{"id":21726,"date":"2014-05-16T18:51:54","date_gmt":"2014-05-16T22:51:54","guid":{"rendered":"http:\/\/www.opensource.im\/?p=21726"},"modified":"2014-05-16T18:51:54","modified_gmt":"2014-05-16T22:51:54","slug":"new-algorithm-shakes-up-cryptography","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/cryptography\/new-algorithm-shakes-up-cryptography.php","title":{"rendered":"New algorithm shakes up cryptography"},"content":{"rendered":"<p><p>9 hours ago            <\/p>\n<p>    Researchers at the Laboratoire Lorrain de Recherches en    Informatique et ses Applications (CNRS\/Universit de    Lorraine\/Inria) and the Laboratoire d'Informatique de Paris 6    (CNRS\/UPMC) have solved one aspect of the discrete logarithm    problem. This is considered to be one of the 'holy grails' of    algorithmic number theory, on which the security of many    cryptographic systems used today is based. They have devised a    new algorithm that calls into question the security of one    variant of this problem, which has been closely studied since    1976.  <\/p>\n<p>    This result, published on the site of the International    Association of Cryptologic Research and on the HAL open access    archive, was presented at the international conference    Eurocrypt 2014 held in Copenhagen on 11-15 May 2014 and    published in Advances in cryptology. It discredits several    cryptographic systems that until now were    assumed to provide sufficient security safeguards. Although this work is still    theoretical, it is likely to have repercussions especially on    the cryptographic applications of smart cards, RFID chips, etc.  <\/p>\n<p>    To protect confidentiality of information, cryptography seeks    to use mathematical problems that are difficult to solve, even    for the most powerful machines and the most sophisticated    algorithms.  <\/p>\n<p>    The security of a variant of the discrete logarithm, reputed to    be very complex, has been called into question by four    researchers from CNRS and the Laboratoire d'Informatique de    Paris 6 (CNRS\/UPMC), namely Pierrick Gaudry, Rzvan Brbulescu,    Emmanuel Thom and Antoine Joux. The algorithm they devised    stands out from the best algorithms known to date for this    problem. Not only is it significantly easier to explain, but    its complexity is also considerably improved. This means that    it is able to solve increasingly large discrete logarithm    problems, while its computing time increases at a far slower    rate than with previous algorithms. The computation of discrete    logarithms associated with problems that are deliberately made    difficult for cryptographic applications is thus made    considerably easier.  <\/p>\n<p>    Since solving this variant of the discrete logarithm is now    within the capacity of current computers, relying on its    difficulty for cryptographic applications is therefore no    longer an option. This work is still at a theoretical stage and    the algorithm still needs to be refined before it is possible    to provide a practical demonstration of the weakness of this    variant of the discrete logarithm. Nonetheless, these results    reveal a flaw in cryptographic security and open the way to    additional research. For instance, the algorithm could be    adapted in order to test the robustness of other cryptographic    applications.<\/p>\n<p>     Explore further:     NIST removes cryptography algorithm from random number    generator recommendations  <\/p>\n<p>    More information: \"A Heuristic Quasi-Polynomial    Algorithm for Discrete Logarithm in Finite Fields of Small    Characteristic,\" Razvan Barbulescu, Pierrick Gaudry, Antoine    Joux, Emmanuel Thom, Advances in Cryptology  EUROCRYPT 2014,    Lecture Notes in Computer Science, Volume 8441, 2014, pp    1-16. dx.doi.org\/10.1007\/978-3-642-55220-5_1<\/p>\n<p>      Following a public comment period and review, the National      Institute of Standards and Technology (NIST) has removed a      cryptographic algorithm from its draft guidance on random      number generators. Before implementing the change, ...    <\/p>\n<p>      (Phys.org)Protecting sensitive electronic information in      different situations requires different types of      cryptographic algorithms, but ultimately they all depend on      keys, the cryptographic equivalent ...    <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Go here to read the rest:<br \/>\n<a target=\"_blank\" href=\"http:\/\/phys.org\/news319449432.html\/RK=0\/RS=4X6jmKl6sAsDsP0NqNx5UhSWYUc-\" title=\"New algorithm shakes up cryptography\">New algorithm shakes up cryptography<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> 9 hours ago Researchers at the Laboratoire Lorrain de Recherches en Informatique et ses Applications (CNRS\/Universit de Lorraine\/Inria) and the Laboratoire d'Informatique de Paris 6 (CNRS\/UPMC) have solved one aspect of the discrete logarithm problem. This is considered to be one of the 'holy grails' of algorithmic number theory, on which the security of many cryptographic systems used today is based. They have devised a new algorithm that calls into question the security of one variant of this problem, which has been closely studied since 1976. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1600],"tags":[],"class_list":["post-21726","post","type-post","status-publish","format-standard","hentry","category-cryptography"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/21726"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=21726"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/21726\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=21726"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=21726"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=21726"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}