Discussion Paper Series 2006-E-8

Year 2010 Issues on Cryptographic Algorithms

Masashi Une, Masayuki Kanda

In the financial sector, cryptographic algorithms are used as fundamental techniques for assuring confidentiality and integrity of data used in financial transactions and for authenticating entities involved in the transactions. Currently, the most widely used algorithms appear to be two-key triple DES and RC4 for symmetric ciphers, RSA with a 1024-bit key for an asymmetric cipher and a digital signature, and SHA-1 for a hash function according to international standards and guidelines related to the financial transactions.
However, according to academic papers and reports regarding the security evaluation for such algorithms, it is difficult to ensure enough security by using the algorithms for a long time period such as ten or fifteen years due to advances in cryptanalysis techniques, improvement of computing power and so on. In order to enhance the transition to more secure ones, NIST (National Institute of Standards and Technology) of the United States describes in various guidelines that NIST will no longer approve two-key triple DES, RSA with a 1024-bit key, and SHA-1 as the algorithms suitable for IT systems of the Federal Government after 2010.
It is an important issue how to advance the transition of the algorithms in the financial sector. This paper refers to issues regarding the transition as Year 2010 issues in cryptographic algorithms. In order to successfully complete the transition by 2010, the deadline set by NIST, it is necessary for the financial institutions to begin discussing the issues at the earliest possible date.
This paper summarizes security evaluation results of the current algorithms, and describes Year 2010 issues, their impact to the financial industry, and the transition plan announced by NIST. This paper also shows several points to be discussed when dealing with Year 2010 issues.

Keywords: cryptographic algorithm, symmetric cipher, asymmetric cipher, security, Year 2010 issues, hash function


Views expressed in the paper are those of the authors and do not necessarily reflect those of the Bank of Japan or Institute for Monetary and Economic Studies.

Copyright © 2006 Bank of Japan All Rights Reserved.

Home Japanese Home