{"id":6110,"date":"2019-06-24T20:59:21","date_gmt":"2019-06-24T20:59:21","guid":{"rendered":"https:\/\/gtechbooster.com\/?p=6110"},"modified":"2023-04-01T01:36:51","modified_gmt":"2023-04-01T01:36:51","slug":"researchers-reveal-cryptocode-generator-in-chrome","status":"publish","type":"post","link":"https:\/\/gtechbooster.com\/researchers-reveal-cryptocode-generator-in-chrome\/","title":{"rendered":"Researchers reveal Cryptocode Generator in Chrome"},"content":{"rendered":"\n<p>A system that automatically generates optimized cryptography code has been revealed as in use in Google Chrome. The details were revealed at the recent IEEE  Symposium on Security and Privacy by MIT researchers. <\/p>\n\n\n\n<div class=\"gtech-migrated-from-ad-inserter-placement-2\" style=\"text-align: center;\" id=\"gtech-2894530178\"><div style=\"margin-left: auto;margin-right: auto;text-align: center;\" id=\"gtech-1167687390\"><a data-bid=\"1\" data-no-instant=\"1\" href=\"https:\/\/gtechbooster.com\/linkout\/78935\" rel=\"noopener\" class=\"notrack\" aria-label=\"auyvc003\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gtechbooster.com\/media\/2026\/03\/auyvc003.webp\" alt=\"\"  srcset=\"https:\/\/gtechbooster.com\/media\/2026\/03\/auyvc003.webp 1200w, https:\/\/gtechbooster.com\/media\/2026\/03\/auyvc003-768x768.webp 768w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" width=\"500\" height=\"500\"  style=\"display: inline-block;\" \/><\/a><\/div><\/div><p>The crytography is being used to keep the communication between the  browser and the website being viewed secure. Until recently, the  mathematical algorithms used to carry out the cryptography was being  written and rewritten by hand. <\/p>\n\n\n\n<p>Researchers from the Computer Science and Artificial \nIntelligence Laboratory (CSAIL) designed \u201cFiat Cryptography,\u201d a system \nthat automatically generates and simultaneously verifies optimized \ncryptographic algorithms for all hardware platforms. The code created \nmatches the performance of the best handwritten code, but is much \nfaster.&nbsp;<\/p>\n\n\n\n<p>Their researchers looked at existing implementations of handwritten  ECC algorithms in C and assembly languages, and transferred those  techniques into their code library. This generated a list of  best-performing algorithms for each architecture. <\/p>\n\n\n\n<p>The project then used a  compiler that has been mathematically verified with a proofing tool  called Coq. Once verified, the library hen simulates each algorithm and  selects the best-performing one for each chip architecture.\u00a0 The cryptographic algorithms being optimized are elliptical curve  cryptography (ECC). <\/p>\n\n\n\n<p>These generate keys of various sizes by choosing  numerical points at random along a numbered curved line on a graph.  Because the processing chips can\u2019t store such large numbers in one  place, they are briefly split into smaller digits that are stored on  registers. The way the split is made has different performance  consequences, and is so complex that the developers writing ECC  algorithms manually implement the bit-splitting decisions in their code.  In their work, the MIT researchers made use of those human decisions to  automatically generate a library of optimized ECC algorithms for any  hardware.<\/p>\n\n\n\n<p>The researchers equipped their Coq-based compiler with partial  evaluation optimization to precompute all the bit-splitting methods.  When matching them to a given chip architecture, it can then immediately  discard all algorithms that won\u2019t work for that architecture, so  reducing the time it takes to search the library. <\/p>\n\n\n\n<p>From that, the researchers put together a library of the best ways to split ECC algorithms for different chip architectures.<\/p>\n\n\n\n<p>The\u00a0 automatically generated code is being used in Google\u2019s  BoringSSL, an open-source cryptographic library that&#8217;s a fork of  OpenSSL. Google Chrome, Android apps, and other programs use BoringSSL  to generate the keys and certificates used to encrypt and decrypt data. <\/p>\n\n\n\n<p>According to the researchers, about 90 percent of secure Chrome  communications currently run their code. The next goal is to find ways to make the compiler run even faster in searching for optimized algorithms. <\/p>\n\n\n\n<h3 class=\"wp-block-heading\">More Information<\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"http:\/\/adam.chlipala.net\/papers\/FiatCryptoSP19\/FiatCryptoSP19.pdf\">Paper On Fiat Cryptography<\/a><\/li><li><a href=\"https:\/\/boringssl.googlesource.com\/boringssl\/\">BoringSSL On GitHub<\/a><\/li><\/ul>\n\n\n\n<p>Credit: <a href=\"https:\/\/www.i-programmer.info\/news\/149-security\/12872-chrome-cryptocode-generator-revealed.html\">i-Programmer<\/a><\/p>\n<div class=\"gtech-end-cont\" id=\"gtech-3710339955\"><div style=\"margin-right: auto;margin-left: auto;text-align: center;\" id=\"gtech-3862817151\"><a data-bid=\"1\" data-no-instant=\"1\" href=\"https:\/\/gtechbooster.com\/linkout\/75343\" rel=\"noopener\" class=\"notrack\" aria-label=\"jesdphis\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gtechbooster.com\/media\/2025\/08\/jesdphis.avif\" alt=\"\"  srcset=\"https:\/\/gtechbooster.com\/media\/2025\/08\/jesdphis.avif 1179w, https:\/\/gtechbooster.com\/media\/2025\/08\/jesdphis-768x950.avif 768w\" sizes=\"(max-width: 1179px) 100vw, 1179px\" width=\"300\" height=\"300\"  style=\"display: inline-block;\" \/><\/a><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>A system that automatically generates optimized cryptography code has been revealed as in use in Google Chrome. The details were revealed at the recent IEEE Symposium on Security and Privacy by MIT researchers. The crytography is being used to keep the communication between the browser and the website being viewed secure. Until recently, the mathematical [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":6114,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1915],"tags":[171,216,372],"class_list":["post-6110","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ndocs","tag-google-chrome","tag-cryptography","tag-google"],"blocksy_meta":{"styles_descriptor":{"styles":{"desktop":"","tablet":"","mobile":""},"google_fonts":[],"version":6}},"_links":{"self":[{"href":"https:\/\/gtechbooster.com\/api-json\/wp\/v2\/posts\/6110","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gtechbooster.com\/api-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gtechbooster.com\/api-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gtechbooster.com\/api-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/gtechbooster.com\/api-json\/wp\/v2\/comments?post=6110"}],"version-history":[{"count":0,"href":"https:\/\/gtechbooster.com\/api-json\/wp\/v2\/posts\/6110\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gtechbooster.com\/api-json\/wp\/v2\/media\/6114"}],"wp:attachment":[{"href":"https:\/\/gtechbooster.com\/api-json\/wp\/v2\/media?parent=6110"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gtechbooster.com\/api-json\/wp\/v2\/categories?post=6110"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gtechbooster.com\/api-json\/wp\/v2\/tags?post=6110"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}