The Institute of Electrical and Electronics Engineers (IEEE) has co-published an assessment of how four blockchain platforms measure up against the rigorous security requirements of the U.S. Federal Government and according to the report, only one of the platforms has passed the test.
The Federal Government Has Stringent Rules Around Adoption Of New Technology
While the IEEE isnt a decision maker for what the federal government adopts, it can have a view on what it is likely to do by assessing blockchain providers against the governments own vetting rules that are used to guide federal adoption of technology.
The Federal Information Security Management Act of 2002 (FISMA) requires that all new federal IT programs and modernization efforts using blockchain meet National Institute of Standards and Technology (NIST) cryptographic standards. If the technology doesn't meet them, then the federal government cannot use the technology.
UNITED STATES - FEBRUARY 08: From left, Sens. Ben Cardin, D-Md., Barbara Mikulski, D-Md., and ... [+] Commerce Secretary Penny Pritzker attend a ribbon-cutting event for the newly expanded National Cybersecurity Center of Excellence (NCCoE) at the National Institutes of Standards and Technology (NIST) in Rockville, Md., February 08, 2016. (Photo By Tom Williams/CQ Roll Call)
However, the ramifications to blockchain adoption are far broader than just being confined to the government, as businesses tend to follow the governments adoption of certain technologies.
The reason why is because of the outsized role that the government plays in technology procurement. NIST is responsible for providing the Federal Information Processing Standards (FIPS) which are a series of documents which provide technology standards in the government. Because the government is such a large buyer of technology, these standards have become the general de-facto standard for computing more generally.
So if the government doesnt allow it, companies in other industries are also probably following the same rules and may also decide not to adopt the technology.
The study, co-published by the IEEE Computer And Reliability Societies, and authored by James P. Howard II from Johns Hopkins Applied Physics Laboratory and Maria E. Vachino from Easy Dynamics Corp. scanned the market for blockchain solutions then whittled them down to four platforms based on three criteria; (i) the device is supported by a single, business or consortium responsible for developing standards and guiding future work (ii) the system allows independent, private chains without limiting the application to a single global network (iii) the technique is well supported by developer libraries that allow software developers easy access to data and protocols of the blockchain system.
According to the report, the four platforms which fit the bill were Ethereum (implemented in a private configuration), Hyperledger Fabric, Corda, And Multichain. These were then evaluated against the NIST framework.
Of the four platforms, only R3 Corda was identified as meeting NIST standards and therefore being able to be implemented in federal government projects.
Corda passed as it uses SHA-256 for transaction sealing and SHA-256 is an acceptable hash algorithm according to NIST. Java has many implementations of SHA-256, and there are NIST approved libraries. Corda supports numerous digital signatures. RSA is supported with SHA-256 as the hashing algorithm. For ECC, P-256 is also supported with SHA-256 as the hashing algorithm. All of these have been validated by NIST.
Hyperledger Fabric, Ethereum and Multichain didn't fit the bill for a variety of reasons, either because the encryption standards used were not approved by NIST, or where they were, they were written in programing languages and libraries that NIST has not approved.
Hyperledger Fabric had NIST approved transaction sealing and digital signature cryptography but as it was implemented in go-lang which is a language implementation not approved by NIST it didnt pass.
Ethereum had more issues. Ethash, which is used for Proof of Work doesnt meet NIST requirements and the report saw that the move to Proof of Stake as being a moving target which was hard to evaluate. For digital signatures Ethereum uses the secp256k1 curve which has not been validated by NIST
Multichain came close. With a NIST approved cryptography for transaction sealing but support only for secp256k1.19 for digital signatures which has not been validated by NIST.
Comparison of four protocols
Cordas upper hand in government compliance is through a combination of using encryption protocols that are validated by NIST as well as through implementing them in a an established 25 year old language that NIST is familiar with - namely Java.
From Hyperledger Fabrics perspective, theres a good argument to be made that go-lang is a new, modern language that has been around for twelve fewer years than Java and Javas use is therefore more established so its only natural that NIST, representing the conservative nature of government (much of which still runs on tried-and-tested COBOL code from the 1970s) would focus on an established language.
Corda Holds The Lead, For Now At Least
All is not lost for Hyperledger Fabric as its entirely possible that we may see NIST spending the time in the future to validate encryption algorithms written in go-lang which may open up Hyperledger Fabric for use in the federal government. However, that is not something to take lightly as NIST has an extensive catalog of vulnerabilities associated with various languages and frameworks, with this level of attention to detail, approval is likely to be a rigorous and long endeavor.
Corda may be the winner but there is an important caveat - Corda meets NIST standards only if traditional java libraries are used. To understand this important nuance requires an appreciation of the fact that Corda is actually built using Kotlin, a relative to the Java language which is interoperable with Java.
So why was NIST not able to approve encryption code written a new language such as go-lang, yet a newer language like Kotlin was found to be acceptable?
The answer is NIST approval is only for encryption libraries written in Java which Kotlin, by being a close relative to Java is able to use. If users use Kotlin libraries for encryption, Corda may not pass the NIST test.
Luckily, unlike Hyperledger Fabric, Corda can have it both ways - the advantages of a powerful new language as well as the safety of an established one.
New Technology Frontiers
The IEEE report focuses on cryptography, yet thats not the full picture when it comes to security.
Two other security aspects of blockchains that have received increasingly more are formally verified smart contracts and Trusted Execution Environments (TEEs).
Smart contracts written in formally verified languages have the benefit that it is possible to calculate mathematically with 100% certainty what the result of a smart contract will provide for a given input.
This makes them more safe to use then their non-deterministic counterparts because there can be certainty around what they will do. Outside of blockchain, formally verified languages are commonly used for critical systems such as nuclear power plants. However, at the same time this style of programming language can impose restrictions on what blockchain can do that can make them unsuitable for certain types of work.
It will be interesting to see if NIST forms a view on formally verified languages in the next few years.
A Trusted Execution Environment, on the other hand, is a rapidly maturing security technology which provides a way for code to be run in a secure and confidential manner even if the computer that it is running on is not secure. It also provides a safe place for storing encryption keys and other sensitive data.
Its an area of the market which has seen big investments by chip manufacturers, cloud providers and blockchain application providers alike in the last few years. Intel INTC and AMD have created CPUs that support this type of computing, which is then offered through cloud vendors such as Microsoft MSFT Azure and IBM IBM s Data Cloud. Microsoft recently announced their Confidential Computing Framework that provides the building blocks for integrating blockchains that use confidential computing. R3 has also recently announced a beta program for its confidential computing initiative named conclave.
There still remains some controversy as to how secure these environments are as the CPU chip manufacturers hold part of the security puzzle and therefore require trust in the chipmaker.
Blockchain In The Federal Government Already
While the assessment from the IEEE may sound like a bit of a theoretical exercise, it is worth remembering that the U.S. federal government has already implemented blockchain and as such is a world leader in the space; the department of Health And Human services, a branch of the federal government, has received Authorization To Proceed with the use of a new procurement focused blockchain (HHS Accelerate) that aims to save the government over $30m in procurement costs over the next five years.
The federal government, it seems, is serious about blockchain.
Originally posted here:
Ethereum, Fabric, Corda, And Multichain. Only One Is Government Ready - New Report - Forbes
- To Foil NSA Spies, Encrypt Everything [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- What is cryptography? - A Word Definition From the ... [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- cryptography: Definition from Answers.com [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Cryptography - Wikipedia, the free encyclopedia [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Cryptography - CISSP Domain 07 - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Cryptography Advanced Encryption Standard AES Tutorial,fips 197 - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Faraday Project for Network Security and Cryptography - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- An Overview of Cryptography - Gary C. Kessler [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- An Open Letter from US Researchers in Cryptography and ... [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Gambling with Secrets Part 4 8 Private Key Cryptography - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Gambling with Secrets Part 1 8 What is Cryptography - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Public Key Cryptography RSA Encryption Algorithm - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Public Key Cryptography Diffie Hellman Key Exchange - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Intro to Cryptography - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Caesar Cipher Ancient Cryptography - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- 50 top US cyber security experts write open letter calling for end to NSA 'snoop-ops' [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- Prominent cryptography and security researchers deplore NSA's surveillance activities [Last Updated On: January 27th, 2014] [Originally Added On: January 27th, 2014]
- Obama Stays Silent on Reform of NSA's Crypto Subversion [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Cryptography experts sign open letter against NSA surveillance [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- US crypto researchers to NSA: If you must track, track responsibly [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Java Cryptography Architecture (JCA) Overview - Video [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Cryptography - Part 1 - Video [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Cryptography - Part 2 - Video [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- International Journal on Cryptography and Information Security ( IJCIS) - Video [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Bitcoin Lowdown: Block Chain Cryptography Trumps Human Trust, Deal With It - Video [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- Bitcoin Lowdown: Block Chain Cryptography Trumps Human Trust - Video [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- NSA and GCHQ spoofed LinkedIn to hack Belgian cryptography professor [Last Updated On: February 1st, 2014] [Originally Added On: February 1st, 2014]
- Lecture 17: Elliptic Curve Cryptography (ECC) - Video [Last Updated On: February 1st, 2014] [Originally Added On: February 1st, 2014]
- Cryptography event - Pravega 2014 - Video [Last Updated On: February 3rd, 2014] [Originally Added On: February 3rd, 2014]
- Lecture 1: Introduction to Cryptography - Video [Last Updated On: February 3rd, 2014] [Originally Added On: February 3rd, 2014]
- US and UK spy agencies accused of swoop on Belgian cryptography expert [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Conceal: Facebook's new Java APIs for cryptography on Android [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Cryptography Apps: How To Keep Your Personal Info Private [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Cryptography Breakthrough Could Make Software Unhackable [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Oi, Android devs! Facebook wants your apps to be more secure [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- Lecture 19: Elgamal Digital Signature - Video [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- Lecture 18: Digital Signatures and Security Services - Video [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- Cryptography 1. List some of the attacks on the Diffie ... [Last Updated On: February 6th, 2014] [Originally Added On: February 6th, 2014]
- Cryptography Breakthrough Could Make Software Unhackable ... [Last Updated On: February 6th, 2014] [Originally Added On: February 6th, 2014]
- Cryptography: Secret Coding, Spying, and E-Commerce - Video [Last Updated On: February 6th, 2014] [Originally Added On: February 6th, 2014]
- Cryptography - Video [Last Updated On: February 9th, 2014] [Originally Added On: February 9th, 2014]
- Public Key Cryptography: RSA Encryption Algorithm - Video [Last Updated On: February 10th, 2014] [Originally Added On: February 10th, 2014]
- Is Bitcoin Anonymous? Arvind Narayanan | Princeton University | Real World Cryptography Workshop - Video [Last Updated On: February 10th, 2014] [Originally Added On: February 10th, 2014]
- A Competitive Study of Cryptography Techniques over Block Cipher - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- How Quantum Computing Will Change Cryptography [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]
- REALITY LOST - EXCERPT SIX (QUANTUM CRYPTOGRAPHY) - Video [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]
- Introduction to Cryptography of Bitcoin, Explained! - Video [Last Updated On: February 18th, 2014] [Originally Added On: February 18th, 2014]
- [FOSDEM 2014] USE OTR or how we learned to start worrying and love cryptography - Video [Last Updated On: February 18th, 2014] [Originally Added On: February 18th, 2014]
- Reshif's Cryptography Challenge Solution/Walkthrough - Video [Last Updated On: February 20th, 2014] [Originally Added On: February 20th, 2014]
- [DEFCON 19] Steganography and Cryptography 101 - Video [Last Updated On: February 22nd, 2014] [Originally Added On: February 22nd, 2014]
- A Brief Rundown Of The Spying Questions Intel's CEO Won't Answer [Last Updated On: February 25th, 2014] [Originally Added On: February 25th, 2014]
- DEF CON 8 - Jon Erickson - Number Theory Complexity, Theory, Cryptography, and Quantum Computing. - Video [Last Updated On: February 26th, 2014] [Originally Added On: February 26th, 2014]
- Was YOUR iPhone at risk of being hacked? Bug in Apple update left mobiles open to identity theft for up to 18 months ... [Last Updated On: February 27th, 2014] [Originally Added On: February 27th, 2014]
- Security researchers urge tech companies to explain their cryptographic choices [Last Updated On: February 27th, 2014] [Originally Added On: February 27th, 2014]
- Apple reveals algorithm behind 'encrypted' iMessages [Last Updated On: February 28th, 2014] [Originally Added On: February 28th, 2014]
- Wiliest Ways to Keep the NSA at Bay [Last Updated On: March 1st, 2014] [Originally Added On: March 1st, 2014]
- How to Pronounce Cryptography - Video [Last Updated On: March 1st, 2014] [Originally Added On: March 1st, 2014]
- cryptography in DNS - Video [Last Updated On: March 3rd, 2014] [Originally Added On: March 3rd, 2014]
- Who is the reclusive billionaire creator of Bitcoin? [Last Updated On: March 4th, 2014] [Originally Added On: March 4th, 2014]
- How to say cryptography in Italian - Video [Last Updated On: March 4th, 2014] [Originally Added On: March 4th, 2014]
- Massive Linux security flaw dwarfs Appleās cryptography problems of just last week [Last Updated On: March 5th, 2014] [Originally Added On: March 5th, 2014]
- Security lessons from RSA [Last Updated On: March 5th, 2014] [Originally Added On: March 5th, 2014]
- Visual Cryptography - Video [Last Updated On: March 5th, 2014] [Originally Added On: March 5th, 2014]
- Classical Computing Embraces Quantum Ideas [Last Updated On: March 6th, 2014] [Originally Added On: March 6th, 2014]
- Quantum Cryptography Conquers Noise Problem [Last Updated On: March 6th, 2014] [Originally Added On: March 6th, 2014]
- REALITY LOST Bonus scene 4. Quantum cryptography Founding Fathers. - Video [Last Updated On: March 7th, 2014] [Originally Added On: March 7th, 2014]
- Quantum Cryptography: From Theory to Practice - Video [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- Forcing Trust: Nonlocal Games and Untrusted-device Cryptography - Video [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- TrustyCon 2014 - New Frontiers in Cryptography - Video [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- REALITY LOST Bonus scene 3. Christian Kurtsiefer on hacking quantum cryptography. - Video [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- Nerlens Noel Tweets Date for Potential NBA Debut [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- CISSP SG Cryptography - Video [Last Updated On: March 10th, 2014] [Originally Added On: March 10th, 2014]
- More secure communications thanks to quantum physics [Last Updated On: March 13th, 2014] [Originally Added On: March 13th, 2014]
- New Cryptography Scheme Secured By Quantum Physics [Last Updated On: March 13th, 2014] [Originally Added On: March 13th, 2014]
- History Of Cryptography - Video [Last Updated On: March 14th, 2014] [Originally Added On: March 14th, 2014]
- avc 19 Cryptography x264 - Video [Last Updated On: March 15th, 2014] [Originally Added On: March 15th, 2014]
- Edward Snowden Speaks at SXSW [Last Updated On: April 10th, 2017] [Originally Added On: March 15th, 2014]
- Tor is building an anonymous instant messenger [Last Updated On: April 10th, 2017] [Originally Added On: March 15th, 2014]
- learn cryptography learn the following pkcs refrences - Video [Last Updated On: March 16th, 2014] [Originally Added On: March 16th, 2014]
- [Lec-2][Part-2] Shift Cipher - Symmetric ciphers - Video [Last Updated On: March 16th, 2014] [Originally Added On: March 16th, 2014]