What Specially You're Expecting From Apple In This WWDC?

View Results

Loading ... Loading ...
1 Star2 Stars3 Stars4 Stars5 Stars (Rate This)
Loading ... Loading ...

Digital security is a tricky business. Different governments and organizations keep upping the security of their system and installing newer methods to thwart hackers. But the hackers are able to come up with a crack in the security, one way or the other, and then exploit them. Now, a cryptography method which was considered ultra-secure until now has been cracked by a team at Fujitsu.


The cryptography method that has now been cracked by the researchers is called pair-based cryptography. When the approach was first identified and introduced, many had claimed that here, now, is finally a cryptography that can not be cracked and which will lead the way to super-secure computers in the future.

However, all this proved quite untrue and futile as a team of Fujitsu researchers were able to crack it within 142 days. The team comprised of researchers from Kyushu University, Fujitsu and NICT. Together, they were able to crack a 278-bit cryptogram, a new world record of cracking the longest cryptogram.

This 278-bit cryptogram means that it was 923-bit long. In the past, many researchers had claimed that any cryptogram that is longer than 900 bits will take ‘hundreds of thousands of years’ to crack. Apparently, Fujitsu’s success within 142 days with 21 computers and 252 cores clearly defies this presumption.

As a result of this success, Fujitsu warned organizations that digital security, no matter how secure, may eventually be cracked and exploited by the hackers. It stated, “As cryptanalytic techniques and computers become more advanced, cryptanalytic speed accelerates, and conversely, cryptographic security decreases.  Therefore, it is important to evaluate how long the cryptographic technology can be securely used.

We were able to overcome this problem by making good use of various new technologies, that is, a technique optimising parameter setting that uses computer algebra, a two dimensional search algorithm extended from the linear search, and by using our efficient programing techniques to calculate a solution of an equation from a huge number of data, as well as the parallel programming technology that maximises computer power.’

Source: Fujitsu

Courtesy: Daily Tech

Buy Cheapest Related Product From Amazon.com


English Thesaurus – Premium Vocabulary App For iOS [Free]

Nexus 7 Tablet Might Be Unveiled Next Week At Google I/O
You can also press the left/right arrow key on your keyboard to go to previous/next post
  On June 20, 2012(2 years, 1 month ago.)

Recent Products

Compare  
Buy Now | Compare  

What Do You Think?

Loading Disqus Comments ...
Loading Facebook Comments ...

Recent Search

Recent Tutorials

Want to repair your memory card? It's very easy to fix corrupted or damaged memory card. In fact you can fix it by yourself.
Are you the one who is frustrated because of the speed of your Android device? No worries, the article will help you increase the speed of that device.
Lately, Google has updated its Google Docs. Now users can crop, rotate, and add borders to images in a document without leaving Google Docs.
Adobe CS products are not free, but the good news is you can now download Photoshop CS2 & all other CS2 product completely free and it's absolutely legal.
At the beginning level, many people don't know how to use Gmail properly. For them, a here's a helpful guideline.
Skype now allows you to call directly from your Outlook account. Find the step-by-step installation process from this tutorial.
This tutorial helps you quickly resolve four of the most common problems that occur with Windows XP.
After releasing Look Back, many people didn't like it. So Facebook planned to add an Edit tool to the feature and now you can edit your Facebook Look Back video.
Do you want to record Skype calls but don't know how to do that? Then this guide is absolutely for you. Get inside the article for details.
Do you know that many companies can track you on Facebook? Do you want to know who they are? Do you want to block them?
Close You Have To Login
User:
Pass:
Login With »Login With TwitterLogin With Facebook