News & Announcements

Unassailable encryption algorithm cracked in two hours

Unassailable encryption algorithm cracked by EPFL researchers in two hours

A protocol based on “discrete logarithms”, deemed as one of the candidates for the Internet’s future security systems, was decrypted by EPFL researchers. Allegedly tamper-proof, it could only stand up to the school machines’ decryption attempts for two hours.

Only two hours! That can’t be good, especially when experts in the field thought it would take much longer. Another excerpt from the EPFL article:

Therefore, an EPFL team, together with Jens Zumbragel from TU Dresden, focused on a “family” of algorithms presented as candidates for the next generation of encryption keys, which made use of “supersingular curves. “We proved that it would only take two hours for EPFL computers to solve a problem of this kind. Whereas it was believed that it would take 40’000 times the age of the universe for all computers on the planet to do it!” explains Thorsten Kleinjung, post-doctoral fellow at LACAL.

Encryption cracked EPFL

You may read the complete article here.

Related Posts

France begins IT research centre on innovation and free software France's national computer science institute, Inria, says free software is essential to develop digital society. The institute is launching a research...
Don’t like the Mozilla/Yahoo deal? Make StartPage your search engine Last week Mozilla announced that, starting from December (2014), the default search engine provider in its Firefox Web browser application will be Yah...
No, that “Most Trusted Company for Privacy Award” does not compute I think most people read about the "Most Trusted Internet Company for Privacy Award" via a blog post from the Mozilla Foundation, publisher of the Fir...
Hyper-Texting and Hyper-Networking Pose New Health Risks for Teens Texting while driving can be a deadly combination for anyone. Yet, new data reveal that the dangers of excessive texting among teens are not limited t...
Computer Scientist, Student Design Software to Combat Hacking Using Keystroke Anti-Spoofin... One of the serious threats to a user's computer is a software program that might cause unwanted keystroke sequences to occur in order to hack someone'...
European Parliament restart workgroup on open source software A number of members of the European Parliament are about to start an informal cross party working group on 'new media, free and open source software a...

We Recommend These Vendors and Free Offers

Launch an SSD VPS in Europe, USA, Asia & Australia on Vultr's KVM-based Cloud platform starting at $5:00/month (15 GB SSD, 768 MB of RAM).

Deploy an SSD Cloud server in 55 seconds on DigitalOcean. Built for developers and starting at $5:00/month (20 GB SSD, 512 MB of RAM).

Want to become an expert ethical hacker and penetration tester? Request your free video training course of Online Penetration Testing and Ethical Hacking

Whether you're new to Linux or are a Linux guru, you can learn a lot more about the Linux kernel by requesting your free ebook of Linux Kernel In A Nutshell.


Leave a Comment

Your email address will not be published. Required fields are marked *

*