{"id":27115,"date":"2014-10-31T16:40:53","date_gmt":"2014-10-31T20:40:53","guid":{"rendered":"http:\/\/www.opensource.im\/?p=27115"},"modified":"2014-10-31T16:40:53","modified_gmt":"2014-10-31T20:40:53","slug":"raising-cryptographys-standards","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/raising-cryptographys-standards.php","title":{"rendered":"Raising cryptography&#8217;s standards"},"content":{"rendered":"<p><p>    PUBLIC RELEASE DATE:  <\/p>\n<p>    31-Oct-2014  <\/p>\n<p>    Contact: Abby Abazorius    <a href=\"mailto:abbya@mit.edu\">abbya@mit.edu<\/a>    617-253-2709    Massachusetts Institute of    Technology    @MITnews<\/p>\n<p>    Most modern cryptographic schemes rely on computational    complexity for their security. In principle, they can be    cracked, but that would take a prohibitively long time, even    with enormous computational resources.  <\/p>\n<p>    There is, however, another notion of security     information-theoretic security  which means that even an    adversary with unbounded computational power could extract no    useful information from an encrypted message. Cryptographic    schemes that promise information-theoretical security have been    devised, but they're far too complicated to be practical.  <\/p>\n<p>    In a series of papers presented at the Allerton Conference on    Communication, Control, and Computing, researchers at MIT and    Maynooth University in Ireland have shown that existing,    practical cryptographic schemes come with their own    information-theoretic guarantees: Some of the data they encode    can't be extracted, even by a computationally unbounded    adversary.  <\/p>\n<p>    The researchers show how to calculate the minimum-security    guarantees for any given encryption scheme, which could enable    information managers to make more informed decisions about how    to protect data.  <\/p>\n<p>    \"By investigating these limits and characterizing them, you can    gain quite a bit of insight about the performance of these    schemes and how you can leverage tools from other fields, like    coding theory and so forth, for designing and understanding    security systems,\" says Flavio du Pin Calmon, a graduate    student in electrical engineering and computer science and    first author on all three Allerton papers. His advisor, Muriel    Mdard, the Cecil E. Green Professor of Electrical Engineering    and Computer Science, is also on all three papers; they're    joined by colleagues including Ken Duffy of Maynooth and Mayank    Varia of MIT's Lincoln Laboratory.  <\/p>\n<p>    The researchers' mathematical framework also applies to the    problem of data privacy, or how much information can be gleaned    from aggregated  and supposedly \"anonymized\"  data about    Internet users' online histories. If, for instance, Netflix    releases data about users' movie preferences, is it also    inadvertently releasing data about their political preferences?    Calmon and his colleagues' technique could help data managers    either modify aggregated data or structure its presentation in    a way that minimizes the risk of privacy compromises.  <\/p>\n<p>    Staying close  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Excerpt from:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.eurekalert.org\/pub_releases\/2014-10\/miot-rcs103114.php\/RK=0\/RS=fQcguk1Jt0Yxfe_E7DLdOZfNxDc-\" title=\"Raising cryptography's standards\">Raising cryptography's standards<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> PUBLIC RELEASE DATE: 31-Oct-2014 Contact: Abby Abazorius <a href=\"mailto:abbya@mit.edu\">abbya@mit.edu<\/a> 617-253-2709 Massachusetts Institute of Technology @MITnews Most modern cryptographic schemes rely on computational complexity for their security. In principle, they can be cracked, but that would take a prohibitively long time, even with enormous computational resources. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-27115","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/27115"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=27115"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/27115\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=27115"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=27115"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=27115"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}