Trends in Cryptography

January/February 2015

IEEE Security & Privacy magazine cover

From the Guest Editors

Cryptography keeps data secret while in transit or at rest, and this property underlies the notions of secure communication, secure identities, and access control on the Internet. These are well-known uses implemented by algorithms and protocols that are the subject of ongoing research and refinement. The field grows with the steady discovery of new forms of and uses for secure communication. These developments make for a vibrant, emerging landscape for privacy and authentication on an ever-shifting physical substrate. In this special magazine issue, four different parts of that landscape are explored. Read full article »

About IEEE Security & Privacy

IEEE Security & Privacy magazine provides articles with both a practical and research bent by the top thinkers in the field along with case studies, tutorials, columns, and in-depth interviews and podcasts for the information security industry.

Articles from IEEE Security & Privacy

Physical Unclonable Functions: A Primer

Physical Unclonable Functions: A Primer

Physical unclonable functions (PUFs) make use of the measurable intrinsic randomness of physical systems to establish signatures for those systems. PUFs provide a means to generate unique keys that don't need to be stored in nonvolatile memory, and they offer exciting opportunities for new authentication and supply chain security technologies. Read full article »

An Organizational Psychology Perspective to Examining Computer Security Incident Response Teams

An Organizational Psychology Perspective to Examining Computer Security Incident Response Teams

Generally, computer security incident response team (CSIRT) managers and team members focus only on individual-level skills. The field of organizational psychology can contribute to an understanding of the full range of CSIRT job requirements, which include working as a team and within a larger multiteam system. Read full article »

Announcements

Authentication at Scale

Arguing that it's time to give up on elaborate password rules, Google Vice President of Security Eric Grosse and engineer Mayank Upadhyay present a better way to achieve stronger user identification. Read full article »

Multimedia

Silver Bullet Security Podcast with Gary McGraw

Silver Bullet Security Podcast logo

Steve Katz
Steve Katz is owner and founder of Security Risk Solutions and the “world’s first CISO.” Gary and Steve discuss the history and evolution of the CISO position, the difficulty of measuring risk in a realistic fashion, how to allocate resources between proactive security engineering and standard network security, triage, and incident response, what it means to be an executive, and the FS-ISAC. More podcast episodes »