PRESS-NEWS.org - Press Release Distribution
PRESS RELEASES DISTRIBUTION

Raising cryptography's standards

Calculating encryption schemes' theoretical security guarantees eases comparison, improvement

2014-10-31
(Press-News.org) Most modern cryptographic schemes rely on computational complexity for their security. In principle, they can be cracked, but that would take a prohibitively long time, even with enormous computational resources.

There is, however, another notion of security — information-theoretic security — which means that even an adversary with unbounded computational power could extract no useful information from an encrypted message. Cryptographic schemes that promise information-theoretical security have been devised, but they're far too complicated to be practical.

In a series of papers presented at the Allerton Conference on Communication, Control, and Computing, researchers at MIT and Maynooth University in Ireland have shown that existing, practical cryptographic schemes come with their own information-theoretic guarantees: Some of the data they encode can't be extracted, even by a computationally unbounded adversary.

The researchers show how to calculate the minimum-security guarantees for any given encryption scheme, which could enable information managers to make more informed decisions about how to protect data.

"By investigating these limits and characterizing them, you can gain quite a bit of insight about the performance of these schemes and how you can leverage tools from other fields, like coding theory and so forth, for designing and understanding security systems," says Flavio du Pin Calmon, a graduate student in electrical engineering and computer science and first author on all three Allerton papers. His advisor, Muriel Médard, the Cecil E. Green Professor of Electrical Engineering and Computer Science, is also on all three papers; they're joined by colleagues including Ken Duffy of Maynooth and Mayank Varia of MIT's Lincoln Laboratory.

The researchers' mathematical framework also applies to the problem of data privacy, or how much information can be gleaned from aggregated — and supposedly "anonymized" — data about Internet users' online histories. If, for instance, Netflix releases data about users' movie preferences, is it also inadvertently releasing data about their political preferences? Calmon and his colleagues' technique could help data managers either modify aggregated data or structure its presentation in a way that minimizes the risk of privacy compromises.

Staying close

To get a sense of how the technique works, imagine an encryption scheme that takes only three possible inputs, or plaintexts — "A," "B," and "C" — and produces only three possible outputs, or ciphertexts. For each ciphertext, there is some probability that it encodes each of the three plaintexts.

The ciphertexts can be represented as points inside a triangle whose vertices represent the three possible plaintexts. The higher the probability that a given ciphertext encodes a particular plaintext, the closer it is to the corresponding vertex: Ciphertexts more likely to encode A than B or C are closer to vertex A than to vertices B and C. A secure encryption scheme is one in which the points describing the ciphertexts are clustered together, rather than spread out around the triangle. That means that no ciphertext gives an adversary any more information about the scheme than any other.

Of course, for most encrypted messages, there are way more than three possible corresponding plaintexts. Even a plaintext as simple as a nine-digit number has a billion possible values, so the probabilities corresponding to an encoded Social Security number would describe a point in a billion-dimensional space. But the general principle is the same: Schemes that yield closely clustered points are good, while schemes that don't are not.

An adversary wouldn't actually know the probabilities associated with any given ciphertext. Even someone with access to an encryption scheme's private key would have difficulty calculating them. For their analyses, Calmon, Médard, and their colleagues developed security metrics that hold for a wide range of distributions, and they augmented them with precise calculation of the worst cases — the points farthest from the center of the main cluster. But the mathematical description of the degree to which the probabilities cluster together is a direct indication of how much information an adversary could, in principle, extract from a ciphertext.

Targeted protection

In their first Allerton paper, in 2012, the researchers used this probabilistic framework to demonstrate that, while a ciphertext as a whole may not be information-theoretically secure, some of its bits could be. It should thus be possible to devise encryption schemes that can't guarantee perfect security across the board but could provide it for particular data — say, a Social Security number.

"Talking with cryptographers, they would always ask us, 'Oh, cool! You can guarantee that regardless of what you do, you can hide individual symbols. What about functions of the plaintext?'" Calmon says. "Standard cryptographic definitions of security care about that."

An encryption scheme might, that is, guarantee that an adversary can't extract an encoded Social Security number; but it might still allow the adversary to extract the last four digits of the number. Similarly, it might prevent an adversary from determining a subject's age; but it might allow the adversary to deduce that, say, the subject is between 30 and 40 years of age.

This is the problem that the researchers tackle in their last two Allerton papers. There, Calmon, Médard, and Varia show that if you can determine that a particular function is difficult or easy to extract from a ciphertext, then so are a host of correlated functions. In addition to addressing cryptographers' concerns about functions of the plaintext, this approach has the advantage of not requiring analysis of massively multidimensional probability spaces. Information about the security of a single function — which can often be determined through a fairly simple analysis — can provide strong guarantees about the security of an encryption scheme as a whole.

INFORMATION: Written by Larry Hardesty, MIT News Office

Related links

Encryption is less secure than we thought

The elusive capacity of networks


ELSE PRESS RELEASES FROM THIS DATE:

The digital therapist

2014-10-31
WASHINGTON, D.C., October 31, 2014 -- Imagine this scenario: You've been feeling persistently blue lately, so you pull out your phone. Instead of asking Siri to tell you a joke, though, you open an app that records you simply talking about your day. A few hours later, your therapist sends you a message asking if you'd like to meet. A program like this one that analyzes your speech and uses it to gain information about your mental health could soon be feasible, thanks in part to research from the University of Maryland showing that certain vocal features change as patients' ...

Report examines health care challenges for pregnant women enrolled in covered California

2014-10-31
WASHINGTON, DC (October 31, 2014) — A new report by Milken Institute School of Public Health (Milken Institute SPH) at the George Washington University examines the challenge of maintaining enriched health care for pregnant women who are enrolled in Covered California and who are also eligible for Medi-Cal, which includes the Comprehensive Perinatal Services Program (CPSP). The CPSP, whose roots are in one of the nation's most successful programs ever developed for low-income pregnant women, makes enriched maternity care available to pregnant women facing elevated ...

NYU research: Majority of high school seniors favor more liberal marijuana policies

2014-10-31
The United States is undergoing a drastic change in marijuana policy. Two states legalized recreational use for adults in 2012, and next week, citizens of Oregon, Alaska and the District of Columbia will vote for or against legalization in their area. The majority of the public now favor legalizing or decriminalizing marijuana use, but there is a lack of research examining how marijuana use and demographic characteristics relate to positions toward specific marijuana policies. For example, is it primarily marijuana users who support legalization? There is a need to examine ...

ESA Frontiers November preview

2014-10-31
Connectivity cost calculations for conservation corridors Where are conservation dollars best invested to connect fragmented habitats? Sara Torrubia and colleagues test their model balancing restoration costs with connection quality on the threatened Washington ground squirrel in eastern Washington State. "Getting the most connectivity per conservation dollar," by Sara Torrubia, Brad H McRae, Joshua J Lawler, Sonia A Hall, Meghan Halabisky, Jesse Langdon, and Michael Case. Agricultural companions: co-planting partner crops improves yields Soy and cereals, rice and ...

Sexual fantasies: Are you normal?

2014-10-31
This news release is available in French. Hoping for sex with two women is common but fantasizing about golden showers is not. That's just one of the findings from a research project that scientifically defines sexual deviation for the first time ever. It was undertaken by researchers at Institut universitaire en santé mentale de Montréal and Institut Philippe-Pinel de Montréal, affiliated with University of Montreal. Although many theories about deviant sexual fantasies incorporate the concept of atypical fantasies (paraphilias), the scientific literature ...

Synthetic lethality offers a new approach to kill tumor cells, explains Moffitt researcher

2014-10-31
TAMPA, Fla. (Oct. 30, 2014) – The scientific community has made significant strides in recent years in identifying important genetic contributors to malignancy and developing therapeutic agents that target altered genes and proteins. A recent approach to treat cancer called synthetic lethality takes advantage of genetic alterations in cancer cells that make them more susceptible to certain drugs. Alan F. List, MD, president and CEO of Moffitt Cancer Center, co-authored an article on synthetic lethality featured in the October 30 issue of the New England Journal of ...

Novel tinnitus therapy helps patients cope with phantom noise

Novel tinnitus therapy helps patients cope with phantom noise
2014-10-30
Patients with tinnitus hear phantom noise and are sometimes so bothered by the perceived ringing in their ears, they have difficulty concentrating. A new therapy does not lessen perception of the noise but appears to help patients cope better with it in their daily lives, according to new research. A pilot study at Washington University School of Medicine in St. Louis showed that patients participating in computer-based cognitive training and taking a drug called d-cycloserine reported greater improvements in the ability to go about their daily lives than patients who ...

Himalayan Viagra fuels caterpillar fungus gold rush

Himalayan Viagra fuels caterpillar fungus gold rush
2014-10-30
Overwhelmed by speculators trying to cash-in on a prized medicinal fungus known as Himalayan Viagra, two isolated Tibetan communities have managed to do at the local level what world leaders often fail to do on a global scale — implement a successful system for the sustainable harvest of a precious natural resource, suggests new research from Washington University in St. Louis. "There's this mistaken notion that indigenous people are incapable of solving complicated problems on their own, but these communities show that people can be incredibly resourceful when ...

2014 Antarctic ozone hole holds steady

2014 Antarctic ozone hole holds steady
2014-10-30
The Antarctic ozone hole reached its annual peak size on Sept. 11, according to scientists from NASA and the National Oceanic and Atmospheric Administration (NOAA). The size of this year's hole was 24.1 million square kilometers (9.3 million square miles) — an area roughly the size of North America. The single-day maximum area was similar to that in 2013, which reached 24.0 million square kilometers (9.3 million square miles). The largest single-day ozone hole ever recorded by satellite was 29.9 million square kilometers (11.5 million square miles) on Sept. 9, 2000. ...

Hubble sees 'ghost light' from dead galaxies

Hubble sees ghost light from dead galaxies
2014-10-30
NASA's Hubble Space Telescope has picked up the faint, ghostly glow of stars ejected from ancient galaxies that were gravitationally ripped apart several billion years ago. The mayhem happened 4 billion light-years away, inside an immense collection of nearly 500 galaxies nicknamed "Pandora's Cluster," also known as Abell 2744. The scattered stars are no longer bound to any one galaxy, and drift freely between galaxies in the cluster. By observing the light from the orphaned stars, Hubble astronomers have assembled forensic evidence that suggests as many as six galaxies ...

LAST 30 PRESS RELEASES:

First performance standards published to measure the effectiveness of lifestyle medicine treatments

To keep volunteers, connect them

Suppressing boredom at work hurts future productivity, study shows

Older brain cells linger unexpectedly before their death

Clear shift in arterial diseases in diabetes

Celebrating half a century of pioneering excellence: EBMT marks its 50th anniversary

Ancient DNA reveals the appearance of a 6th century Chinese emperor

DNA study IDs descendants of George Washington from unmarked remains, findings to aid service member IDs going back to World War II

Familial Alzheimer’s disease transferred via bone marrow transplant in mice

Perspectives of oncologists on the ethical implications of using AI for cancer care

Industry payments to US physicians by specialty and product type

Andrew E. Place, MD, PhD appointed as Dana-Farber/Boston Children’s Cancer and Blood Disorders Center Vice President, Pediatric Chief Medical Officer

COVID-19 antibody discovery could explain long COVID

Wild plants face viral surprise

Storing electrons from hydrogen for clean chemical reactions

Unlocking how to use mRNA to target Alzheimer’s disease

Kessler Foundation secures $770,000 in grants to advance leading-edge spinal cord research

Going ‘back to the future’ to forecast the fate of a dead Florida coral reef

How extratropical ocean-atmosphere interactions can contribute to the variability of jet streams in the Northern Hemisphere

MSK Research Highlights, March 28, 2024

USDA, Nueta Hidatsa Sahnish College collaborate to support Indigenous Seed Sovereignty

For younger women, mental health now may predict heart health later

Missed opportunity: AEDs near cardiac arrests rarely used by bystanders

Eggs may not be bad for your heart after all

Alcohol raises heart disease risk, particularly among women

TTUHSC announces new center for nursing research

Adding just enough fuel to the fire

Impact of synbiotic supplements on the gut microbiome and overall health of penguins

Promising advances in organosilica membranes for separating organic liquid mixtures

Cell phone video technology unveils new method for analyzing walking and gait

[Press-News.org] Raising cryptography's standards
Calculating encryption schemes' theoretical security guarantees eases comparison, improvement