Fujitsu cracks 978-bit encryption algorithm

Vendor's research team takes just over 148 days to decode 978-bit pairing-based cryptography system.

Safe

A research team from Japanese computing firm Fujitsu has managed to crack a 978-bit pairing-based cryptography system that has been hailed as the next generation of encryption security.

The team were working alongside Japan's National Institute of Information and Communications Technology (NICT) and Kyushu University and, between them, managed to decrypt the code in 148.2 days.

This beats the previous record for breaking a code of 676 bits, which was held by Japan's Hakodate Future University and NICT in 2009. Cracking a 923-bit key was considered to be hundreds of times more difficult.

The scientists said, to overcome the problem of cracking a seemingly impossible code, several new technologies were used. These include optimisation techniques, a new two-dimensional search algorithm and parallel programming.

To crack the code, the team used 21 personal computers with 252 processor cores. The cryptanalysis is the equivalent to spoofing the authority of the information system administrator.

"As a result, for the first time in the world we proved that the cryptography of the parameter was vulnerable and could be broken in a realistic amount of time," the team said in a statement.

The researchers said the attempt to crack the code was not just a new world record of cryptanalysis, "it also means the acquisition of valuable data that forms a technical foundation on which to estimate selection of secure encryption technology or the appropriate timing to exchange a key length."

The team is now engaged in further research "that pushes the boundary of the secure use of cryptography."

Featured Resources

The ultimate law enforcement agency guide to going mobile

Best practices for implementing a mobile device program

Free download

The business value of Red Hat OpenShift

Platform cost savings, ROI, and the challenges and opportunities of Red Hat OpenShift

Free download

Managing security and risk across the IT supply chain: A practical approach

Best practices for IT supply chain security

Free download

Digital remote monitoring and dispatch services’ impact on edge computing and data centres

Seven trends redefining remote monitoring and field service dispatch service requirements

Free download

Recommended

Fujitsu Primeflex for Nutanix Enterprise Cloud review: Nutanix in a jiffy
Server & storage

Fujitsu Primeflex for Nutanix Enterprise Cloud review: Nutanix in a jiffy

19 Jul 2021
Nigerian cyber criminals target Texas unemployment system
cyber security

Nigerian cyber criminals target Texas unemployment system

27 May 2021
Hackers use open source Microsoft dev platform to deliver trojans
Security

Hackers use open source Microsoft dev platform to deliver trojans

14 May 2021
Fujitsu ScanSnap iX1400 review: Slick and simple scanning
peripherals

Fujitsu ScanSnap iX1400 review: Slick and simple scanning

29 Apr 2021

Most Popular

Best Linux distros 2021
operating systems

Best Linux distros 2021

11 Oct 2021
What is cyber warfare?
Security

What is cyber warfare?

15 Oct 2021
HPE wins networking contract with Birmingham 2022 Commonwealth Games
Network & Internet

HPE wins networking contract with Birmingham 2022 Commonwealth Games

15 Oct 2021