PRESS-NEWS.org - Press Release Distribution
PRESS RELEASES DISTRIBUTION

Raising cryptography's standards

Calculating encryption schemes' theoretical security guarantees eases comparison, improvement

2014-10-31
(Press-News.org) Most modern cryptographic schemes rely on computational complexity for their security. In principle, they can be cracked, but that would take a prohibitively long time, even with enormous computational resources.

There is, however, another notion of security — information-theoretic security — which means that even an adversary with unbounded computational power could extract no useful information from an encrypted message. Cryptographic schemes that promise information-theoretical security have been devised, but they're far too complicated to be practical.

In a series of papers presented at the Allerton Conference on Communication, Control, and Computing, researchers at MIT and Maynooth University in Ireland have shown that existing, practical cryptographic schemes come with their own information-theoretic guarantees: Some of the data they encode can't be extracted, even by a computationally unbounded adversary.

The researchers show how to calculate the minimum-security guarantees for any given encryption scheme, which could enable information managers to make more informed decisions about how to protect data.

"By investigating these limits and characterizing them, you can gain quite a bit of insight about the performance of these schemes and how you can leverage tools from other fields, like coding theory and so forth, for designing and understanding security systems," says Flavio du Pin Calmon, a graduate student in electrical engineering and computer science and first author on all three Allerton papers. His advisor, Muriel Médard, the Cecil E. Green Professor of Electrical Engineering and Computer Science, is also on all three papers; they're joined by colleagues including Ken Duffy of Maynooth and Mayank Varia of MIT's Lincoln Laboratory.

The researchers' mathematical framework also applies to the problem of data privacy, or how much information can be gleaned from aggregated — and supposedly "anonymized" — data about Internet users' online histories. If, for instance, Netflix releases data about users' movie preferences, is it also inadvertently releasing data about their political preferences? Calmon and his colleagues' technique could help data managers either modify aggregated data or structure its presentation in a way that minimizes the risk of privacy compromises.

Staying close

To get a sense of how the technique works, imagine an encryption scheme that takes only three possible inputs, or plaintexts — "A," "B," and "C" — and produces only three possible outputs, or ciphertexts. For each ciphertext, there is some probability that it encodes each of the three plaintexts.

The ciphertexts can be represented as points inside a triangle whose vertices represent the three possible plaintexts. The higher the probability that a given ciphertext encodes a particular plaintext, the closer it is to the corresponding vertex: Ciphertexts more likely to encode A than B or C are closer to vertex A than to vertices B and C. A secure encryption scheme is one in which the points describing the ciphertexts are clustered together, rather than spread out around the triangle. That means that no ciphertext gives an adversary any more information about the scheme than any other.

Of course, for most encrypted messages, there are way more than three possible corresponding plaintexts. Even a plaintext as simple as a nine-digit number has a billion possible values, so the probabilities corresponding to an encoded Social Security number would describe a point in a billion-dimensional space. But the general principle is the same: Schemes that yield closely clustered points are good, while schemes that don't are not.

An adversary wouldn't actually know the probabilities associated with any given ciphertext. Even someone with access to an encryption scheme's private key would have difficulty calculating them. For their analyses, Calmon, Médard, and their colleagues developed security metrics that hold for a wide range of distributions, and they augmented them with precise calculation of the worst cases — the points farthest from the center of the main cluster. But the mathematical description of the degree to which the probabilities cluster together is a direct indication of how much information an adversary could, in principle, extract from a ciphertext.

Targeted protection

In their first Allerton paper, in 2012, the researchers used this probabilistic framework to demonstrate that, while a ciphertext as a whole may not be information-theoretically secure, some of its bits could be. It should thus be possible to devise encryption schemes that can't guarantee perfect security across the board but could provide it for particular data — say, a Social Security number.

"Talking with cryptographers, they would always ask us, 'Oh, cool! You can guarantee that regardless of what you do, you can hide individual symbols. What about functions of the plaintext?'" Calmon says. "Standard cryptographic definitions of security care about that."

An encryption scheme might, that is, guarantee that an adversary can't extract an encoded Social Security number; but it might still allow the adversary to extract the last four digits of the number. Similarly, it might prevent an adversary from determining a subject's age; but it might allow the adversary to deduce that, say, the subject is between 30 and 40 years of age.

This is the problem that the researchers tackle in their last two Allerton papers. There, Calmon, Médard, and Varia show that if you can determine that a particular function is difficult or easy to extract from a ciphertext, then so are a host of correlated functions. In addition to addressing cryptographers' concerns about functions of the plaintext, this approach has the advantage of not requiring analysis of massively multidimensional probability spaces. Information about the security of a single function — which can often be determined through a fairly simple analysis — can provide strong guarantees about the security of an encryption scheme as a whole.

INFORMATION: Written by Larry Hardesty, MIT News Office

Related links

Encryption is less secure than we thought

The elusive capacity of networks


ELSE PRESS RELEASES FROM THIS DATE:

The digital therapist

2014-10-31
WASHINGTON, D.C., October 31, 2014 -- Imagine this scenario: You've been feeling persistently blue lately, so you pull out your phone. Instead of asking Siri to tell you a joke, though, you open an app that records you simply talking about your day. A few hours later, your therapist sends you a message asking if you'd like to meet. A program like this one that analyzes your speech and uses it to gain information about your mental health could soon be feasible, thanks in part to research from the University of Maryland showing that certain vocal features change as patients' ...

Report examines health care challenges for pregnant women enrolled in covered California

2014-10-31
WASHINGTON, DC (October 31, 2014) — A new report by Milken Institute School of Public Health (Milken Institute SPH) at the George Washington University examines the challenge of maintaining enriched health care for pregnant women who are enrolled in Covered California and who are also eligible for Medi-Cal, which includes the Comprehensive Perinatal Services Program (CPSP). The CPSP, whose roots are in one of the nation's most successful programs ever developed for low-income pregnant women, makes enriched maternity care available to pregnant women facing elevated ...

NYU research: Majority of high school seniors favor more liberal marijuana policies

2014-10-31
The United States is undergoing a drastic change in marijuana policy. Two states legalized recreational use for adults in 2012, and next week, citizens of Oregon, Alaska and the District of Columbia will vote for or against legalization in their area. The majority of the public now favor legalizing or decriminalizing marijuana use, but there is a lack of research examining how marijuana use and demographic characteristics relate to positions toward specific marijuana policies. For example, is it primarily marijuana users who support legalization? There is a need to examine ...

ESA Frontiers November preview

2014-10-31
Connectivity cost calculations for conservation corridors Where are conservation dollars best invested to connect fragmented habitats? Sara Torrubia and colleagues test their model balancing restoration costs with connection quality on the threatened Washington ground squirrel in eastern Washington State. "Getting the most connectivity per conservation dollar," by Sara Torrubia, Brad H McRae, Joshua J Lawler, Sonia A Hall, Meghan Halabisky, Jesse Langdon, and Michael Case. Agricultural companions: co-planting partner crops improves yields Soy and cereals, rice and ...

Sexual fantasies: Are you normal?

2014-10-31
This news release is available in French. Hoping for sex with two women is common but fantasizing about golden showers is not. That's just one of the findings from a research project that scientifically defines sexual deviation for the first time ever. It was undertaken by researchers at Institut universitaire en santé mentale de Montréal and Institut Philippe-Pinel de Montréal, affiliated with University of Montreal. Although many theories about deviant sexual fantasies incorporate the concept of atypical fantasies (paraphilias), the scientific literature ...

Synthetic lethality offers a new approach to kill tumor cells, explains Moffitt researcher

2014-10-31
TAMPA, Fla. (Oct. 30, 2014) – The scientific community has made significant strides in recent years in identifying important genetic contributors to malignancy and developing therapeutic agents that target altered genes and proteins. A recent approach to treat cancer called synthetic lethality takes advantage of genetic alterations in cancer cells that make them more susceptible to certain drugs. Alan F. List, MD, president and CEO of Moffitt Cancer Center, co-authored an article on synthetic lethality featured in the October 30 issue of the New England Journal of ...

Novel tinnitus therapy helps patients cope with phantom noise

Novel tinnitus therapy helps patients cope with phantom noise
2014-10-30
Patients with tinnitus hear phantom noise and are sometimes so bothered by the perceived ringing in their ears, they have difficulty concentrating. A new therapy does not lessen perception of the noise but appears to help patients cope better with it in their daily lives, according to new research. A pilot study at Washington University School of Medicine in St. Louis showed that patients participating in computer-based cognitive training and taking a drug called d-cycloserine reported greater improvements in the ability to go about their daily lives than patients who ...

Himalayan Viagra fuels caterpillar fungus gold rush

Himalayan Viagra fuels caterpillar fungus gold rush
2014-10-30
Overwhelmed by speculators trying to cash-in on a prized medicinal fungus known as Himalayan Viagra, two isolated Tibetan communities have managed to do at the local level what world leaders often fail to do on a global scale — implement a successful system for the sustainable harvest of a precious natural resource, suggests new research from Washington University in St. Louis. "There's this mistaken notion that indigenous people are incapable of solving complicated problems on their own, but these communities show that people can be incredibly resourceful when ...

2014 Antarctic ozone hole holds steady

2014 Antarctic ozone hole holds steady
2014-10-30
The Antarctic ozone hole reached its annual peak size on Sept. 11, according to scientists from NASA and the National Oceanic and Atmospheric Administration (NOAA). The size of this year's hole was 24.1 million square kilometers (9.3 million square miles) — an area roughly the size of North America. The single-day maximum area was similar to that in 2013, which reached 24.0 million square kilometers (9.3 million square miles). The largest single-day ozone hole ever recorded by satellite was 29.9 million square kilometers (11.5 million square miles) on Sept. 9, 2000. ...

Hubble sees 'ghost light' from dead galaxies

Hubble sees ghost light from dead galaxies
2014-10-30
NASA's Hubble Space Telescope has picked up the faint, ghostly glow of stars ejected from ancient galaxies that were gravitationally ripped apart several billion years ago. The mayhem happened 4 billion light-years away, inside an immense collection of nearly 500 galaxies nicknamed "Pandora's Cluster," also known as Abell 2744. The scattered stars are no longer bound to any one galaxy, and drift freely between galaxies in the cluster. By observing the light from the orphaned stars, Hubble astronomers have assembled forensic evidence that suggests as many as six galaxies ...

LAST 30 PRESS RELEASES:

Global cervical cancer vaccine roll-out shows it to be very effective in reducing cervical cancer and other HPV-related disease, but huge variations between countries in coverage

Negativity about vaccines surged on Twitter after COVID-19 jabs become available

Global measles cases almost double in a year

Lower dose of mpox vaccine is safe and generates six-week antibody response equivalent to standard regimen

Personalised “cocktails” of antibiotics, probiotics and prebiotics hold great promise in treating a common form of irritable bowel syndrome, pilot study finds

Experts developing immune-enhancing therapies to target tuberculosis

Making transfusion-transmitted malaria in Europe a thing of the past

Experts developing way to harness Nobel Prize winning CRISPR technology to deal with antimicrobial resistance (AMR)

CRISPR is promising to tackle antimicrobial resistance, but remember bacteria can fight back

Ancient Maya blessed their ballcourts

Curran named Fellow of SAE, ASME

Computer scientists unveil novel attacks on cybersecurity

Florida International University graduate student selected for inaugural IDEA2 public policy fellowship

Gene linked to epilepsy, autism decoded in new study

OHSU study finds big jump in addiction treatment at community health clinics

Location, location, location

Getting dynamic information from static snapshots

Food insecurity is significant among inhabitants of the region affected by the Belo Monte dam in Brazil

The Society of Thoracic Surgeons launches new valve surgery risk calculators

Component of keto diet plus immunotherapy may reduce prostate cancer

New circuit boards can be repeatedly recycled

Blood test finds knee osteoarthritis up to eight years before it appears on x-rays

April research news from the Ecological Society of America

Antimicrobial resistance crisis: “Antibiotics are not magic bullets”

Florida dolphin found with highly pathogenic avian flu: Report

Barcodes expand range of high-resolution sensor

DOE Under Secretary for Science and Innovation visits Jefferson Lab

Research expo highlights student and faculty creativity

Imaging technique shows new details of peptide structures

MD Anderson and RUSH unveil RUSH MD Anderson Cancer Center

[Press-News.org] Raising cryptography's standards
Calculating encryption schemes' theoretical security guarantees eases comparison, improvement