The new pairing-based cryptography system, which has been named the next-generation cryptography standard, has been analyzed by Fujitsu Laboratories Limited, National Institute of Information and Communications Technology (NICT) and Kyushu University.
The organizations have managed to perform a successful cryptanalysis of a 278-digit (978-bit) pairing-based cryptography, demonstrating for the first time ever that it could be broken.
Until now, researchers estimated that such a system could be cracked in a few hundred thousand years, but Fujitsu showed that it could be done in 148.2 days.
The experts have showed that cryptanalytic security decreases as the techniques become more advanced.
The study highlights the fact that cryptographic technology must evolve, otherwise it doesn’t matter how secure it is, the technique advancements and the acceleration of cryptanalytic speeds will make it insecure.
“The cryptanalysis is the equivalent to spoofing the authority of the information system administrator. As a result, for the first time in the world we proved that the cryptography of the parameter was vulnerable and could be broken in a realistic amount of time,” the company revealed
Compared to the old 204-digit cryptography, the new 278-digit cryptography is a few hundred times more difficult to crack but, despite this significant difference, the researchers were able to succeed.
Among the various new technologies they have utilized they mention “a technique optimizing parameter setting that uses computer algebra,” and “a two dimensional search algorithm extended from the linear search.”
They also leveraged efficient programing techniques to calculate the solution of an equation from a huge number of data, along with parallel programming technology that can maximize computational power.
“This result is not just a new world record of cryptanalysis, it also means the acquisition of valuable data that forms a technical foundation on which to estimate selection of secure encryption technology or the appropriate timing to exchange a key length. We will continue to move forward on research that pushes the boundary of the secure use of cryptography,” the researchers concluded.