Unassailable encryption algorithm cracked in two hours

Unassailable encryption algorithm cracked by EPFL researchers in two hours

A protocol based on “discrete logarithms”, deemed as one of the candidates for the Internet’s future security systems, was decrypted by EPFL researchers. Allegedly tamper-proof, it could only stand up to the school machines’ decryption attempts for two hours.

Only two hours! That can’t be good, especially when experts in the field thought it would take much longer. Another excerpt from the EPFL article:

Therefore, an EPFL team, together with Jens Zumbragel from TU Dresden, focused on a “family” of algorithms presented as candidates for the next generation of encryption keys, which made use of “supersingular curves. “We proved that it would only take two hours for EPFL computers to solve a problem of this kind. Whereas it was believed that it would take 40’000 times the age of the universe for all computers on the planet to do it!” explains Thorsten Kleinjung, post-doctoral fellow at LACAL.

Encryption cracked EPFL

You may read the complete article here.

Related Posts

The most affordable FreeBSD-supported Cloud/VPS hosting providers Looking for a Cloud/VPS hosting provider that supports FreeBSD? Your search is more than half way done. That's because I have gone through the off...
How to create and maintain anonymous email accounts Don't let what happened to the director (actually, former director) of a very powerful government agency make you think that engaging in anonymous ema...
Krita Sketch released Krita Sketch, a version of Krita for touch interfaces, has been released. Krita is a cross-platform sketching and painting application for the K Deskt...
Turbo charge your Android Opera Mobile 10.1 beta source: Android users now have a new choice when it comes to browsers. Today, Opera Software announced that Opera Mobile 10.1 beta is available in the...
New USB Type-C cable connectors will be reversible In the future, you will be able to connect any USB cable to a USB port without worrying whether the connector is facing "up" or "down." In other words...
Google’s patent pledge: We won’t be the first to sue While we are waiting for some kind of reform of the US patent system, it's good too see a major technology outfit like Google going solo with regards ...

We Recommend These Vendors and Free Offers

Launch an SSD VPS in Europe, USA, Asia & Australia on Vultr's KVM-based Cloud platform starting at $5:00/month (15 GB SSD, 768 MB of RAM).

Deploy an SSD Cloud server in 55 seconds on DigitalOcean. Built for developers and starting at $5:00/month (20 GB SSD, 512 MB of RAM).

Want to become an expert ethical hacker and penetration tester? Request your free video training course of Online Penetration Testing and Ethical Hacking

Whether you're new to Linux or are a Linux guru, you can learn a lot more about the Linux kernel by requesting your free ebook of Linux Kernel In A Nutshell.


Leave a Comment

Your email address will not be published. Required fields are marked *

*