Sinister code-breakers, beware

Jan 24, 2013 by Matt Collette
The research of Daniel Wichs, a new assistant professor in the College of Computer and Information Science, focuses on how cryptography can continue protecting personal data in an evolving digital age. Credit: Brooks Canaday.

In the early– to mid-​​20th cen­tury, gov­ern­ments com­monly used cryp­tog­raphy to encrypt top-​​secret mes­sages or mil­i­tary com­mu­ni­ca­tions. But now that the com­puter and Internet age has evolved to a point where smart­phones and tablets are readily avail­able at our fin­ger­tips, its use has become much more wide­spread to meet the chal­lenges of the 21st cen­tury, according to Daniel Wichs, a newly appointed assis­tant pro­fessor in the Col­lege of Com­puter and Infor­ma­tion Sci­ence.

"Cryp­tog­raphy is being used every day, but people prob­ably don't even notice it," Wichs said. "Whether you're using or log­ging on to a site from your mobile phone, cryp­tog­raphy is there making sure others aren't able to see the data you're sending and receiving."

His interest in the field of cryp­tog­raphy blos­somed as an under­grad­uate studying math­e­matics and com­puter sci­ence at Stan­ford Uni­ver­sity. The sub­ject, he said, allowed him to apply com­plex math­e­matics with seem­ingly scant prac­tical appli­ca­tions to solve real-​​world com­puter sci­ence prob­lems related to security.

Wichs earned his doc­torate from New York Uni­ver­sity in 2011 and later served as a Josef Raviv Memo­rial Post­doc­toral Fellow at IBM before arriving at North­eastern this fall.

Wichs has noticed major changes in the field within the last few years. The mas­sive expan­sion of cryp­tog­raphy work, for example, means researchers have to be much more focused on how out­side forces, like hackers or for­eign gov­ern­ments, try to break through encrypted sys­tems or exploit unknown weaknesses.

In par­tic­ular, his work focuses in part on what are called "side-​​channel attacks," in which third par­ties try to learn about an encrypted system by mea­suring infor­ma­tion like how long a com­puter process takes or how much elec­tricity is used by a given calculation.

"You can learn a lot of infor­ma­tion just from these seemingly-​​meaningless details, so cryp­tog­raphy sys­tems are starting to take them into account too by securing not just the data but also the com­puting system itself," Wichs said.

He noted that he is fas­ci­nated with cryp­tog­raphy because it merges theory and prac­tical appli­ca­tions in ways that are seldom found in many fields of research.

"It's a really cool set of prob­lems you're facing," he said. "How do you make sure data—which is a key part of nearly every com­po­nent of our lives today—is secured?"

But per­haps the most impor­tant thing about cryp­tog­raphy research, Wichs said, is that the more time pro­fes­sionals spend working to pro­tect crit­ical data and sys­tems, the less time the public should spend wor­rying about per­sonal infor­ma­tion breaches.

"If cryp­tog­ra­phers do their job, you don't have to think about it all that much," Wichs said. "It's our goal to make sure these crit­ical stan­dards and pro­to­cols are in place."

Explore further: Scientists apply new graph programming method for evolving exascale applications

add to favorites email to friend print save as pdf

Related Stories

Data mining in the social-media ecosystem

Sep 18, 2012

Ray­mond Fu, a newly appointed assis­tant pro­fessor of elec­trical and com­puter engi­neering, wants to build a better social-​​media ecosystem, one in which Face­book makes expert friend rec­om­men­da­tions ...

A new kind of pub crawl

Aug 24, 2012

Web­sites like Face­book, LinkedIn and other social-​​media net­works con­tain mas­sive amounts of valu­able public infor­ma­tion. Auto­mated web tools called web crawlers sift through these ...

3Qs: Facial recognition is the new fingerprint

Sep 21, 2012

Ear­lier this month, the FBI began rolling out a $1 bil­lion update to the national fin­ger­printing data­base. Facial-​​recognition sys­tems, DNA analysis, voice iden­ti­fi­ca­tion and iris ...

Professor works toward a better brainwave monitor

Dec 06, 2012

The elec­trical out­puts of the brain con­tain mas­sive amounts of infor­ma­tion that could be a pow­erful resource if we could fully tap into it. Our brain processes things we see before any con­scious ...

Recommended for you

User comments : 0

More news stories

Health care site flagged in Heartbleed review

People with accounts on the enrollment website for President Barack Obama's signature health care law are being told to change their passwords following an administration-wide review of the government's vulnerability to the ...

Airbnb rental site raises $450 mn

Online lodging listings website Airbnb inked a $450 million funding deal with investors led by TPG, a source close to the matter said Friday.

Researchers uncover likely creator of Bitcoin

The primary author of the celebrated Bitcoin paper, and therefore probable creator of Bitcoin, is most likely Nick Szabo, a blogger and former George Washington University law professor, according to students ...