Various thoughts from an educational professional & geek.
Logjam isn't the only reason your computer might be more vulnerable to internet threats
Get link
Facebook
X
Pinterest
Email
Other Apps
There’s a hole in the protection surrounding some of the internet’s supposedly secure websites. A group of researchers has discovered that cyber criminals and other hackers can attack websites that use the “https” security encryption using a method known as “Logjam”. This attack, which is thought to work on around 8% of the top one million websites, allows hackers to see important information that should be protected, such as payment details or private communication.
Encryption is a way of turning information into a secret code in order to stop others from eavesdropping on your internet conversations. Every time you see a padlock or then letters “https” in the address bar of your web browser, everything being sent between your computer and the remote web server where the website you are viewing is stored is encrypted and should be secret. The discovery of the Logjam attack, which is possible because of a flaw in the security software, means this may not always be the case.
Logjam works by attacking a part of the security process called the “Diffie-Hellman key exchange”. This is a way of creating and securely sending the key that unlocks the encryption and allows you to read the information. This key is formed using two very large, complex and random prime numbers (numbers that can only be divided by themselves or the number one), which cannot easily be predicted. The larger the key, the stronger the encryption.
Older keys are saved with 1024 bits of computer memory, meaning each one has 21024 possible combinations. But computers are now powerful enough to work out what the right combination is. The Logjam attack involves capturing the key data and then using computational power to crack its code. As a result, security experts are advising web sites that still use these keys to move to much longer versions that are harder to predict.
Hackers can also use something called a rainbow table to look up pre-cracked codes and use their computer to match the key against them. The more power a computer has, the faster it can work through the database of pre-cracked codes. There are still multiple combinations to check, but the work has in part already been done for them.
Looking for the key.Shutterstock
The growing power of computers means many existing security measures are increasingly likely to become obsolete and need replacing. However, it’s not just companies failing to keep up with the latest advances that could leave internet users more vulnerable. Most technology companies are trying to create stronger security for their products because we (their customers) demand it. But there is also a trade-off between national security and personal security they have to be aware of.
Agencies such as the FBI have stated that some methods of encryption are now too strong, meaning they want to be able to peek at people’s communications. They want encryption to be strong but not impenetrable. This has become a frustrating dilemma and, as Logjam proves by exploiting weaker Diffe-Hellman keys, there are weaker servers at the lower end that may fall foul of this demand to balance the security expectations of their organisation with the policing demands of governmental bodies.
There is already a flurry of activity across the internet as server administrators are attempting to patch the Logjam problem and increase their security level for key exchanges. We’ll just have to hope that they can accomplish this before someone compromises their servers. While only a proportional minority of websites are affected by Logjam, you can also check your web browser and see if it needs updating.
After reading a considered write up from colleague Ray Corrigan and support from Cory Doctorow I feel that here is one decision from our senior management, that for the first time in seven years made me wonder about the state of mind within the Open University (OU). One of the primary reasons I joined the OU is that it was a organisation I could get behind - irrespective of its many eccentricities. It's mission to enable whomever that tried; to reach for higher education - this was something I could easily get behind. We do need to look at how we use the different offices - but to cull them in such a manner and looking at the outcomes of the location analysis. Strikes me that whomever was given the job - did little to review each location and approached this from a purely numerical perspective. Having worked hard to develop a community of Cisco Academies, Vendor interests and interventions in the Computing and Network Engineering teaching communities. I have used thes...
Ok, this is not a scientific study, the audience participation is likely to be from a self selecting group etc. So lets call this a poll amongst friends, followers and like minded. A question that is structural to my research is ... Do you think simulation can replace real hardware, when teaching networking? To remain fair, I am not going to share my opinion as it is biased and please don't try and answer this to please me (as I really don't know who will be answering and if you know me, you will know that it won't). Please take a look at the top left of this blog and based on your personal opinion, answer either yes or no. You do not have to be an expert, or an academic or even a teccie, everyone's opinion in this context counts. The opinions below are valid view points, but must not contribute to your own independent decision, please complete the question before reading these. =================================...
The wheels at my university are renowned for being slow and cumbersome. However, getting a simple prepackaged course from a 3rd party with no rights issues out there has been nothing short of escargot'esqe. As of the 1st of May 2017 - we have our first Linux NAL - following the model of the relevant knowledge courses that once occupied the students of the Open University. Offering Linux is not a new notion - having offered for three years a short course in Linux that was at the time ahead of most in reaching a distance learning population. In this short time, we engaged with over 2400 students giving them all a taste of Linux. Now, with the maturity of HTML5 and some considerable insight from NDG and LPI in collaboration with Cisco Systems. We are able to offer a fully remote Linux experience. With the Linux operating system running as a web browser based cloud instance. Our first presentation of this course will have all the hallmarks of a discovery experience - while ...
Comments
Post a Comment