株式会社コモドジャパン(以下、コモド)は3日、販売するすべてのSSLサーバー証明書が次世代暗号アルゴリズムの「楕円曲線暗号(ECC)」と「SHA-2」に完全対応したと発表した。 楕円曲線暗号は、楕円DSA(ECDSA)方式を採用した暗号アルゴリズム。従来のRSA ...
Hot on the heels of Diffie-Hellman upending the cryptography applecart in 1976 came three more crypto newcomers that further revolutionized the field: Ron Rivest, Adi Shamir, and Leonard Adleman. The ...
素因数分解の困難さを安全性の根拠とした暗号「RSA暗号」について、量子コンピューターを使用することで解読手法の構築 ...
In a nutshell: Researchers at China's Tsinghua University believe they have discovered a quantum-based algorithm capable of breaking today's most complex encryption standards. The team claims that the ...
Members can download this article in PDF format. In the last two articles, we covered the basic concepts and two basic types of cryptography. In this article, we will look at specific implementation ...
米国国立標準技術研究所(NIST: National Institute of Standards and Technology)は12月15日(米国時間)、「NIST Retires SHA-1 Cryptographic Algorithm|NIST」において、暗号アルゴリズム「SHA-1」を廃止すると伝えた。SHA-1の暗号ハッシュ関数はすでに脆弱と評価されており米国政府機関 ...
On September 19, in a conference room at the Pelican Hill Resort in Newport Beach, California, Crown Sterling CEO Robert Grant, COO Joseph Hopkins, and a pair of programmers staged a demonstration of ...
Encryption has become a routine part of everyday life. Your iPhone uses it to defeat cybercriminals and snoopers. Security cameras may use it to keep footage private. And your VPN definitely uses it, ...