6 of the biggest crypto heists of all time

When you store your money in a traditional bank, you do so because you have few other options. Of course, it’s possible to sidestep banks and store money in the form of government bonds or cash under your mattress, but the lack of insurance, physical security and convenience dissuades people from doing so. Let’s be honest: Until recently, no one had much other choice. The rise of cryptocurrencies gave people the option to “be their...

Google unveils Open Source Cryptographic Tool

Google has made available an open-source cryptographic tool called Private Join and Compute. The tool uses secure multi-party computation (MPC) to augment the core PSI protocol. More than 70 million records were stolen or leaked from poorly configured databases last year, making privacy a top concern. That’s no doubt one motivation behind Google’s open-sourcing of Private Join and Compute, a new secure multi-party computation (MPC) tool designed to help organizations work together with confidential data sets....

Researchers reveal Cryptocode Generator in Chrome

A system that automatically generates optimized cryptography code has been revealed as in use in Google Chrome. The details were revealed at the recent IEEE Symposium on Security and Privacy by MIT researchers. The crytography is being used to keep the communication between the browser and the website being viewed secure. Until recently, the mathematical algorithms used to carry out the cryptography was being written and rewritten by hand. Researchers from the Computer Science and...

RSA Encryption Cracked

It has long been known that even the best encryption system can be broken more easily if its users don't do a good job. Sometimes what constitutes a good job can be difficult to work out. In World War II the cracking of the German Enigma code was made easier by the way messages always started in the same way - providing some known plain text to compare against the encrypted text.