{"id":2541,"date":"2014-02-04T12:41:44","date_gmt":"2014-02-04T17:41:44","guid":{"rendered":"http:\/\/www.opensource.im\/?p=2541"},"modified":"2014-02-04T12:41:44","modified_gmt":"2014-02-04T17:41:44","slug":"revolutionary-new-cryptography-tool-could-make-software-unhackable","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/revolutionary-new-cryptography-tool-could-make-software-unhackable.php","title":{"rendered":"Revolutionary new cryptography tool could make software unhackable"},"content":{"rendered":"<p><p>    A team of researchers from IBM and Microsoft may have just made    a breakthrough in the quest for unbreakable cryptography. The    results produced by the team from UCLA and MIT offer hope that    encryption    could protect not just an output, but an entire program. Once    believed to be too powerful to exist in any real sense, this    new method of program obfuscation could lead to ultra-secure    software that keeps your personal information safe from    nefarious individuals.  <\/p>\n<p>    The idea of obfuscating a program has been around for decades     software    companies have tried all sorts of methods to distort their code    in order to prevent others from seeing how it worked. However,    the security and hacking communities have been able to defeat    all these measures. Cryptographic experts have long been    tinkering with stronger approaches, but it wasnt until the    most recent collaboration that the pieces started falling into    place.  <\/p>\n<p>    Cryptographers have been chasing the idea of a so-called black    box obfuscator for years. The idea is that any program passed    through the black box would be so fundamentally garbled that no    one would be able to figure out how it worked or what secrets    it might hold  only inputs and outputs would be visible, which    is exactly what you want. This method could make communications    almost completely secure. All you would need to do is create    encryption keys with an obfuscated program, then make that    program available to the other party  or everyone for that    matter, since no one would be able to figure out the decryption    key from examining the obfuscated program.  <\/p>\n<p>    One member of the team, Amit Sahai worked on a principle known    as indistinguishability obfuscation a few years back, which at    the time was considered a weak type of obfuscation. It involves    passing a program through said obfuscator to disguise the    origin. Two programs that do the same thing would be    indistinguishable from each other at the end of it. Recent work    has pointed to this as a surprisingly powerful cryptographic    tool, though. The only problem, an indistinguishability    obfuscator didnt exist  until now.  <\/p>\n<\/p>\n<p>    The obfuscator created by Sahai and his colleagues appears to    almost reach the level of broad protection described by the    theoretical black box obfuscator. The tool, based on    indistinguishability obfuscation, can be used to generate    digital signatures, encryption keys, and more without leaking    any of the inner workings of applications. It works by splicing    random bits of data into the programs code so that it cannot    be extracted in a functional state. However, when run as it is    supposed to be, the random junk cancels itself out and you get    the desired output.  <\/p>\n<p>    After creating this obfuscation scheme, the team tried to break    it by deploying every tool and hack they could come up with.    The result? The obfuscator     remains undefeated. The team feels this is as close to    unbreakable as encryption gets right now, but its possible    some future advance in computing or lattice mathematics could    result in a breach.  <\/p>\n<p>    While having access to strong cryptographic    tools is certainly desirable, remember that companies and    governments use encryption to protect sensitive data and trade    secrets too. Breaking the encryption on future electronic    devices might not be as easy as it was with DVD or the PS3. The    indistinguishability obfuscator is still not ready for real    world use, though. Right now it turns efficient little apps    into ungainly monstrosities with all that random code inserted.    Its still a very big step for cryptography.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>View post:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.extremetech.com\/extreme\/175950-revolutionary-new-cryptography-tool-could-make-software-unhackable\" title=\"Revolutionary new cryptography tool could make software unhackable\">Revolutionary new cryptography tool could make software unhackable<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> A team of researchers from IBM and Microsoft may have just made a breakthrough in the quest for unbreakable cryptography. The results produced by the team from UCLA and MIT offer hope that encryption could protect not just an output, but an entire program. Once believed to be too powerful to exist in any real sense, this new method of program obfuscation could lead to ultra-secure software that keeps your personal information safe from nefarious individuals<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-2541","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/2541"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=2541"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/2541\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=2541"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=2541"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=2541"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}