Jump to navigation
Digital networking now permeates almost all areas of life. Developing protective mechanisms is an urgent task.
Funded by the European Research Council with 2.5 million euros, Gregor Leander is developing new encryption methods. He wanders off the beaten track and doesn’t simply rely on the principle of trial and error.
Many encryption algorithms are mathematically proven to be one hundred per cent secure. Nevertheless, they sometimes fail to protect confidential data. This is because encryption doesn’t happen merely in theory.
Attackers have the ability not only to manipulate software, but also to tamper with the hardware. A team from Bochum is devising methods to detect such tampering.
Attacks on the TLS protocol are both rare and highly complex. And yet, the encryption experts at Ruhr University Bochum are constantly tracking down new ones.
Drones shouldn’t be able to fly over airports and should have a unique serial number. In theory.
Algorithms made in Bochum are becoming the global standard for secure encryption in the age of quantum computing. They’ve arrived just in time.
Secret services want to know as much as possible. For example, they try to circumvent data encryption. This can cause collateral damage, warn Bochum researchers.
Pascal Sasdrich will be funded by the Deutsche Forschungsgemeinschaft with 1.3 million euros for his project CAVE.
Researchers from Bochum are particularly quick at finding security vulnerabilities in IT systems. Their trick: they focus on the essentials – and explain it with the theorem of the infinitely typing monkeys.
Researchers from Bochum are particularly quick at finding security vulnerabilities in IT systems. Their trick: they focus on the essentials.
Using cloud services without running into trouble with the GDPR – the company Edgeless Systems makes it possible. Founder Dr. Felix Schuster reflects on the somewhat difficult entry into a new market.
Researchers reviewed 42 apps and found privacy and security deficiencies, some of which were quite serious. Some apps even sell their users’ data to third parties.
Up to now, protecting hardware against manipulation has been a laborious business: expensive, and only possible on a small scale. And yet, two simple antennas might do the trick.
Wirelessly functioning devices are omnipresent in our households. However, wireless communication endangers our privacy: Passive eavesdroppers are able to obtain sensitive data through intercepted high-frequency signals.
Artificial intelligence can imitate people’s voices. Scammers are already taking advantage of this on the phone. A team in Bochum is working on a solution.
Using so-called XS-Leaks, personal data can be accessed on the web. Many browsers are affected.
Popular unlocking patterns are often in the shape of a letter – and are easy to guess. A bad thing if someone loses their mobile phone and it ends up in the wrong hands.
For data protection reasons, the messaging app Signal is becoming ever more important. Unlike WhatsApp, the Signal app asks you to create a PIN during setup. But why?
Logging into an online shop without a password, using only the fingerprint? In this situation, it’s not surprising that users have the impression that their biometric data is transmitted to the website.