Smartphones set out to decipher a cryptographic system

Aug 25, 2014 by Sébastien Corthésy
Smartphones set out to decipher a cryptographic system
Ramasany Gowthami. Credit: Alain Herzog / EPFL 2014

While carrying out her master thesis on computer science, Ramasany Gowthami participated in the creation of an Android app by means of which users get together to crack a modern cryptographic code.

Modern cryptography is not infallible. All encryption types, among which we can find the widely used RSA, can theoretically be broken. If so, how to ensure that our data remains protected? The answer lies on the time and computational effort required to break the code. Cracking a sufficiently long can be expensive up to the point of being unattainable in practice.

The LACAL laboratory at EPFL, renowned for its many achievements in the field of cryptography and led by Arjen Lenstra, was interested in solving a problem based on elliptic curve developed in the early 1980s. After having thwarted the security of our passwords by using a network of 300 PlayStation 3 game consoles, the researchers decided to take on this new challenge, on this occasion by using thousands of smartphones working together. "All of us do not necessarily have a computer for running the algorithm, making it difficult to gather a few dozen. On the other hand, everyone has a smartphone, and launching the application becomes a child's game!" said Ramasany Gowthami, a master student in that participated on the project. By running the algorithm a very large number of times the code may be broken eventually. To do this, users simply launch the application and press a button. The app also allows users to register, form teams, view their statistics and thus measure their participation in this unprecedented undertaking.

Despite her apprehension about the mathematical part of the project, Ramasany Gowthami does not regret having plunged into this domain for her master's thesis. She acknowledges that the part of the implementation of which she was in charge required long working weeks to get to understand the whole project. "Since I was in charge of the interface between the program's components, I had to have a perfect knowledge of the elements of the algorithm," she explains. "What is my best memory? When I managed to put it all in my head and was able to grasp the entire project! ".

Why this desire to crack an unbroken cryptographic system at all costs? "It's just as important as designing new and more efficient systems," she explained. "We know that the systems can be broken at some point. That's why it is important to constantly assess them in order to know their limitations and adapt them if they are no longer safe. This can be done, for example, by extending the length of the encryption key. Perhaps a similar evaluation work on the SSL would have prevented the (in) famous Heartbleed bug!"

Explore further: New type of cryptography that can better resist "dictionary attacks"

add to favorites email to friend print save as pdf

Related Stories

New algorithm shakes up cryptography

May 16, 2014

Researchers at the Laboratoire Lorrain de Recherches en Informatique et ses Applications (CNRS/Université de Lorraine/Inria) and the Laboratoire d'Informatique de Paris 6 (CNRS/UPMC) have solved one aspect of the discrete ...

Recommended for you

Who drives Alibaba's Taobao traffic—buyers or sellers?

Sep 18, 2014

As Chinese e-commerce firm Alibaba prepares for what could be the biggest IPO in history, University of Michigan professor Puneet Manchanda dug into its Taobao website data to help solve a lingering chicken-and-egg question.

Computerized emotion detector

Sep 16, 2014

Face recognition software measures various parameters in a mug shot, such as the distance between the person's eyes, the height from lip to top of their nose and various other metrics and then compares it with photos of people ...

Cutting the cloud computing carbon cost

Sep 12, 2014

Cloud computing involves displacing data storage and processing from the user's computer on to remote servers. It can provide users with more storage space and computing power that they can then access from anywhere in the ...

Teaching computers the nuances of human conversation

Sep 12, 2014

Computer scientists have successfully developed programs to recognize spoken language, as in automated phone systems that respond to voice prompts and voice-activated assistants like Apple's Siri.

User comments : 0