Feeds

New crypto technique beats current standard

The NSA has got to hate this one

  • alert
  • submit to reddit

Internet Security Threat Report 2014

A new cryptographic technique developed by NEC is set to be unveiled during the Encryption and Information Security Symposium in Japan this week. Called Cipherunicorn-A, the technique creates a number of false keys in addition to the true encryption key, making it more difficult for potential intruders to crack. The approach should increase security while remaining compliant with the Data Encryption Standard (DES) introduced by the US Department of Commerce, a company spokesperson told The Register. The technique is based on a dynamic encryption code capable of using key lengths of 128 bits, 192 bits and 256 bits, making it more difficult to discover both the encryption key and the target data. A potential intruder might spend a couple of frustrating days cracking the wrong key, and then have to begin again. The current DES standard uses an encryption key which could be cracked within a day, the company notes. Cipherunicorn-A conforms to the DES standard, but increases it's effectiveness by adding layers of complexity to frustrate potential crackers. The technology is aimed at corporate users and numerous devices, and the company expects to satisfy the new US crypto export regulations without difficulty. Future applications will include modem, fax, and mobile phone encryption. NEC has no immediate plans to use the technique for retail crypto applications such as PGP, the company said. ®

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
Bono apologises for iTunes album dump
Megalomania, generosity and FEAR of irrelevance drove group to Apple deal
Facebook, Apple: LADIES! Why not FREEZE your EGGS? It's on the company!
No biological clockwatching when you work in Silicon Valley
Doctor Who's Flatline: Cool monsters, yes, but utterly limp subplots
We know what the Doctor does, stop going on about it already
Arab States make play for greater government control of the internet
Nerds told to get lost in last-minute power grab bid at UN meeting
Apple SILENCES Bose, YANKS headphones from stores
The, er, Beats go on after noise-cancelling spat
Zippy one-liners, broken promises: Doctor Who on the Orient Express
Series finally hits stride, but Clara's U-turn is baffling
Don't bother telling people if you lose their data, say Euro bods
You read that right – with the proviso that it's encrypted
10 Top Tips For PRs Considering Whether To Phone The Register
You'll Read These And LOL Even Though They're Serious
Stop ROBOT exploitation, cry striking Foxconn workers
HP downturn and automation eroding overtime on China's production lines
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Win a year’s supply of chocolate
There is no techie angle to this competition so we're not going to pretend there is, but everyone loves chocolate so who cares.
Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.