Archive for the ‘encryption’ Category

Cheap entropy using RTL-SDR dongle

Sunday, August 31st, 2014

We've seen the RTL-SDR dongle used for a number of interesting projects, but here's an unusual one not directly related to signal monitoring. Noel Bourke was considering the topic of entropy and randomness as it relates to encryption and came up with a unique use for the RTL-SDR. When RTL-SDRs...

Tags: ,
Posted in code, encryption, SDR | 1 Comment »

BLE fun with Ubertooth: sniffing Bluetooth Smart and cracking its crypto

Wednesday, January 29th, 2014

Mike Ryan writes about his latest efforts in BLE hacking. Hot on the heels of Omri Iluz's BLE-sniffer-on-the-cheap, I decided to write up the BLE sniffer I built on Ubertooth. My sniffer highly robust, can capture data from connections, and is 100% open source. I also discovered a vulnerability in...

Tags: , ,
Posted in code, encryption, hacks, RF, wireless | 1 Comment »

NSA wants to build quantum computer to penetrate “hard targets”

Saturday, January 4th, 2014

The Washington Post is reporting that the NSA is building a computer to defeat all forms of encryption commonly used to ensure privacy of personal communications and data. The project seeks to build “a cryptologically useful quantum computer” which would open the door to easily breaking the strongest encryption tools...

Tags: , , ,
Posted in encryption, News, security | 1 Comment »

Secure Drop open source project

Friday, November 22nd, 2013

"SecureDrop is an open-source whistleblower submission system managed by Freedom of the Press Foundation that media organizations use to securely accept documents from anonymous sources. It was originally coded by the late Aaron Swartz." SecureDrop is dependent on the Tor project, meaning sources who submit documents and journalists who download...

Tags: , ,
Posted in code, encryption, open source, security | 1 Comment »

One Time Password (OTP) doorlock

Sunday, September 15th, 2013

Luca Dentella has just published his latest project, an Arduino-based door lock you can open using time-based OTP codes (compliant to the RFC 6238). "The simplest way to generate those codes is the use of Google Authenticator, a free mobile app. I've also prepared a simple webpage you can use...

Tags: ,
Posted in Arduino, encryption, open source, security | 2 Comments »

Advice: what to expect when authorities confiscate your electronics

Monday, August 26th, 2013

It's unfortunate that we have to consider these matters, but with governments worldwide obsessed with violating the privacy of ordinary citizens we found a well documented post which puts some flesh on what some naively view as skeletal paranoia. In this comprehensive article Violet Blue of ZDNet outlines the tools...

Tags: , , ,
Posted in documentation, encryption, people, security, surveillance | 1 Comment »

Online source lets you send and receive Enigma cipher comms

Saturday, June 15th, 2013

The Enigma machine was a World War II era encryption device used by the German army. It was the subject of substantial efforts by Allied cryptographers which finally resulted in the successful cracking of the code, which led to decryption of German military comms. We found this website which allows...

Posted in encryption, site, vintage | No Comments »

Dead drop file sharing revisited

Saturday, April 20th, 2013

The concept of dead drops, where USB thumbdrives are installed in public places for the distribution of files "off the grid" has been a popular topic. Now Steve Schuler writes in with his new take on this concept currently featured in Science 2.0. His article describes low tech ways to...

Posted in data transfer, encryption, security, USB | No Comments »

A peek into the curious world of HDMI copy protection… with the Bus Pirate

Tuesday, February 19th, 2013

Adam Laurie (a/k/a/ Major Malfunction) is a white hat hacker from London, UK, who has presented at a number of conferences worldwide. He's also the Director at Aperature Labs, Ltd. Recently he explored the broken HDCP security mechanism used in HDMI. After building the HDMI breakout cable pictured above he...

Tags: , ,
Posted in Bus Pirate, encryption, security | 6 Comments »

SkyDogCon 2012 : Cryptanalysis of the enigma

Monday, November 19th, 2012

At the recent SkyDogCon conference, Bob Weiss and Benjamin Gatti presented this talk analyzing Enigma, the World War II era Nazi encryption machine. The encryption theory behind Enigma is covered, including a detailed under-the-hood view of a typical device. Finally, a demo is conducted using a laptop in an effort...

Posted in encryption, reversed, talks | No Comments »

Try your hand at DEFCON 2012 decryption challenge

Saturday, August 4th, 2012

At the recently concluded DEFCON 20 conference in Las Vegas, attendees were presented with this decryption challenge by KoreLogic Security. Take their collection of encrypted password hashes and a bundle of encrypted files and see how many you can crack. File types are from various systems, including UNIX servers, Windows...

Tags: , ,
Posted in encryption | No Comments »

Parallax Propeller encryption objects

Monday, February 13th, 2012

Parallax has recently added two new encryption objects to their Propeller Object Exchange. Mark Tillotson has released his AES object. He describes it as an "efficient implementation of the Advanced Encryption Standard in PASM. Supports 128, 192 and 256 bit keys, ECB and CBC modes. All heavy lifting in PASM."...

Tags: , ,
Posted in code, encryption, Parallax Propeller | No Comments »

APCO25 protocol encryption cracked

Friday, September 16th, 2011

The APCO25 (P25) communications protocol is a form of digital radio communications technology growing in popularity in police and other public safety radio systems in the US and abroad. Many such systems are unencrypted and can be received on digital radio scanners. Others employ encryption in an effort to prevent...

Tags: ,
Posted in encryption, hacks, techniques, wireless | No Comments »

IM-ME jams APCO P25 digital comms

Friday, August 19th, 2011

APCO Project 25 is a digital modulation protocol used by a growing number of public safety radio systems and to a limited extent by Amateur Radio Operators. APCO P25 radio transmissions are capable of being monitored by scanning receivers from Radio Shack, GRE and Uniden. That is, unless the agency...

Tags: ,
Posted in encryption, hacks, RF, talks | 1 Comment »

Breaking copy protection in MCUs: then and now

Friday, June 24th, 2011

When you decide to copy protect the firmware on your MCU, how effective are efforts such as setting a lock bit or enabling chip erase modes? Sergei P. Skorobogatov's article provides an overview of the methods he's tried against MCUs from various manufacturers. He outlines both invasive and non-invasive techniques...

Tags: ,
Posted in Chips, encryption, how-to, security | 4 Comments »

CNET free PC Lock™ software today only

Saturday, May 21st, 2011

OK, so it isn't open source... but it is free (today only)! CNET is making available FREE downloads of PC Lock™ privacy encryption software for your PC. Just visit this link and follow the instructions. It will provide you with a free download and registration key. You will not be...

Tags: , ,
Posted in encryption, security, software | 4 Comments »

Atmel announces new CryptoAuthentication chip

Thursday, March 3rd, 2011

Atmel today announced the release of the ATSHA204 the first turnkey, optimized authentication device to include a 4.5Kbit EEPROM and a hardware SHA-256 accelerator. Fully tested ASF software libraries are available for Atmel AVR® and ARM®-based microcontrollers and are integrated within the new AVR Studio® 5. Contemplated uses include industrial,...

Tags: ,
Posted in AVR, Chips, encryption, News | No Comments »

Analyzing a modern cryptographic RFID system

Wednesday, January 12th, 2011

Henryk Plötz and Milosch Meriac gave a presentation at the recent 27C3 Chaos Communications Congress in Berlin, Germany, in which they demystified the HID iClass. One of the challenges of breaking iCLASS RFID readers was to extract the firmware and the security keys of RW400 readers without leaving visible traces...

Tags: ,
Posted in encryption, hacks, RFID | No Comments »

27C3: Embedded Reverse Engineering Tools and Techniques

Thursday, January 6th, 2011

Nathan Fain and Vadik presented at the 27C3 Chaos Communications Congress held recently in Berlin, Germany, on a topic of interest to us all: JTAG/Serial/FLASH/PCB Embedded Reverse Engineering Tools and Techniques. Check out their webpage for full documentation and analysis.

Tags: ,
Posted in encryption, firmware, JTAG, PCBs, reversed | 1 Comment »

When FPGAs attack hashes

Wednesday, December 22nd, 2010

What could you do with an array of 15 FPGAs? Why not attack hashes! NSA@home is a fast FPGA-based SHA-1 and MD5 bruteforce cracker. It is capable of searching the full 8-character keyspace (from a 64-character set) in about a day in the current configuration for 800 hashes concurrently, using...

Tags: ,
Posted in encryption, FPGA, techniques | No Comments »

Next Page »

Recent Comments

  • Nathan Johnson: 100 channels. Not many are legal in any given area. Be sure to comply with local laws.
  • William Brodie-Tyrrell: It's getting to the point where it's cheaper and definitely easier to use a Pi Zero or similar and a $20 3G USB dongle. Power...
  • KH: IIRC most of the actual operating system of modern HDDs is in one of the platter(s); the stuff on the 25VF010 is a bootup firmware......
  • Trev: I don't know of any inexpensive 3G modules (prices start around $US 50), but it does explain why 2G modules are relatively inexpensive by comparison....
  • Zonie: This site Rocks!