Username: Save?
Password:
Home Forum Links Search Login Register*
    News: Keep The TechnoWorldInc.com Community Clean: Read Guidelines Here.
Recent Updates
[April 12, 2025, 01:54:20 PM]

[April 12, 2025, 01:54:20 PM]

[April 12, 2025, 01:54:20 PM]

[April 12, 2025, 01:54:20 PM]

[March 12, 2025, 03:05:30 PM]

[March 12, 2025, 03:05:30 PM]

[March 12, 2025, 03:05:30 PM]

[March 12, 2025, 03:05:30 PM]

[January 03, 2025, 03:29:12 PM]

[January 03, 2025, 03:29:12 PM]

[January 03, 2025, 03:29:12 PM]

[January 03, 2025, 03:29:12 PM]

[November 08, 2024, 04:31:03 PM]
Subscriptions
Get Latest Tech Updates For Free!
Resources
   Travelikers
   Funistan
   PrettyGalz
   Techlap
   FreeThemes
   Videsta
   Glamistan
   BachatMela
   GlamGalz
   Techzug
   Vidsage
   Funzug
   WorldHostInc
   Funfani
   FilmyMama
   Uploaded.Tech
   Netens
   Funotic
   FreeJobsInc
   FilesPark
Participate in the fastest growing Technical Encyclopedia! This website is 100% Free. Please register or login using the login box above if you have already registered. You will need to be logged in to reply, make new topics and to access all the areas. Registration is free! Click Here To Register.
+ Techno World Inc - The Best Technical Encyclopedia Online! » Forum » THE TECHNO CLUB [ TECHNOWORLDINC.COM ] » Techno News
 Nearly Back-To-Back Hacker Attacks Ignite Sales of Encryption Software
Pages: [1]   Go Down
  Print  
Author Topic: Nearly Back-To-Back Hacker Attacks Ignite Sales of Encryption Software  (Read 610 times)
RealWire
TWI Hero
**********



Karma: 0
Offline Offline

Posts: 18530


View Profile Email


Hard-working hackers have successfully defeated two of the most trusted encryption schemes in digital communications.  Now that the secrets of the popular 3G GSM and GSM A5/1 encryption schemes have been laid bare, security conscious business and government personnel are scrambling to find a secure alternative.  As a result encryption technology companies that do not depend upon these compromised technologies are experiencing a sudden surge in sales.

Rehovot, Israel—18 January 2010—Israeli secure communications company Gold Line Group Ltd. (www.gold-lock.com) is experiencing an unexpected upsurge in sales as a result of two major encryption breaches occurring within days of each other.

On December 28, 2009, 28-year old computer engineer Karsten Nohl announced he had “deciphered and published the secret code used to encrypt most of the world's digital mobile phone calls,” according to a story appearing in the New York Times.

Developed in 1988, the G.S.M. algorithm is the cellular communication industry’s most widely-used encryption protocol.  But after what happened on December 28th, its security scheme is now useless.

A few weeks later, on January 15, 2010, engineers at the Weizmann Institute of Science in Israel announced that in less than two hours, they had cracked the KASUMI system, a 128-bit A5/3 algorithm implemented across 3G networks, according to a story appearing on Engaget.com.

The defeat of these two algorithms has assured that virtually any cellular conversation or online digital transaction that depends upon either of these exploited technologies are open to monitoring and interception by hackers, thieves, spies, government agencies, or terrorists.

“This devastating one-two punch impacts over 85% of the world's cellular users," according to Noam Copel, Gold Lock’s CEO.

"As these users realize their business and personal conversations are wide open to eavesdropping, they are quickly turning to military-grade encrypted phones as a solution," Mr. Copel added.

Looking for a way to recover quickly, technology users are turning to companies with software and products that are not based upon these technologies. Gold Lock is one of those providers.

The company’s digital encryption software utilizes AES 256-bit and Elliptic Curve 384-bit encryption for protecting data and Diffie Hellman 4096-bit encryption for securing key transfers.   All encryption is executed using the protected device’s native processing power so no additional hardware or training is required.

Gold Lock recently drew national attention by offering U.S. $250,000 in gold and a position with the company to anyone who was able to download an encrypted telephone conversation from the company’s web site and provide the company with a decrypted transcript.  Despite over 5000 competitors from diverse organizations including those with .edu, .mil and .gov top level domains, so far the prize remains unclaimed.

“And while I have no way of knowing whether or not Mr. Nohl or the Weizmann Institute participated in our challenge, I can say without hesitation that, if they did, they were not successful,” said Copel.

Gold Lock customers include government and civilian users with a need to have secure conversations, or transmit files and data securely, without the risk of interception by third parties.  Gold Lock employs military-grade encryption algorithms in all of its products.  These algorithms are created by Gold Lock’s staff of over 30 highly experienced specialists, including security software developers, tactical mathematicians, and military trained analyzers in the field of strategic encryption.

Logged

Pages: [1]   Go Up
  Print  
 
Jump to:  

Copyright © 2006-2023 TechnoWorldInc.com. All Rights Reserved. Privacy Policy | Disclaimer
Page created in 0.166 seconds with 23 queries.