Fujitsu Laboratories said on Monday it has successfully cracked a next-generation cryptography standard known as pairing-based cryptography, breaking a world record.
Fujitsu and its partners, Japan’s National Institute of Information and Communications Technology (NICT) and Kyushu University, took 148.2 days to carry out a cryptanalysis of the 278-digit (923-bit) pairing-based cryptography, a task that had been thought to require several hundred thousand years.
The result is intended to give organisations a basis for evaluating the security of pairing-based cryptography and how long it may be securely used, Fujitsu said. Pairing-based cryptography is becoming a next-generation standard for government systems and international bodies, according to Fujitsu.
Such a cryptanalysis would allow an attacker to counterfeit the authority of a system administrator, according to Fujitsu.
To break the cryptography the team used 21 personal computers with a total of 252 cores, which Fujitsu noted was several hundred times the computing power used to achieve the previous world record, cracking a cryptogram based on 204 digits (676 bits).
Fujitsu said it reduced the time needed to carry out the attack by combining several new techniques, including parallel programming methods.
“We were able to overcome this problem by making good use of various new technologies, that is, a technique optimising parameter setting that uses computer algebra, a two dimensional search algorithm extended from the linear search, and by using our efficient programing techniques to calculate a solution of an equation from a huge number of data, as well as the parallel programming technology that maximises computer power,” Fujitsu said in a statement.
Unlike Fujitsu’s work, some of the recent flaws exposed in cryptographic systems have been attributed to the implementation of the systems rather than the underlying techniques involved.
In February, for instance, Swiss researchers concluded that some RSA public encryption keys offered “no security at all” because they had been improperly generated.
In 2010 Norwegian researchers found a way to crack the security of quantum cryptography, a crack carried out by taking control of the photon detectors commonly used in implementing such systems. Quantum cryptography relies on quantum mechanical effects to perform cryptographic tasks.
In January researchers proposed a technique called “blind quantum computing” that could allow quantum cryptography to be extended to the cloud.
How well do you know Internet security? Take our quiz!
Suspended prison sentence for Craig Wright for “flagrant breach” of court order, after his false…
Cash-strapped south American country agrees to sell or discontinue its national Bitcoin wallet after signing…
Google's change will allow advertisers to track customers' digital “fingerprints”, but UK data protection watchdog…
Welcome to Silicon In Focus Podcast: Tech in 2025! Join Steven Webb, UK Chief Technology…
European Commission publishes preliminary instructions to Apple on how to open up iOS to rivals,…
San Francisco jury finds Nima Momeni guilty of second-degree murder of Cash App founder Bob…
View Comments
This isn't journalism, this is pandering to stupid people. Maybe the author should go back to working on their novel instead of trying to "invent" cryptographic terminology that is going to be scrutinized by experts in the field.
It would be cool if they could now decode undeciphered scripts such as Mayan and the Harappan script.
TechWeek Europe doesn't exactly seem like a journal, so the author doesn't have to be an expert on the material. I think it's a perfectly adequate overview of a topic that a "stupid" person like myself was completely unaware of and unfamiliar with. If you want something that caters more to an expert such as yourself, perhaps you should try a real journal article?