode can’t be extracted, even by a

Arabic Threat Group Attacking Thousands of Victims Globally

Kaspersky Lab security expert Dmitry Bestuzhev presents research on “Desert Falcons” at the Kaspersky Lab Security Analyst Summit on Feb. 17. CANCUN, Mexico  – Kaspersky Lab Security Analyst Summit – Threat actors with Arabic roots are targeting multiple high profile organizations and individuals from Middle Eastern countries, according to a new report from Kaspersky Lab. The attack group, dubbed “Desert Falcons” by the security firm, appears to be the first known Arabic cyber-espionage group to develop and run full-scale cyber-espionage operations, researchers said. Details of the campaign, which has been active for at least two years, were unveiled at Kaspersky Lab's Security Analyst Summit in Cancun, Mexico on Tuesday. According to Kaspersky researchers, the peak of their activity occurred at the beginning of 2015, and so far, the attackers have been able to steal more than one million files from more than 3,000 victims in over 50 countries. Kaspersky Lab began its

Cyber Security Week, 2015

In the same week as the Global Conference on CyberSpace (GCCS2015) and One Conference, a Cyber Security Week (13 till 17 April) will be held at the Campus of The Hague Security Delta, the largest security cluster in Europe. Aim is to show the world the innovative strength of The Netherlands created by the triple helix cooperation within the security cluster. During this week, The Hague Security Delta will be putting on an action-packed programme consisting of workshops, debates, networking events, and many  other side-events.  And, of course, the Cyber Security Week 2015 just wouldn't be complete without an Innovation Room with demonstrations of innovations in cyber security. To create a unique programme for our visitors from around the world, we are looking for participation of  businesses, governments, and knowledge institutions working on Cyber Security.   Cyber Security Week Website A special website will be launched by the end of February. It will provide an overv

Railfence Cipher

The rail fence cipher (also called a zigzag cipher) is a form of transposition cipher. It derives its name from the way in which it is encoded. In the rail fence cipher, the plaintext is written downwards and diagonally on successive "rails" of an imaginary fence, then moving up when we reach the bottom rail. When we reach the top rail, the message is written downwards again until the whole plaintext is written out. The message is then read off in rows. The file is available below railfence.java Feb 11, 2015