Wireless Worms Will Follow Influenza's Example
New Scientist (02/26/08) Knight, Will
The outbreak of a wireless computer worm that spreads among portable devices like a flu epidemic is a possibility, according to a new mathematical model developed by Imperial College London researcher Christopher Rhodes and BT researcher Maziar Nekovee. Their model considers a group of people carrying Bluetooth-enabled smartphones, each of which has a fixed range for linking to other phones in the crowd. Each member of the crowd moves in a straight line and at a fixed speed, giving a phone that is contaminated by a worm a fixed likelihood of infecting other devices while they are within range. Rhodes and Nekovee's work demonstrates that a wireless worm could most efficiently proliferate in a crowded environment and also jump between geographically scattered locations, just like a real virus. "Knowledge that person-to-person contact, or rather device-to-device contact, represents a major factor in how a Bluetooth worm spreads is definitely important," says Symantec Security Response researcher Eric Chien. He adds that the disablement of non-essential Bluetooth communications during an outbreak "reduces the contact occurrences and would be analogous to wearing a surgical mask in areas of potential infection."
Click Here to View Full Article
Showing posts with label cell phone. Show all posts
Showing posts with label cell phone. Show all posts
Tuesday, February 26, 2008
Friday, February 22, 2008
Security: Cryptanalysis of A5/1, attack against the GSM cell phone encryption
Cryptanalysis of A5/1
February 22, 2008, Bruce Schneier
There have been a lot of articles about the new attack against the GSM cell phone encryption algorithm, A5/1. In some ways, this isn't real news; we've seen A5/1 cryptanalysis papers as far back as ten years ago.
What's new about this attack is: 1) it's completely passive, 2) its total hardware cost is around $1,000, and 3) the total time to break the key is about 30 minutes. That's impressive.
The cryptanalysis of A5/1 demonstrates an important cryptographic maxim: attacks always get better; they never get worse. This is why we tend to abandon algorithms at the first sign of weakness; we know that with time, the weaknesses will be exploited more effectively to yield better and faster attacks.
Posted on February 22, 2008 at 06:31 AM
February 22, 2008, Bruce Schneier
There have been a lot of articles about the new attack against the GSM cell phone encryption algorithm, A5/1. In some ways, this isn't real news; we've seen A5/1 cryptanalysis papers as far back as ten years ago.
What's new about this attack is: 1) it's completely passive, 2) its total hardware cost is around $1,000, and 3) the total time to break the key is about 30 minutes. That's impressive.
The cryptanalysis of A5/1 demonstrates an important cryptographic maxim: attacks always get better; they never get worse. This is why we tend to abandon algorithms at the first sign of weakness; we know that with time, the weaknesses will be exploited more effectively to yield better and faster attacks.
Posted on February 22, 2008 at 06:31 AM
Subscribe to:
Posts (Atom)
Blog Archive
-
▼
2012
(35)
-
▼
April 2012
(13)
- Blog: Algorithmic Incentives
- Blog: Finding ET May Require Giant Robotic Leap
- Blog: New Julia Language Seeks to Be the C for Sci...
- Blog: Fast Data hits the Big Data fast lane
- Blog: Beyond Turing's Machines
- Blog: Cooperating Mini-Brains Show How Intelligenc...
- Blog: Transactional Memory: An Idea Ahead of Its Time
- Blog: Bits of Reality
- Blog: Berkeley Group Digs In to Challenge of Makin...
- Blog: Programming Computers to Help Computer Progr...
- Blog: To Convince People, Come at Them From Differ...
- Blog: Self-Sculpting Sand
- Blog: UMass Amherst Computer Scientist Leads the W...
- ► March 2012 (16)
- ► February 2012 (3)
- ► January 2012 (3)
-
▼
April 2012
(13)
-
►
2011
(118)
- ► December 2011 (9)
- ► November 2011 (11)
- ► October 2011 (7)
- ► September 2011 (13)
- ► August 2011 (7)
- ► April 2011 (8)
- ► March 2011 (11)
- ► February 2011 (12)
- ► January 2011 (15)
-
►
2010
(183)
- ► December 2010 (16)
- ► November 2010 (15)
- ► October 2010 (15)
- ► September 2010 (25)
- ► August 2010 (19)
- ► April 2010 (21)
- ► March 2010 (7)
- ► February 2010 (6)
- ► January 2010 (6)
-
►
2009
(120)
- ► December 2009 (5)
- ► November 2009 (12)
- ► October 2009 (2)
- ► September 2009 (3)
- ► August 2009 (16)
- ► April 2009 (4)
- ► March 2009 (20)
- ► February 2009 (9)
- ► January 2009 (19)
-
►
2008
(139)
- ► December 2008 (15)
- ► November 2008 (16)
- ► October 2008 (17)
- ► September 2008 (2)
- ► August 2008 (2)
- ► April 2008 (12)
- ► March 2008 (25)
- ► February 2008 (16)
- ► January 2008 (6)
-
►
2007
(17)
- ► December 2007 (4)
- ► November 2007 (4)
- ► October 2007 (7)
Blog Labels
- research
- CSE
- security
- software
- web
- AI
- development
- hardware
- algorithm
- hackers
- medical
- machine learning
- robotics
- data-mining
- semantic web
- quantum computing
- Cloud computing
- cryptography
- network
- EMR
- search
- NP-complete
- linguistics
- complexity
- data clustering
- optimization
- parallel
- performance
- social network
- HIPAA
- accessibility
- biometrics
- connectionist
- cyber security
- passwords
- voting
- XML
- biological computing
- neural network
- user interface
- DNS
- access control
- firewall
- graph theory
- grid computing
- identity theft
- project management
- role-based
- HTML5
- NLP
- NoSQL
- Python
- cell phone
- database
- java
- open-source
- spam
- GENI
- Javascript
- SQL-Injection
- Wikipedia
- agile
- analog computing
- archives
- biological
- bots
- cellular automata
- computer tips
- crowdsourcing
- e-book
- equilibrium
- game theory
- genetic algorithm
- green tech
- mobile
- nonlinear
- p
- phone
- prediction
- privacy
- self-book publishing
- simulation
- testing
- virtual server
- visualization
- wireless