Bitcoin Forum
July 27, 2017, 07:09:41 PM *
News: BIP91 seems stable: there's probably only slightly increased risk of confirmations disappearing. You should still prepare for Aug 1.
   Home   Help Search Donate Login Register  
Pages: « 1 [2]  All
Author Topic: Fujitsu Cracks Next-Gen Cryptography Standard  (Read 2795 times)
Offline Offline

Activity: 952

View Profile WWW
September 30, 2012, 01:33:42 AM

Isn't the point that as long as we use sufficiently large key sizes, it doesn't matter?

No, because ECDSA and RSA are based on problems that are considered hard in today's mathematics. That does not preclude them from being easy in future mathematics. The underlying assumptions of discrete logarithms and integer factorizations are that they will remain hard, but there is no guarantee.

And then of course the whole quantum computing thing.
My point was that a successfully retrieving a private key from a public key isn't a problem if it's done by brute force (and not some novel new way that reduces the hardness of that operation), and the key sizes involved are significantly smaller than what we use.
Decentralized search
Search for products or services and get paid for it
pre-sale Token CAT
25 July 50% discount
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction. Advertise here.
Sr. Member
Offline Offline

Activity: 449

You Don't Bitcoin 'till You Mint Coin

View Profile WWW
October 01, 2012, 06:10:37 PM

Thanks to the OP.

That was interesting.

Here's my Quick summary:
    They broke what is called Pairing Based Cryptography
The press release from NICT can be found here:

Remember, we are using ECDSA and every public key is buried under the sha-256 hash and RIPEMD-160 hash.
As long as you never store value on a key that has already been used where ECDSA public is now known by all, you would be relatively safe.

If methods were found that made ECDSA significantly weaker, it would still be extremely difficult and very expensive if not impossible to steal from anyone that never reuses a key.

Pages: « 1 [2]  All
Jump to:  

Sponsored by , a Bitcoin-accepting VPN.
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!