It looks like you're using an Ad Blocker.

Please white-list or disable in your ad-blocking tool.

Thank you.


Some features of ATS will be disabled while you continue to use an ad-blocker.


Cryptography Breakthrough Could Make Software Unhackable

page: 1

log in


posted on Feb, 7 2014 @ 11:30 PM
*Note the article's title is extremely misleading and I have included a clarification from an individual identifying them as a co-author of the research paper which the article is based on.

Everyday it seems there are reports of new threats to cyber security with more and more valuable data being compromised. Not to fear though as passionate mathematicians and coders are hard at work developing systems design around security. In the future digital transactions will become even more prevalent and secure transfer of that data will become, if that were possible, even more important.

Cryptography has allowed the internet to flourish with its various incarnations of secure transfer protocols such as TTP (trusted third party) and we appear to be on the edge of the next age of cryptography in which encryption will be competing against or taking advantage of quantum computing all for the sake of 0' and 1's.

So, let me present an early front runner.

Cryptography Breakthrough Could Make Software Unhackable

“A program obfuscator would be a powerful tool for finding plausible constructions for just about any cryptographic task you could conceive of,” said Yuval Ishai, of the Technion in Haifa, Israel.

Precisely because of obfuscation’s power, many computer scientists, including Sahai and his colleagues, thought it was impossible. “We were convinced it was too powerful to exist,” he said. Their earliest research findings seemed to confirm this, showing that the most natural form of obfuscation is indeed impossible to achieve for all programs.

Then, on July 20, 2013, Sahai and five co-authors posted a paper on the Cryptology ePrint Archive demonstrating a candidate protocol for a kind of obfuscation known as “indistinguishability obfuscation.” Two days later, Sahai and one of his co-authors, Brent Waters, of the University of Texas, Austin, posted a second paper that suggested, together with the first paper, that this somewhat arcane form of obfuscation may possess much of the power cryptographers have dreamed of.

*Note from the co-author

Amit Sahai
I am a co-author of the research quoted in the article. I realize it is likely pointless to write this comment in an Internet forum, but let me attempt to clarify the situation, in the hope that some thoughtful participants will find it useful. Please note: I will not be monitoring this forum in the future. If you are a researcher, please feel free to contact me.

1) The title is misleading: secure obfuscation does not necessarily create "unhackable" software, whatever that means.

2) Secure obfuscation is a mathematical term of art. It is unfortunate that the word "obfuscation" has an ordinary meaning that is very different than what we mean. An analogy might be the word "countable" which for mathematicians usually refers to infinite sets, while lay readers would likely not think this way.

3) The right way to think of what secure obfuscation allows is to create, *under many technical conditions*, software that has secrets built into it. These secrets are used by the software to compute output, and yet the secrets remain hidden even if an attacker obtains the entire machine-level code of the software, which of course the attacker could run and analyze. Thus the attacker would be able to *use* the secrets only in the way that the software allows, but not recover these secrets in any way beyond that.

4) In no direct way does secure obfuscation have anything to with DRM, software copy protection, etc.

5) Obfuscation is really a terrible name, but unfortunately it is the mathematical term that has become widely used in the academic (non-hacker) community.

6) All of this is based on mathematical computational assumptions, which may be proven false by future algorithmic advances.

Here is a little video to put a face on the types of individuals working in this field, or at least the face they want you to see

For a more detailed history of cryptography and its uses I would really suggest this book;

The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet
by David Kahn

David Kahn's The Codebreakers takes the measure of what codes and codebreaking have meant in human history in a single comprehensive account, astonishing in its scope and enthralling in its execution. Hailed upon first publication as a book likely to become the definitive work of its kind

Anyone on ATS passionate about encryption?

Opinions and links welcome.


posted on Feb, 7 2014 @ 11:57 PM
Beat you to it FOUR DAYS ago.

posted on Feb, 8 2014 @ 02:09 AM


Beat you to it FOUR DAYS ago.

I put the title in the search engine and your thread still doesn't show.
But it is good that someone covered it.
Just wondering why you capitalized FOUR DAYS?
Its not like you posted it in the breaking news.


posted on Feb, 8 2014 @ 04:57 AM
Any kind of encryption that cant be broken will be made illegal...for your personel safety of course!

posted on Feb, 8 2014 @ 05:02 AM
reply to post by FriedBabelBroccoli

Probably expected more stars and flags. How irritating.

posted on Feb, 8 2014 @ 10:19 AM
Topic already being discussed here, thread closed.

new topics

top topics

log in