Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Zero Knowledge Proof may Answer Computer Security Question
Scientific Computing ^ | 08/28/2013 - 7:08pm | Bill Steele, Cornell University

Posted on 09/03/2013 9:35:49 AM PDT by null and void

In the age of the Internet, it’s getting harder and harder to keep secrets. When you type in your password, there’s no telling who might be watching it go by. However, new research at Cornell may offer a pathway to more secure communications.

The answer is to not send sensitive information at all. Rafael Pass, associate professor of computer science, has developed a new protocol, or set of rules, to create what computer scientists call a “zero knowledge proof.”

“I think zero knowledge proofs are one of the most amazing notions in computer science,” Pass said. “What we have done is to combine it with another notion — that it’s easier to prove that a computation can be done correctly than it is to actually compute it.”

The result is a way to prove that you know something without saying out loud what it is you know. Instead of insecurely typing the password for your bank account, you just prove to the bank that you know the password. You could pass an exam by proving that you know the answer, without actually writing the answer down so the person sitting next to you can’t copy it.

Applications include password authentication, cryptography, auctions, financial transactions and online voting. “At this point it’s purely theoretical,” Pass cautioned, “but it is teaching us a lot more about how zero knowledge works. That’s what makes me excited.” Pass and colleagues will describe their work at the 54th Annual IEEE Symposium on Foundations of Computer Science, October 27 to 29 in Berkeley, CA.

In its simplest form, such a proof consists of answering questions that depend on having the secret knowledge. To prove you have been in my house, I might ask you what color my cat is. The idea has been around since 1985, and there are already many ways to do it. Early versions required only a few messages being passed back and forth, but were insecure if an attacker participated in many proofs at the same time, as can easily be done on the Internet. An attacker could pick up a little bit of information from each exchange, piecing together the whole secret. Some newer methods will remain secure over many simultaneous exchanges, but instead require many messages being passed back and forth. The new protocol gets the job done with as few as 10 exchanges, Pass said, while remaining secure over many simultaneous exchanges. The researchers supply a rigorous mathematical proof that the protocol is a true zero-knowledge system, and that it works with just a small number of exchanges.

The proof that a zero-knowledge protocol works is the ability to construct a “simulator” that generates a fake conversation indistinguishable from a real one using the protocol, showing that whatever attack the intruder uses against the real conversation produces the same result as attacking the simulation. In other words, the intruder can learn nothing from the real conversation that he couldn’t have learned for himself by running the simulator. But running the simulator requires a lot of computer time, especially if there are many exchanges. The new protocol instead sends a “P-certificate,” certifying that the simulator has been proven to work. A computer program is just a series of logical steps; that it generates a particular output can be proven like any other mathematical statement.

The next step, Pass said, will be to apply the idea to the “man-in-the-middle” attack, where an intruder slips in between two parties to a conversation, making them think they’re talking directly to each other, not only to listen in but sometimes to change the messages as they pass through.

The idea of a zero knowledge proof was introduced by Shafi Goldwasser, Silvio Micali and Charles Rackoff at MIT. This year Goldwasser and Micali received the Turing Award (the equivalent of a Nobel Prize in computer science) for this and related discoveries.


TOPICS: Culture/Society
KEYWORDS: computersecurity; passwords; securityquestion
Navigation: use the links below to view more comments.
first 1-2021-40 next last
Interesting.

Although I am always a little skeptical about any claim to uncrackability.

1 posted on 09/03/2013 9:35:49 AM PDT by null and void
[ Post Reply | Private Reply | View Replies]

To: null and void

“...Turing Award (the equivalent of a Nobel Prize in computer science)...”

Given the completely besmirched reputation of the word “Nobel”, ‘twould be better for the Nobel prizes actually requiring intellect and achievement (physics, medicine, etc) to be renamed. The peace and literature prizes have reduced the reputation of the present name to the equivalent of “Yugo” in the automotive world.


2 posted on 09/03/2013 9:42:47 AM PDT by Da Coyote
[ Post Reply | Private Reply | To 1 | View Replies]

To: Da Coyote

Slightly off topic, see tagline...


3 posted on 09/03/2013 9:45:10 AM PDT by null and void (I'm betting on an Obama Trifecta: A Nobel Peace Prize, an Impeachment, AND a War Crimes Trial...)
[ Post Reply | Private Reply | To 2 | View Replies]

To: null and void

Zero Knowledge Proof sounds like a Zero-Sum Gain, IMO...


4 posted on 09/03/2013 9:46:29 AM PDT by Errant
[ Post Reply | Private Reply | To 1 | View Replies]

To: null and void

The Internet is consistent proof of the existence of Zero Knowledge...


5 posted on 09/03/2013 9:50:11 AM PDT by mikrofon (Monday BUMP)
[ Post Reply | Private Reply | To 1 | View Replies]

To: null and void

Making an attacker have to intercept multiple tests, would definitely make it harder.

The downside is that now when I forget my password, and don’t realize I forgot my password, I’ll be sitting through multiple tests before I realize what I no longer know.


6 posted on 09/03/2013 9:51:50 AM PDT by DannyTN
[ Post Reply | Private Reply | To 1 | View Replies]

To: null and void

Making an attacker have to intercept multiple tests, would definitely make it harder.

The downside is that now when I forget my password, and don’t realize I forgot my password, I’ll be sitting through multiple tests before I realize what I no longer know.


7 posted on 09/03/2013 9:51:50 AM PDT by DannyTN
[ Post Reply | Private Reply | To 1 | View Replies]

To: null and void
“I think zero knowledge proofs are one of the most amazing notions in computer science,” Pass said. “What we have done is to combine it with another notion — that it’s easier to prove that a computation can be done correctly than it is to actually compute it.”

This isn't new. algore used this method in the eighties to prove global warming.

8 posted on 09/03/2013 9:53:43 AM PDT by quimby
[ Post Reply | Private Reply | To 1 | View Replies]

To: Da Coyote

Agreed, but many of the Nobel Prizes wimped out on the revolutionary, or controversial science things. When they gave it to Einstein, it was for the photo-electric effect, not relativity, either special or general.

Meta questions for authentication have been used for years. One of the prime problems with passwords is currently requiring passwords that cannot be remembered, even with “security” hints. More than seven letters, upper and lower case, with a number and a symbol...If it is a password that is used infrequently or lost good luck! Writing them down is becoming a necessity, violating the physical security of the password in favor of the electronic security.

This is interesting stuff.

DK


9 posted on 09/03/2013 9:58:29 AM PDT by Dark Knight
[ Post Reply | Private Reply | To 2 | View Replies]

To: Dark Knight

So in a sense, wouldn’t this be like directly using those “secret” questions to gain site access instead of simply to retrieve or reset p/w’s?


10 posted on 09/03/2013 10:03:30 AM PDT by mikrofon (Security BUMP)
[ Post Reply | Private Reply | To 9 | View Replies]

To: mikrofon

It’s Tuesday.


11 posted on 09/03/2013 10:12:03 AM PDT by SoothingDave
[ Post Reply | Private Reply | To 5 | View Replies]

To: DannyTN

You don’t have to know your password. You just have to prove that you should know it.


12 posted on 09/03/2013 10:12:42 AM PDT by SoothingDave
[ Post Reply | Private Reply | To 6 | View Replies]

To: null and void

Sounds like ‘20 Questions’.

Is it animal, vegetable or mineral?

Is it bigger than a breadbox?

Can you put it in your pocket?.......


13 posted on 09/03/2013 10:12:47 AM PDT by Red Badger (It is dangerous to be right in matters where established men are wrong. .....Voltaire)
[ Post Reply | Private Reply | To 1 | View Replies]

To: mikrofon

I think this is just a personalized version of the Eliza idea. Can a computer hold a conversion with a person that is indistinguishable from another person? Can you think of something about a piece of information about a person that does not require disclosing the original info? Oddly enough that is the prime question in reincarnation, because once you disclose the type of information you will seek, people that want to deceive will target that type of info.

The bottom line is always from that great line...three people can keep a secret...if two are dead.

DK


14 posted on 09/03/2013 10:14:05 AM PDT by Dark Knight
[ Post Reply | Private Reply | To 10 | View Replies]

To: null and void

what they are saying could maybe be said as the following

it might be more secure for your bank to NOT ask for a “password” but to somehow crypticly ask, and you cryptically answer, your “security questions” - the ones you set up with them for the questions they would ask to confirm it was you who was admitting your forgot your password


15 posted on 09/03/2013 10:17:49 AM PDT by Wuli
[ Post Reply | Private Reply | To 1 | View Replies]

To: SoothingDave

Ref. my point ;)


16 posted on 09/03/2013 10:20:11 AM PDT by mikrofon (The Internets are never wrong...)
[ Post Reply | Private Reply | To 11 | View Replies]

To: SoothingDave
"You don’t have to know your password. You just have to prove that you should know it."

It's not going to ask you for your password, but it's going to ask you about your password. And if I've forgotten it again, I'll be answering the questions wrong.

17 posted on 09/03/2013 10:23:17 AM PDT by DannyTN
[ Post Reply | Private Reply | To 12 | View Replies]

To: SoothingDave
"You don’t have to know your password. You just have to prove that you should know it."

It's not going to ask you for your password, but it's going to ask you about your password. And if I've forgotten it again, I'll be answering the questions wrong.

18 posted on 09/03/2013 10:23:18 AM PDT by DannyTN
[ Post Reply | Private Reply | To 12 | View Replies]

To: rdb3; Calvinist_Dark_Lord; Salo; JosephW; Only1choice____Freedom; amigatec; Still Thinking; ...

19 posted on 09/03/2013 10:30:40 AM PDT by ShadowAce (Linux -- The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 1 | View Replies]

To: null and void

“Instead of insecurely typing the password for your bank account, you just prove to the bank that you know the password.”

And how does my bank KNOW I’m right? It has to KNOW my password.

So if my password is “0bama is a jerk”
will it ask me what the 4th word is? And I type ‘jerk’?

Will it ask me how many A’s in the password? and I type 3?

Splain some more.


20 posted on 09/03/2013 10:38:25 AM PDT by I want the USA back
[ Post Reply | Private Reply | To 1 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-40 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson