English flagItalian flagKorean flagChinese (Simplified) flagChinese (Traditional) flagPortuguese flagGerman flagFrench flagSpanish flagJapanese flagArabic flagRussian flagGreek flagDutch flagBulgarian flagCzech flagCroatian flagDanish flagFinnish flagHindi flagPolish flagRomanian flagSwedish flagNorwegian flag
Catalan flagFilipino flagHebrew flagIndonesian flagLatvian flagLithuanian flagSerbian flagSlovak flagSlovenian flagUkrainian flagVietnamese flagAlbanian flagEstonian flagGalician flagMaltese flagThai flagTurkish flagHungarian flagBelarus flagIrish flagIcelandic flagMacedonian flagMalay flagPersian flag

Archive for April, 2010

great point of view

Because security of a cryptographic system it’s not a matter of “how many bits do i use” but using the right approach to do the right thing to mitigate the defined security risk in the most balanced way.

Encryption is not scrambling: be aware of scrambler!

Most of us know about voice scrambler that can be used across almost any kind of voice based communication technology.
Extremely flexible approach: works everything
Extreme performance: very low latency
but unfortunately…
Extremely weak: Scrambling cannot be considered secure.
Only encryption can be considered secure under the Kerckoff’s principle .
So please don’t even consider any kind of analog scrambler if [...]




About

You are currently browsing the Playhouse of privacy, security, hacking, encryption, intelligence and some business stuff weblog archives for the month April, 2010.

Longer entries are truncated. Click the headline of an entry to read it in its entirety.

Latest

Categories