Wednesday, November 22, 2017
Search
  
Submit your own News for
inclusion in our Site.
Click here...
Breaking News
FCC Chief's Proposal Reverses the Net netruality Rules
Facebook Messenger Gets Support for 4K Photos
Broadcom Announces 7nm IP for ASICs in Deep Learning and Networking Applications
Justice Department Sues to Stop AT&T - Time Warner Deal
Apple Removes Skype and Other Apps in China
Android Collects Android Users' Locations Using Cell-tower Data
GPU Shipments in Q3: AMD Increased 8 percent, Nvidia Increased 30 Percent
Samsung Says New SZ985 Z-NAND SSD Offers Ultra-Low Latency and High Throughput
Active Discussions
Which of these DVD media are the best, most durable?
How to back up a PS2 DL game
Copy a protected DVD?
roxio issues with xp pro
Help make DVDInfoPro better with dvdinfomantis!!!
menu making
Optiarc AD-7260S review
cdrw trouble
 Home > News > General Computing > Fujitsu...
Last 7 Days News : SU MO TU WE TH FR SA All News

Monday, June 18, 2012
Fujitsu Breaks Next Generation Cryptography Record


Fujitsu Laboratories Limited, National Institute of Information and Communications Technology (NICT) and The Japanese Kyushu University jointly broke a world cryptography record with the successful cryptanalysis of a 278-digit (923-bit)-long pairing-based cryptography, which is now becoming the next generation cryptography standard.

Pairing-based cryptography is a next-generation cryptography (proposed in 2001) based on a map called pairing, which offers many useful functionalities that could not be achieved by previous public-key cryptography. The security of pairing-based cryptography is based on the intractability of discrete logarithm problem (DLP). DLP is a problem to compute d such that a = gd for given g and a.

Until now, cryptanalysis of pairing-based cryptography of this length was thought impossible as it was estimated to take several hundred thousand years to break. Indeed, despite numerous efforts to use and spread this cryptography at the development stage, it wasn't until this new way of approaching the problem was applied. The researchers proved that pairing-based cryptography of this length was fragile and could actually be broken in 148.2 days.

The result is used as the basis of selecting secure encryption technology and canbe proved useful in the standardization of next-generation cryptography in electronic government systems in Japan and international standardization organizations.

"Pairing-based" cryptography systems can be used for various useful applications such as "Identity-based encryption", "keyword searchable encryption", and "functional encryption", which were impossible using previous public key cryptography.

As for a security evaluation of cryptographies, the researchers succeeded with the cryptanalysis of the pairing-based cryptography of 278 digits (923 bits) by using 21 personal computers (252 cores) in 148.2 days. The cryptanalysis is the equivalent to spoofing the authority of the information system administrator. As a result, for the first time in the world it was proved that the cryptography of the parameter was vulnerable and could be broken in a realistic amount of time.

This was an extremely challenging problem as it required several hundred times computational power compared with the previous world record of 204 digits (676 bits). The researchers overcome this problem by making good use of various new technologies such as a technique optimizing parameter setting that uses computer algebra, a two dimensional search algorithm extended from the linear search, and by using efficient programing techniques to calculate a solution of an equation from a huge number of data, as well as the parallel programming technology that maximizes computer power.

"This result is not just a new world record of cryptanalysis, it also means the acquisition of valuable data that forms a technical foundation on which to estimate selection of secure encryption technology or the appropriate timing to exchange a key length," Fujitsu said. "We will continue to move forward on research that pushes the boundary of the secure use of cryptography."


Previous
Next
Intel Introduces Xeon Phi Brand for Products Based on Many Integrated Core Architecture        All News        Sharp Showcases Its "Feel UX" User Interface For Smartphones
Yahoo Appoints Google's Michael Barrett as Executive Vice President and Chief Revenue Officer     General Computing News      ICANN Restores New gTLD Application Details After Privacy Breach

Get RSS feed Easy Print E-Mail this Message

Related News
Lenovo to Buy Fujitsu PC Unit Stake
Lenovo Could Take Over Fujitsu's PC Unit
Fujitsu Develops Wearable, Hands-Free Speech Translation Device
Fujitsu AI-Based Algorithm Estimates Workers' Heat Stress Levels
Fujitsu Virtual Machine Control Technology Improves Server Density
Fujitsu and Oracle Launch Fujitsu SPARC M12 Servers with Fastest Per-Core Performance
Fujitsu to Build GPU-equipped RIKEN Deep Learning System Dedicated to AI Research
Fujitsu Releases FRAM Memory For The Automotive Market
Fujitsu Develops Connection Control Technology for LTE and Wi-Fi
Fujitsu Develops Slide-Style Vein Authentication Technology Based on Palm Veins
Fujitsu Launches Online Biometric Authentication Service With Support for FIDO-Compliant Security
Fujitsu Starts Operations For Japan's Fastest Supercomputer

Most Popular News
 
Home | News | All News | Reviews | Articles | Guides | Download | Expert Area | Forum | Site Info
Site best viewed at 1024x768+ - CDRINFO.COM 1998-2017 - All rights reserved -
Privacy policy - Contact Us .