We implement projects
co-financed
from public funds
Project entitled “Cybercrypt@gov” is a distributed, scalable, high-performance system that allows breaking cryptographic security is financed by the National Center for Research and Development, provided for the financing of scientific research and development work for state security and defense (targeted subsidy) and implemented as part of Competition No. 9/2018 (contract No. DOB-BIO9 / 32/03/2018).
Cybersecurity is one of the basic areas of the European Union’s activities for 2016-2020, developed and supported by the National Center for Research and Development, the Ministry of the Interior, the Ministry of Digitization, the Public Prosecutor’s Office and the General Police Headquarters of the Republic of Poland.
The solution is part of the priority technological area called “Forensic technology, modern technologies or innovative solutions in the field of ICT security, information protection in ICT systems and networks, and national cryptography”. It was defined for the 7th strategic direction of scientific research and development works “State security and defense”, established in the National Research Program (KPB).
The subject of the project is the acquisition and development of the technology necessary to create a distributed, scalable, high-performance system for breaking cryptographic security.
The main goal of the project is to increase the detection capabilities of law enforcement agencies, equipping them with technical capabilities adequate to the threat, which will facilitate prosecution of cybercrime, organized crime and cyberterrorism.
The implementation of the project results is aimed at acquiring the priority operational capacity of security services, supporting the detection process and combating crime (including organized crime and counteracting terrorism) referred to in the National Program Research.
It is expected that the designed system will allow breaking passwords based, among others, on o MD4, MD5, SHA1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-3 (Keccak), NetNTLMv1, NetNTLMv1 + ESS, NetNTLMv2, sha256crypt, sha512crypt, as well as an attempt to break the security of m. in, MS Office 2007, 2010, 2013, PDF, KeePass, 7-zip, Rar and commonly used encryption applications (Truecrypt, Veracrypt, Bitlocker).
The specific objectives of the project are:
— development of efficient distributed processing algorithms,
— development of efficient data processing methods using the processor and graphics cards,
— development of a server application prototype,
— development of a prototype of a client application,
— development of a prototype of an application for obtaining data from files,
— designing the overall structure of the IT system.
The project is implemented by a consortium consisting of:
— AGH University of Science and Technology in Krakow – consortium leader,
— Redge Technologies (formerly known as Atende Software),
— Longevity,
— Warsaw University of Technology – Faculty of Electronics and Information Technology
— Academy of War Arts in Warsaw.
Project start date: 2018-12-10
Planned project implementation period [mc]: 48
Framework project schedule | ||
1 – 13 month | Stage 1 | Development of the assumptions of the research program and the concept of building a Laboratory and Training Environment in the field of cryptography and breaking security |
14 – 28 month | Stage 2 | Design and implementation of a prototype with software for breaking security and infrastructure |
29 — 38 month | Stage 3 | Implementation of the target system, along with verification of the correct operation of individual components |
39 — 48 month | Stage 4 | Pilot launch of an IT system and development of a methodology and procedure for breaching security measures with the use of a central IT system |