Unassailable encryption algorithm cracked in two hours

Unassailable encryption algorithm cracked by EPFL researchers in two hours

A protocol based on “discrete logarithms”, deemed as one of the candidates for the Internet’s future security systems, was decrypted by EPFL researchers. Allegedly tamper-proof, it could only stand up to the school machines’ decryption attempts for two hours.

Only two hours! That can’t be good, especially when experts in the field thought it would take much longer. Another excerpt from the EPFL article:

Therefore, an EPFL team, together with Jens Zumbragel from TU Dresden, focused on a “family” of algorithms presented as candidates for the next generation of encryption keys, which made use of “supersingular curves. “We proved that it would only take two hours for EPFL computers to solve a problem of this kind. Whereas it was believed that it would take 40’000 times the age of the universe for all computers on the planet to do it!” explains Thorsten Kleinjung, post-doctoral fellow at LACAL.

Encryption cracked EPFL

You may read the complete article here.

Related Posts

How to create and maintain anonymous email accounts Don't let what happened to the director (actually, former director) of a very powerful government agency make you think that engaging in anonymous ema...
Docker 1.8 and the New Daemon Command Docker 1.8 was released just about a month ago. With it came some very much requested and needed features, like Docker Content Trust, Docker Toolbo...
New System Makes Household Communication Networks More Versatile Household network communications is developing so quickly that it is necessary to adapt and change in order to take advantage of the new services and ...
‘Racetrack’ Magnetic Memory Could Make Computer Memory 100,000 Times Faster Imagine a computer equipped with shock-proof memory that's 100,000 times faster and consumes less power than current hard disks. EPFL Professor Mathia...
Converting Apache Rewrite Rules to Nginx Rewrite Rules Last week we published a blog about Creating NGINX Rewrite Rules. In this complementary blog, we’ll discuss how to convert Apache HTTP server rewr...
Building Effective, Secure Container Delivery Pipelines with Docker, rkt et al. Opinions on how best to package and deliver applications are legion and, like many other aspects of the software world, are subject to recurring trend...

We Recommend These Vendors and Free Offers

Launch an SSD VPS in Europe, USA, Asia & Australia on Vultr's KVM-based Cloud platform starting at $5:00/month (15 GB SSD, 768 MB of RAM).

Deploy an SSD Cloud server in 55 seconds on DigitalOcean. Built for developers and starting at $5:00/month (20 GB SSD, 512 MB of RAM).

Want to become an expert ethical hacker and penetration tester? Request your free video training course of Online Penetration Testing and Ethical Hacking

Whether you're new to Linux or are a Linux guru, you can learn a lot more about the Linux kernel by requesting your free ebook of Linux Kernel In A Nutshell.


Leave a Comment

Your email address will not be published. Required fields are marked *

*