Guest User

Untitled

a guest
Dec 11th, 2017
93
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 6.08 KB | None | 0 0
  1. Homomorphic what? My OED suggests the following definition:
  2.  
  3. “Pertaining to two sets that are related by a homomorphism.”
  4.  
  5. Come on. Let’s try homomorphism:
  6.  
  7. “A transformation of one set into another that preserves in the second set the relations between elements of the first.”
  8.  
  9. Put homomorphic with encryption and thankfully Wikipedia provides something useful:
  10.  
  11. “A form of encryption where a specific algebraic operation performed on the plain text is equivalent to another (possibly different) algebraic operation performed on the cipher text.”
  12.  
  13. My turn. Homomorphic encryption is a process by which complex calculations can be performed on data, and it does not matter that the data is encrypted.
  14.  
  15. Why should we care?
  16. Here’s why.
  17. What’s happening to members of Sony’s game network, or users of LastPass, also compromised, will become a distant memory. With homomorphic encryption in play, your credit-card number or any sensitive information for that matter is always encrypted, therefore useless to the bad guys.
  18.  
  19. Step back
  20. I first became aware of homomorphic encryption back in September 2009, when I encountered the Ph.D thesis of Craig Gentry. Mr. Gentry, later with IBM, was able to take what was proposed in a still earlier 1978 paper by Professor Ronald Rivest et al. and make it happen.
  21. I’m a lightweight when it comes to intense cryptography theory. So, I was hesitant to wade through the paper. But, I noticed Mr. Gentry likes to explain things using analogy. Buoyed by that, I had a go.
  22.  
  23. Like a glove box
  24. The analogy that caught my eye (you will see why later) was that of a jewelry store owner, Alice, who has an ingenious way to prevent theft:
  25. “Alice, the owner of a jewelry store wants her employees to assemble precious materials into finished jewelry, but she is worried about theft. She addresses the problem by constructing glove boxes for which only she has the key.”
  26.  
  27.  
  28. Using the glove box, employees are able to fabricate the jewelry and only that. Alice controls the ingress of raw materials and the egress of the finished product using her key.
  29.  
  30.  
  31. (My employer happens to manufacture glove boxes.)
  32.  
  33.  
  34.  
  35. The connection
  36. Let’s see if I understand the analogy:
  37. Alice > end user
  38. Precious materials > raw data
  39. Key > network
  40. Locked glove box > encryption
  41. The workers > computational processes
  42. Finished jewelry > results of manipulation
  43. Keeping that in mind, let’s look at how homomorphic encryption could be used to solve 2+3. The data is encrypted locally, 2 becomes 22 and 3 becoming 33. The encrypted numbers are sent to the server where the encrypted numbers are added together. The server then returns the encrypted answer of 55. It is then decrypted locally to reveal the final answer of 5.
  44.  
  45.  
  46. On his blog site, Craig Stuntz offers another layman’s explanation of homomorphic encryption, allowing me to better grasp the concept. He included the following diagram:
  47.  
  48.  
  49.  
  50.  
  51. Mr. Stuntz adds:
  52.  
  53. “It just so happens that in this case the homomorphic concatenation (concatenating the two fragments of cipher text) is the same operation as the non-homomorphic concatenation (concatenating two fragments of plaintext). This is not always the case.
  54.  
  55.  
  56. What is important is that we can perform some operation on the input cipher text which will produce new cipher text that, when decrypted, will produce output plain text corresponding to a desired operation on the input plain text.”
  57.  
  58. Not quite that simple
  59. It’s not hard to see that there’s a lot going on under the hood or glove box and I won’t pretend to understand it. What’s more, many brilliant people have tried over the past three decades to get this to work. All failed. Experts were starting to wonder if it was possible — even Dr. Rivest.
  60. A solution
  61. I wasn’t able to ask Mr. Gentry how he discovered the answer. But, Andy Greenberg of Forbes Magazine was. Here’s the scoop on the problem and how Mr. Gentry overcame it:
  62. “Gentry’s fully homomorphic revelation came to him as he sat in a New York City cafe that summer. The encryption method that intrigued him allows a few multiplications or additions of encrypted data. But it suffers from an interesting handicap.
  63.  
  64.  
  65. Every arithmetic step unavoidably introduces small amounts of error into the encrypted data. Performing just a dozen or so computations corrupts the data to the degree that it can no longer be accurately decrypted.
  66.  
  67.  
  68. Gentry’s insight was to double-encrypt the data in such a way that the errors could be removed, so to speak, in the dark.
  69.  
  70.  
  71. By periodically unlocking the inner layer of encryption underneath an outer layer of scrambling, the cloud computer would clean up its messes as it went along, without ever seeing the secret data.
  72.  
  73.  
  74. It took Gentry another 15 minutes to realize that he’d just solved an epic cryptographic problem.”
  75.  
  76. Not ready for prime time
  77. Like all good things, putting homomorphic encryption into play will take time. And, there are some steep obstacles to overcome, one being the intense computational requirements. Gentry estimates that adding homomorphic encryption to a simple search would increase the effort a trillion times.
  78. Still, experts appear confident. Like the four-minute mile, once a barrier is broken, the flood gates tend to open presenting all sorts of possibilities. In fact, Mr. Gentry already has a new and improved version, but it’s under wraps until he publishes.
  79.  
  80. It’s a big deal
  81. Others see the potential of homomorphic encryption. Recently, DARPA announced a 20-million-dollar research project to solve the cryptographic problems, already awarding the research company Galois five million dollars.
  82. I also wanted to mention that Craig Gentry has been awarded the Association for Computing Machinery’s (ACM) Grace Murray Hopper Award. Never heard of the award? Well, Steve Wozniak and Bob Metcalfe are fellow recipients. Both managed to make serious dents in the computing world.
  83.  
  84. Final thoughts
  85. I’m having trouble deciding: Is homomorphic encryption really a game changer? Like this year’s tornado season, it seems that time and conditions are ripe for some disruptive technology. Stay tuned.
Add Comment
Please, Sign In to add comment