ad info




CNN.com
 MAIN PAGE
 WORLD
 U.S.
 LOCAL
 POLITICS
 WEATHER
 BUSINESS
 SPORTS
* TECHNOLOGY
   computing
   personal technology
 SPACE
 HEALTH
 ENTERTAINMENT
 BOOKS
 TRAVEL
 FOOD
 ARTS & STYLE
 NATURE
 IN-DEPTH
 ANALYSIS
 myCNN

 Headline News brief
 news quiz
 daily almanac

  MULTIMEDIA:
 video
 video archive
 audio
 multimedia showcase
 more services

  E-MAIL:
Subscribe to one of our news e-mail lists.
Enter your address:
Or:
Get a free e-mail account

 DISCUSSION:
 message boards
 chat
 feedback

  CNN WEB SITES:
CNN Websites
 AsiaNow
 En Español
 Em Português
 Svenska
 Norge
 Danmark
 Italian

 FASTER ACCESS:
 europe
 japan

 TIME INC. SITES:
 CNN NETWORKS:
Networks image
 more networks
 transcripts

 SITE INFO:
 help
 contents
 search
 ad info
 jobs

 WEB SERVICES:

COMPUTING

From...
IDG.net

NEC claims world's strongest encryption system

January 24, 2000
Web posted at: 1:24 p.m. EST (1824 GMT)

by Martyn Williams

(IDG) -- NEC announced it has developed a new encryption technology, CipherUnicorn-A, which it claims to be the strongest in the world.

The technology is based upon common key encryption - in which a single key is used for both the encoding and the decoding functions - but has a twist, explained Hiroshi Miyauchi, research manager at NEC's C&C Media Laboratories. As in other common key systems, a randomly generated master key, 128 bits in size, is first created. However, unlike in other systems, this is not used to encrypt or decrypt the file.

MORE COMPUTING INTELLIGENCE
IDG.net   IDG.net home page
  Make your PC work harder with these tips
  Zero-Knowledge to launch anonymous Net access software
  A compelling history of code cracking
  Judge Halts DVD Encryption Hackers
  Reviews & in-depth info at IDG.net
  E-BusinessWorld
  IDG.net's Windows software page
  Questions about computers? Let IDG.net's editors help you
  Subscribe to IDG.net's free daily newsletters
  Search IDG.net in 12 languages
  News Radio
  * Fusion audio primers
  * Computerworld Minute

NEC's system creates a intermediate key of several thousand bits in length from the master key, and that serves as the base for the encryption process. When a file is being encrypted, the program first breaks it down into a number of data blocks. Each data block is encrypted with a different key -- chosen from inside the intermediate key and based upon the characteristics of the data being encrypted. To add an extra layer of security, the key lengths used for encryption vary among 128, 192 and 256 bits in length, Miyauchi said.

In practice, this means that multiple keys of unknown length need to be cracked for an entire file to be decrypted. Miyauchi said the new system is much more secure than current DES-based systems, claiming it to be 2 to the power of 36 (roughly 37,000 quadrillion trillion) times more secure than currently systems.

On the decryption side, all the user needs is the master key. The software is capable of regenerating the intermediate key and working out how to decrypt the file.

Typically, the master key would be passed by hand to the other party or sent across the network, itself encrypted using a public key encryption system.

The encryption technology's first commercial use will come in NEC systems. The company plans to incorporate the system into its SecureWare security systems in mid-2000, but the researcher said the company has higher goals.

"We plan to apply this system to the International Standards Organization (ISO)", Miyauchi said. The ISO is expected to begin considering the establishment of an international standard for encryption later this year.


RELATED STORIES:
The ABCs of PKI
January 18, 2000
Study: Encryption keys not safe on servers
January 10, 2000
Conflict surrounds IP Security standard
January 4, 2000
How to keep the snoops away from your files
December 8, 1999

RELATED IDG.net STORIES:
Zero-Knowledge to launch anonymous Net access software
(InfoWorld)
A compelling history of code cracking
(The Industry Standard)
Judge Halts DVD Encryption Hackers
(The Industry Standard)
How Secure Is Windows 2000?
(PC World Online)
Encryption is free speech
(LinuxWorld)
Crypto export rules falls short of total decontrol
(NetworkWorld Fusion)
Answers to common crypto questions
(NetworkWorld Fusion)
E-BusinessWorld
(IDG.net)
Note: Pages will open in a new browser window
External sites are not endorsed by CNN Interactive.

RELATED SITES:
NEC
Note: Pages will open in a new browser window
External sites are not endorsed by CNN Interactive.
 LATEST HEADLINES:
SEARCH CNN.com
Enter keyword(s)   go    help

Back to the top   © 2001 Cable News Network. All Rights Reserved.
Terms under which this service is provided to you.
Read our privacy guidelines.