Archive | Cryptography


03 October 2008 | 8,432 views

THC-ePassports – THC Clones Biometric ePassport – Elvis Presley Passport

I guess most people have been led to believe this new generation of ePassports or biometric passports are more secure, will help us keep our privacy intact and help us mitigate against identity theft. Well how wrong the propaganda is! THC (famous for their tools and research in security) has just released some technical information, [...]

Continue Reading


26 June 2008 | 41,392 views

Hackers Crack London Tube Oyster Card

It just goes to show, having an aluminium lined wallet could really be useful! Hackers in the Netherlands found they could clone an access card using the Mifare chip, after that they traveled to London to try their technique out on the Oyster card (used on the London Underground), which uses the same chip. It [...]

Continue Reading


02 May 2007 | 9,340 views

That ‘magic’ number

09 F9 11 02 9D 74 E3 5B D8 41 56 C5 63 56 88 C0 This is everywhere today. Every major news site has this ‘magic’ number in it. Digg.com had stories with more than 24.000 diggs (that’s actually the first time I see that many). In case you’ve been in a cave for [...]

Continue Reading

Tags: , , , ,

05 March 2007 | 6,184 views

Let’s Digest Some Messages – md5 Hash Checker for Windows

Of course it’s a small article about md5… I really wondered how many Micro$oft Windows users check the md5 sum of programs that they download from the internet… Do you really trust that much the mirror websites? Even I could set up a mirror website for any download website and spread malformed packages to include, [...]

Continue Reading


02 March 2007 | 10,538 views

SHA-1 Cracked – Old News, But People Still Talk

A paper about cracking SHA-1 originally surfaced in 2005, from a fairly reputable scientific source in China, it was widely publicised nor talked about much. But then recently, just last month China managed to make a wave out of it, almost 2 years after the initial ‘report’. It was even Slashdotted on January 20th 2007, [...]

Continue Reading


29 May 2006 | 6,069 views

Malicious Cryptography – Cryptology & Cryptovirology

I know this maybe old news for some of you, however, I just got the chance of reading this great article on Security Focus (it’s been 2 weeks since I add it to my Favorites) This two part article discusses some good points of Cryptology, more precisely in the field of Cryptovirology. Writing a virus [...]

Continue Reading