/var/www/vhosts/ziare/news//boxes/box1.php Keys for multiple items - News, Technology, Space, Science - Breaking News and interesting stories
 
   
 

 
 

 Fresh articles

» IOS6 news and fixes
» Strange Martian crater
» 100 Petabits per second
» Artificial life created
» Space rock contains organic molecular feast
» 10 Failed Doomsday Predictions
» Universal phone charger
» Moon buildings
» Epassports RFID danger
» 500Gb optical

 
 

 
 

 Index

Sexy things-> Sexy things (4)
Bulk-> Bulk (15)
Technology-> Technology (42)
Space-> Space (35)
UFO-> UFO (5)
Funny-> Funny (4)
Earth Life-> Earth Life (9)
Internet-> Internet (10)
Health-> Health (1)

 
 

 
 

 Most popular

»X-ray
» Google unifies search results
»Google under water
»Moon buildings
»500Gb optical
»Scientists Levitate Small Animals
»Jet stream is weakening
»Orion new nasa vehicle
»Saturns moon like ocean floor
»How Cells Store Fat

 
 

 
 

 Other articles

»Jupiter details
»Laptop best battery
»Saturns moon like ocean floor
»Asteroid 2036
»Crop with Google Earth
»10 Failed Doomsday Predictions
»Mercury detailed images
»China aims to map the Moon
»Google under water
»No internet
»Play Video Game Just By Thinking
»ASA Orbiter Reveals New Details of Mars, Young and Old
»Honda first hydrogen cars
»Pressure on Yahoo
»How Cells Store Fat
»Bright Idea: Light Bulb Burns Away Tumors
»Jupiter stripes changes
»Viruses on food
»Universal phone charger
»Youtube still growing

 
 


Number keys promise safer data

The system hinges on multiple keys for multiple items
Sensitive computer files are to become both more secure and more flexible thanks to advanced mathematics.

Mathematicians at the University of California in Los Angeles have applied a fundamental rethink to improve the "one lock - one key" method that current encryption technologies such as RSA and AES operate on.

Amit Sahai, associate professor at UCLA, told BBC World Service's Digital Planet programme that they had decided to "rebuild the idea from the ground up," and developed the idea of multiple keys giving access to selected pieces of data.

"In our vision, we'll have some data that can be locked - but now that one lock is openable by many different keys in many different ways," he explained.

Key management

Currently, when information is encrypted, it is secured with a digital lock and key created together.

While this works well for individual computers, it presents problems on an industrial scale because company data has to be stored on large servers and accessed by large numbers of people.

The UCLA mathematicians point out that this leads to a big problem in terms of key management.

"That key management problem, of needing so many different keys to have access to all the files they should be able to have access to... is so complicated that they just don't use encryption," Dr Sahai said.

"Encryption is essentially not used by most large corporations, and to the extent that it is used, it is used incorrectly or in a silly way."

And in many systems, the key is put on the same server that holds the encrypted data.

Doctor examining x-ray
Access to medical records could become much more sophisticated
"If a hacker is able to break into that server, he not only gets the encrypted data, he gets the key that opens that data. So what's the point?" Dr Sahai said.

He said that a good example of how his system could work is a person's medical records. Whereas currently access to the records is on an all-or-nothing basis, the advanced encryption would allow different amounts of access according to a person's relation to the patient.

Dieticians would be able to see blood sugar levels, while oncologists can see cancer reports.

"Similarly, many different people - depending on who they are and what their position is - should be able to access many different aspects of my medical records," Dr Sahai said.

"What we want to do - and what we've done, to some extent - is to have a mathematical encryption scheme where you encrypt your medical record once, and then different people with different keys can open it in different ways."

Engineering

Doing this with existing technology would mean all different aspects of data would have to be separately encrypted.

Meanwhile, Dr Sahai said that the "clever thing" about his system was that it was approached the problem using maths, rather than just as a data problem.

"We're trying to take some of the very difficult job that we give to the security engineer and actually put it into the mathematics itself," he said.

"Once you have this kind of expressibility in the mathematics itself, it makes the job of the security engineer that much easier - because the mathematics is protecting you."
 Read this article Email this article

Article © News, Technology, Space, Science - Breaking News and interesting storiesShare


 
 
 
 

You need to login first



Satellite Shooted down

 
  Did you know?...

- Women in ancient Egypt prevented pregnancy with
plugs made of crocodile droppings?

- Based on artifacts and cave paintings, Ice Age women were likely to enjoy sex as much as their male mates?

- In 2005, the average first time for US girls occurred at the age of 17?

- Known aphrodisiacs of the food world include chocolate, oysters and spicy foods?

- That females have a weaker sex drive than men is a  cultural misconception?

- The most common sexual problem among men is premature ejaculation?

- It is a common misconception that pregnancy can’t occur without male orgasm?

- Whether put to use or not, males produce about 300 million sperm every day?
 
 

 
 

 Visit:

CNN Page

NASA Page

BBC UK

Google News

World of Warcraft News

Romanian Web Hosting

Romanian Domain Registrar

.BIZ Domain Registrar

Advertising

Funny Things

Golden Sands Bulgary

Web Hosting News

Web Hosting Romania

Gadgets Resources

Top Video Games Online
 
 




Members

Username
Password:

[New account] [Forgoten password]


 
 

Keyword:

 
 

©27-Apr-2024