General Computer Security - Main Page

Have a question or want to show off your project? Post it! No Registration Necessary.  Now with pictures!

General Computer Security General computer security discussions
Web, RSS and Social Media interface to
There are 13077 individual articles here that are part of 3403 discussions
Please see below the list of the most recent and the best rated articles in General Computer Security

The most recent discussions

Special Offers

October 19, 2016, 7:27 am

Get Discounts, Special Offers and save big with Special Offers Coupons and Deals for all online stores in India. Save more with Special Coupons and Promo Codes from Couponsind. Read more »

CFP: 3rd ACM Cyber‐Physical System Security Worksh op (ACM CPSS’17)

October 9, 2016, 10:20 pm

C a l l F o r P a p e r s 3rd ACM Cyber‐Physical System Security Workshop (ACM CPSS’1 7) Abu Dhabi, UAE, April 2, 2017 Conference Outline: Cybe... Read more »

DIGRAMSUB, an encryption scheme based on substitution of digrams and transp...

October 3, 2016, 5:01 pm

DIGRAMSUB, an encryption scheme based on substitution of digrams and transposition of characters (with authentication) is available at: http:// M. ... Read more »

A simple combined PRNG based on permutation polynomials mod 2**n

September 17, 2016, 9:54 am

If a permutation polynomial mod 2**n is employed as a PRNG, it is well known that the lower order bits of the sequence of the binary words output are fairly poor statistically. On the other hand, f... Read more »

PERMPOLYSP, a block cipher employing permutation polynomials mod 2**n and p...

August 18, 2016, 8:59 am

PERMPOLYSP is a block cipher (with authentication) with substitutions of bit groups with pseudo-randomly determined permutation polynomials mod 2**n and pseudo-random permutations of bytes. It empl... Read more »

Survey: Determining a standard for information security cultures

August 17, 2016, 4:42 pm

Hello, I am currently enrolled for my Master's degree in Computer Science at the P otchefstroom campus of the North-West University. I am conducting a study a bout information security culture in ... Read more »

Proposal of a fair contract signing protocol (without a trusted third party...

June 20, 2016, 11:34 pm

When a contract in digital from is to be signed online by Alice and Bob, an issue concerning the fairness of the signing process crops up as follows: If Alice first signs the document and sends it ... Read more »

Location tracking of mobile phones

May 29, 2016, 6:01 pm

See my Post M. K. Shen Read more »

An improvement of the classical Playfair cipher

April 17, 2016, 7:12 pm

Though simultaneously using four 4*8 Playfair matrices and three processing rounds of overlapping pairs of characters, it has been shown with Maurer's Universal Statistical Test that the encryption... Read more »

FLEXISPY Spy Phone, Mobile Spy Ikee.B to the Federal Communications Commiss...

April 14, 2016, 7:27 pm

Dr. (PhD) Miguel Á. Gallardo, Tel. +34 902998352 Fax: +34 902998379 apeda To the Federal Communications Commission (FCC) I am a legal represe... Read more »

Coded sentences

April 7, 2016, 8:36 pm

A codebook in classical crypto is a mapping from a chosen number of normal or nonsense words to the corresponding intended words or even phrases and sentences. Wouldn't a generalization of that i... Read more »

New version of RSA encryption software PROVABLEPRIME V.2.0 available

March 10, 2016, 7:52 pm

Version 2.0 of PROVABLEPRIME contains an additional application example 3S (sending messages with the signature of the sender). M. K. Shen Read more »

Practicality of codebook in current-day secret communications

February 24, 2016, 8:50 pm

Codebook appears, if I don't err, to be an antiquitated topic rarely touched upon in discussions of modern cryptography. Couldn't codebook nonetheless be of high practical utility and even be extre... Read more »

Doubling the block length of a given block cipher

February 23, 2016, 11:31 am

IMHO the main essence of a Feistel cipher of block length n is the working of a non-linear function F that is applied to the two halves of the block of length n/2. Now suppose a certain block ciph... Read more »

How to counter the security risks of shared prime factors among RSA moduli ...

January 14, 2016, 7:28 am

A. K. Lenstra et al. in an extensive examination of the RSA moduli used in practice (, p.10) of the occurrence of duplicate RSA moduli and d... Read more »

How good is the chance of building a moderately sized quantum computer?

November 30, 2015, 11:29 am

I have quoted some IMHO remarkable passages on this issue from a number of sources and posted that together with a few tiny humble comments of mine at: Read more »

[CFP]: 2nd ACM Cyber-Physical System Security Workshop (ACM CPSS'16)

September 8, 2015, 4:55 pm

*** Apologies for multiple copies *** C a l l F o r P a p e r s ACM CPSS’16 CALL FOR PAPERS 2nd ACM Cyber-Physical System Security Workshop Xiían, China - May 31, 2016 (in conjunctio... Read more »

Researches in quantum computing seem to progress only extremely slowly

September 1, 2015, 11:09 am The article doesn't seem to be much more optimistic than reports on other well-known currently run... Read more »

[M] Laika BOSS malware detection donated by Lockheed Martin

August 17, 2015, 5:59 pm

From the «aircraft not included» department: Title: Why Lockheed Martin is giving away one of its best cybersecurity tools Author: Date: Mon, 17 Aug 2015 13:52:33 -0400 Link: http://www.csmonit... Read more »

A potential possibility of improvement of PKI for personal communications

August 16, 2015, 9:31 am

In countries like Germany each citizen has an identity card that is issued by the registration authority. Since the identity of a person is thus in a sense created by that authority, why not let it... Read more »

Click here for other recent discussions »

The best rated discussions


Avoid HTTPS when possible?

After the recent CA desasters, I wonder if one should avoid HTTPS whenever possible, in order not to create a false sense of security. I registered a .NAME domain some time ago and put some contac... Read more »


Is it OK to Delete these files in the Windows 98 Folder???

Is it OK to Delete these files in the Windows 98 Folder??? In the Windows Folder: Temporary Internet Files Windows Update Setup Files Downloaded Installations Cookies Cache Internet Logs User Data An... Read more »