Wednesday, June 18, 2008
Decoding BlackBerry: Encryption limit may hit 256 Bits
The move comes after Research In Motion (RIM), the makers of BlackBerry, expressed their inability to provide a solution to the government for decoding encrypted data, claiming that it itself couldn’t decode the mails sent through its system. RIM has, however, said that they would come with some solution by the end of this month.
“The government would involve third-party agents to crack the encryption code if RIM does not come out with a solution. It is, however, not possible for any third party to bring down the level of encrypted data at the prescribed level. To avoid technical ambiguity, the government may raise the prescribed limit for data encryption to 256 bits,” an official source said, adding that the matter has been referred to the NSA for its comments.
A mail sent in this regard to communication minister A Raja and telecom secretary Siddharth Behura went unanswered. Country’s security agencies have earlier complained that messages transmitted through BlackBerry devices posed a risk as they couldn’t be traced.
Monday, June 9, 2008
Blackmail ransomware returns with 1024-bit encryption key
The biggest change in this variant of the ransomeware is the use of RSA encryption algorithm with a 1024-bit key, making it impossible to crack without without the author’s key. Here’s the explanation:
We recently started getting reports from infected victims, analysed a sample, and added detection for Gpcode.ak to our antivirus databases yesterday, on June 4th. However, although we detect the virus itself, we can’t currently decrypt files encrypted by Gpcode.ak – the RSA encryption implemented in the malware uses a very strong, 1024 bit key.
The RSA encryption algorithm uses two keys: a public key and a private key. Messages can be encrypted using the public key, but can only be decrypted using the private key. And this is how Gpcode works: it encrypts files on victim machines using the public key which is coded into its body. Once encrypted, files can only be decrypted by someone who has the private key – in this case, the author or the owner of the malicious program.
After Gpcode encrypts files on the victim machine, it adds ._CRYPT to the extension of the encrypted files and places a text file named !_READ_ME_!.txt in the same folder. In the text file the criminal tells the victims that the file has been encrypted and offers to sell them a “decryptor”:
«Your files are encrypted with RSA-1024 algorithm.
To recovery your files you need to buy our decryptor.
To buy decrypting tool contact us at: ********@yahoo.com»
There are three Yahoo e-mail addresses associated with the new version of the ransomware.
Saturday, June 7, 2008
Sneaky Blackmailing Virus That Encrypts Data
-
Tuesday, June 10, 2008 2:10 PM PDT A leak on a Microsoft Web site referring to a product in the Office suite hints at a 2009 release for the...
-
Another week, another quantum computing story. Quantum computing is a very hot topic in the world of physics at the moment because, for the...
-
holy_calamity writes "New Scientist reports on worries that the OLPC's BitFrost security protocols could hand a ready-made surveil...