Unassailable encryption algorithm cracked in two hours

Unassailable encryption algorithm cracked by EPFL researchers in two hours

A protocol based on “discrete logarithms”, deemed as one of the candidates for the Internet’s future security systems, was decrypted by EPFL researchers. Allegedly tamper-proof, it could only stand up to the school machines’ decryption attempts for two hours.

Only two hours! That can’t be good, especially when experts in the field thought it would take much longer. Another excerpt from the EPFL article:

Therefore, an EPFL team, together with Jens Zumbragel from TU Dresden, focused on a “family” of algorithms presented as candidates for the next generation of encryption keys, which made use of “supersingular curves. “We proved that it would only take two hours for EPFL computers to solve a problem of this kind. Whereas it was believed that it would take 40’000 times the age of the universe for all computers on the planet to do it!” explains Thorsten Kleinjung, post-doctoral fellow at LACAL.

Encryption cracked EPFL

You may read the complete article here.

Related Posts

Cases Against Thousands of Alleged BitTorrent Pirates Dismissed Last year, Larry Flynt Publications filed lawsuits against several thousand “John Does” the company accused of illegally sharing its movie “This Ain’t...
Shopping Online, Privacy, Data Protection and Third-Party Tracking In the wake of yet another e-commerce data breach in which the names and email addresses of millions of online shoppers and credit card users have bee...
Android 5.0 Lollipop, Nexus 9 tablet and Nexus 6 phablet Android 5.0, code-named Lollipop, is the latest edition of the most popular mobile operating system on planet Earth. Along with it, Google's also rele...
New Software Brings Facial-Recognition Technology to Mobile Phones Scientists at The University of Manchester have developed software for mobile phones that can track your facial features in real-time. Eventually it w...
Fluentd vs. Logstash: A Comparison of Log Collectors The unsung heroes of log analysis are the log collectors. They are the hard-working daemons that run on servers to pull server metrics, parse log file...
ProtonMail and Paypal: Do we need government approval to encrypt email? There's something brewing between Paypal and ProtonMail, a company based in Switzerland that provides secure email services, much like what Lavabit us...

We Recommend These Vendors and Free Offers

ContainerizeThis 2016 is a free, 2-day conference for all things containers and big data. Featured, will be presentations and free, hands-on workshops. Learn more at ContainerizeThis.com

Launch an SSD VPS in Europe, USA, Asia & Australia on Vultr's KVM-based Cloud platform starting at $5:00/month (15 GB SSD, 768 MB of RAM).

Deploy an SSD Cloud server in 55 seconds on DigitalOcean. Built for developers and starting at $5:00/month (20 GB SSD, 512 MB of RAM).

Want to become an expert ethical hacker and penetration tester? Request your free video training course of Online Penetration Testing and Ethical Hacking

Whether you're new to Linux or are a Linux guru, you can learn a lot more about the Linux kernel by requesting your free ebook of Linux Kernel In A Nutshell.


Leave a Comment

Your email address will not be published. Required fields are marked *

*