Project entitled “Cybercrypt@gov” is a distributed, scalable, high-performance system that allows breaking cryptographic security is financed by the National Center for Research and Development, provided for the financing of scientific research and development work for state security and defense (targeted subsidy) and implemented as part of Competition No. 9/2018 (contract No. DOB-BIO9 / 32/03/2018).
Cybersecurity is one of the basic areas of the European Union’s activities for 2016-2020, developed and supported by the National Center for Research and Development, the Ministry of the Interior, the Ministry of Digitization, the Public Prosecutor’s Office and the General Police Headquarters of the Republic of Poland.
The solution is part of the priority technological area called “Forensic technology, modern technologies or innovative solutions in the field of ICT security, information protection in ICT systems and networks, and national cryptography”. It was defined for the 7th strategic direction of scientific research and development works “State security and defense”, established in the National Research Program (KPB).
The subject of the project is the acquisition and development of the technology necessary to create a distributed, scalable, high-performance system for breaking cryptographic security.
The main goal of the project is to increase the detection capabilities of law enforcement agencies, equipping them with technical capabilities adequate to the threat, which will facilitate prosecution of cybercrime, organized crime and cyberterrorism.
The implementation of the project results is aimed at acquiring the priority operational capacity of security services, supporting the detection process and combating crime (including organized crime and counteracting terrorism) referred to in the National Program Research.
It is expected that the designed system will allow breaking passwords based, among others, on o MD4, MD5, SHA1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-3 (Keccak), NetNTLMv1, NetNTLMv1 + ESS, NetNTLMv2, sha256crypt, sha512crypt, as well as an attempt to break the security of m. in, MS Office 2007, 2010, 2013, PDF, KeePass, 7-zip, Rar and commonly used encryption applications (Truecrypt, Veracrypt, Bitlocker).
The specific objectives of the project are:
The project is implemented by a consortium consisting of:
Project start date: 2018-12-10
Planned project implementation period [mc]: 48
Framework project schedule
Development of the assumptions of the research program and the concept of building a Laboratory and Training Environment in the field of cryptography and breaking security
Design and implementation of a prototype with software for breaking security and infrastructure
Implementation of the target system, along with verification of the correct operation of individual components
Pilot launch of an IT system and development of a methodology and procedure for breaching security measures with the use of a central IT system