Has the RC4 encryption algorithm been broken for good?

Disk Encryption and File Encryption

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Encryption: Building to code

    Data protection mandates in legislation like HIPAA and the Sarbanes-Oxley Act are making encryption more popular, but cryptography as a point solution is another story. 

  • Who's Who in Infosec: Whitfield Diffie

    Who's Who in Infosec is an ongoing series featuring profiles of security professionals and their contributions to the industry. 

  • Experts: Encryption not a security cure-all

    Enterprises have to understand what security problems they have before deciding whether to encrypt data or secure the network or system on which that data is traveling. 

  • Companies focus on storage encryption

    Encryption and compression chip-maker Hifn has teamed up with storage appliance vendor NeoScale to market and sell the latter's new line of storage appliances. The appliances can protect data both while it's in transit and stored. 

  • Quick Takes: ZIP inventors add encryption

    PKWare announced new PKZip products that add strong encryption for MVS and OS/400 platforms and upgrades to its Unix and Windows products, leading off this edition of Quick Takes. 

  • Expert deconstructs the cracking of 64-bit key

    Last week, Distributed.net announced it had successfully cracked RSA Security's RC5-64 cipher, the company's 64-bit encryption key. Distributed.net, the nonprofit Birmingham, Ala.-based group that says its mission is the promotion of distributed comp... 

  • Beware of PGP 'con job'

    The recently announced security flaw in PGP (Pretty Good Privacy), the popular e-mail encryption software, relies more on social engineering than a glitch in the actual technology. It won't wreak havoc unless a user is tricked into hitting the reply ... 

  • (#6) Tech Tip: Tales from the crypto, part one

    This series of tips provides simplified explanations of current encryption technologies, with some suggestions for specific situations thrown in. 

  • Quick Takes: RSA encryption software gets key validation

    Quick Takes: RSA encryption software gets key validation 

  • Experts sound off on calls for crypto bans

    Experts sounds off on calls for crypto bans