The future of encryption

October 23, 2015 by Amina Khan, National Science Foundation
"Honey encryption" describes a method where wrong guesses of a key produce information that looks accurate but isn't. Credit: Amina Khan, NSF

If you want to protect valuable information, wouldn't you keep it under lock and key?

Today, modern encryption uses "keys" to keep on our computers, mobile devices, and safe. Encryption converts data into digital gibberish, which prevents it from being used maliciously. The data then needs to be decrypted to be processed by a computer or mobile device. To do so, the recipient of the message needs the right keys.

But even encrypted data can sometimes be intercepted and accessed. So how can we keep our data safe?

Fully homomorphic encryption

In 2010, Craig Gentry, a graduate student supported by the National Science Foundation, thought of a new way to protect data. He called it fully homomorphic encryption: a way to process data without ever decrypting it.

To explain this concept, he invented an imaginary character named Alice who owns a jewelry store. Alice doesn't trust her workers with her expensive gems, so she gets an impenetrable box for which only she has the .

When Alice wants her employees to make a new piece of jewelry, she locks the materials inside the box and hands it off to her workers. Using special gloves, employees can work on the gems inside the box, but can't get them out. Once the work is done, Alice opens the box with her key and takes out the finished jewelry. In this way, her workers process raw materials into jewelry without ever truly having access to the materials themselves.

In 2010, Craig Gentry, a graduate student supported by the National Science Foundation, thought of a new way to protect data. He called it fully homomorphic encryption: a way to process data without ever decrypting it. Credit: Amina Khan, NSF

Fully homomorphic encryption basically does the same thing. As data and computation move to the cloud, would allow your data to be processed without ever having to give away access to it. For instance, a web application could process your tax return using encrypted financial information without actually seeing any of it.

Cryptographers, including Gentry, are still figuring out how to turn the idea of homomorphic encryption into a practical reality.

Other new approaches to cryptography

Fully homomorphic encryption isn't the only forward-looking cryptographic protocol that researchers are exploring. Another promising approach is "honey encryption"—where wrong guesses of the key produce information that looks accurate but isn't. A second approach is "functional encryption"—where restricted secret keys enable a key holder to learn about only a specific function of encrypted data and nothing else. In a third approach, called "quantum key ," the quantum nature of atoms protects the data. All are active areas of study the National Science Foundation supports.

The goal of all of this research is that one day, it will be possible to ensure security of important information wherever it might be—on our computers, and even in the cloud.

Explore further: Advancing privacy and security in the cloud

More information: Functional Encryption: Definitions and Challenges. Theory of Cryptography, DOI: 10.1007/978-3-642-19571-6_16

A Fully Homomorphic Encryption Scheme. crypto.stanford.edu/craig/craig-thesis.pdf

Related Stories

Advancing privacy and security in the cloud

December 24, 2013

IBM inventors have received a patent for a breakthrough data encryption technique that is expected to further data privacy and strengthen cloud computing security.

Improving security in the cloud

December 15, 2011

Less and less of today's computing is done on desktop computers; cloud computing, in which operations are carried out on a network of shared, remote servers, is expected to rise as the demand for computing power increases. ...

ShadowCrypt research project shows encryption approach

November 6, 2014

A team of researchers from UC Berkeley and University of Maryland believe they have come up with a previously unexplored design point, ShadowCrypt, that enables encrypted input/output without trusting any part of the web ...

Recommended for you

Light-based production of drug-discovery molecules

February 18, 2019

Photoelectrochemical (PEC) cells are widely studied for the conversion of solar energy into chemical fuels. They use photocathodes and photoanodes to "split" water into hydrogen and oxygen respectively. PEC cells can work ...

Sound waves let quantum systems 'talk' to one another

February 18, 2019

Researchers at the University of Chicago and Argonne National Laboratory have invented an innovative way for different types of quantum technology to "talk" to each other using sound. The study, published Feb. 11 in Nature ...

Engineered metasurfaces reflect waves in unusual directions

February 18, 2019

In our daily lives, we can find many examples of manipulation of reflected waves, such as mirrors, or reflective surfaces for sound that improve auditorium acoustics. When a wave impinges on a reflective surface with a certain ...

0 comments

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.