Monday, December 2, 2013

Alice and Bob in Cryptography

There are many aspects to security and many applications, ranging from secure commerce and payments to private communications and protecting passwords. One essential aspect for secure communications is that of cryptography. Cryptography is an indispensable tool for protecting information in computer systems. 
Cryptography, then, not only protects data from theft or alteration, but can also be used for user authentication. In this blog, I will mention about Alice and Bob, the names Alice and Bob are two commonly used placeholder names. They are used for archetypal characters in fields such as cryptography. 
Below is one example from online about Alice and Bob in Homomorphic encryption.

“Alice hands bob a locked suitcase and asks him to count the money inside. “Sure,” Bob says. “Give me the key.” Alice shakes her head; she has known Bob for many years, but she’s just not a trusting person. Bob lifts the suitcase to judge its weight, rocks it back and forth and listens as the contents shift inside; but all this reveals very little. “It can’t be done,” he says. “I can’t count what I can’t see.”
Alice and Bob, fondly known as the first couple of cryptography, are really more interested in computational suitcases than physical ones. Suppose Alice gives Bob a securely encrypted computer file and asks him to sum a list of numbers she has put inside. Without the decryption key, this task also seems impossible. The encrypted file is just as opaque and impenetrable as the locked suitcase. “Can’t be done,” Bob concludes again.
But Bob is wrong. Because Alice has chosen a very special encryption scheme, Bob can carry out her request. He can compute with data he can’t inspect. The numbers in the file remain encrypted at all times, so Bob cannot learn anything about them. Nevertheless, he can run computer programs on the encrypted data, performing operations such as summation. The output of the programs is also encrypted; Bob can’t read it. But when he gives the results back to Alice, she can extract the answer with her decryption key. ”

The technique that makes this magic trick is called homomorphic encryption (FHE). It is discovery by Craig Gentry who is a student at Stanford University. Homomorphic encryption is not quite ready for everyday use. The methods have been shown to work in principle, but they still impose a heavy penalty of inefficiency. If the system can be made more practical, however, there are applications ready and waiting for it. Many organizations are eager to outsource computation: Instead of maintaining their own hardware and software, they would like to run programs on servers “in the cloud,” a phrase meant to suggest that physical location is unimportant. But letting sensitive data float around in the cloud raises concerns about security and privacy. Practical homomorphic encryption would address those worries, protecting the data against eavesdroppers and intruders and even hiding it from the operators of the cloud service.

http://www.garykessler.net/library/crypto.html
http://www.americanscientist.org/issues/pub/alice-and-bob-in-cipherspace


1 comment:

  1. Your blog provide a vivid description about a very professional technique as "homomorphic encryption". The example about the communication between Bob and Alice does help to explain this obscure term. However, I only understand it with second time reading since the basic idea hasn't been expressed at the beginning of the article. One more suggestion I would provide is that a little discussion about the relationship between cloud computing and the "homomorphic encryption" will let the conclusion in the end of the article more convincing.

    ReplyDelete