At the IEEE Security and Privacy Symposium held from May 22 to May 24, MIT researchers proposed a new encryption method that uses the underlying blockchain technology of Bitcoin to prevent identity theft and encryption attacks. MIT electrical engineering and computer science graduate student Alin Tomescu and his thesis advisor, Edwin Sibley Webster Professor Srini Devadas, released a paper on the technology at the event (download the full paper), proposing how bitcoin's immutable blockchain can be used to protect the data of individuals and corporate organizations. Essentially, the MIT team’s crypto attack defense method uses a Bitcoin-based detection system that alerts the network if a false encryption key attempts to undo the real encryption key. During a cryptojacking attack, an attacker breaks into a public key cryptographic system and convinces a user to reveal confidential information by proving a false encryption key. By using this encryption key, the attacker is able to break into the system and steal sensitive data and valuable information. The problem with this type of encryption attack is that because the wrong encryption key cannot cancel the real encryption key without triggering a system alarm, the system will usually have two encryption keys. This way, the system and the user will not know whether the real encryption key is being used to extract information. According to Devadas, the paper and the system developed by his MIT research team address this ambiguity in cryptographic attacks using the public bitcoin blockchain. The Bitcoin blockchain is immutable and decentralized in nature. To change the data set implemented by the Bitcoin blockchain, it is necessary to hack and modify the entire distributed ledger. Therefore, it is impossible to attack and modify the data set integrated in the Bitcoin block. Using the immutability of Bitcoin, the MIT research team has released a method to prevent online services from spoofing and using incorrect encryption keys. According to a paper drafted by two of the researchers, using Bitcoin will allow the system to prevent identity theft, and if this method is implemented on a commercial scale, it could help large companies save millions of dollars each year. Tomescu, first author of the paper, said:
The key element of the system, called Catena, is that it does not record all public keys authenticated by public key cryptography. Bitcoin transactions provide space for an 80-character text note, which is not enough to store all public keys. However, it can be used to store cryptographic signatures associated with those public keys. Bryan Ford, an associate professor of computer science at the Swiss Federal Institute of Technology, said the approach outlined in the paper is a practical idea that can be easily used and implemented. Ford said:
Disambiguation, in this case telling different things to different institutions, will lead to more secure algorithms, and Ford believes this is a very important issue. Full paper: Catena: Efficient Non-Ambiguity with Bitcoin. |
>>: Divorce on the blockchain? This company can help you do it
The facial features of a woman who will cling to ...
Palm reading is generally a very important part o...
Palm lines that indicate serious illness There is...
1. Protruding ears Men with protruding ears will ...
Earlier this year, cryptocurrency exchange Kraken...
Moles can affect a person's fortune. There ar...
Cryptocurrency miners are finding a new voice in ...
Original title: With violent ups and downs and co...
Men with fuller chins are better If a man has a f...
It is not good for a woman to have a mole on the ...
The corner of the eye is where our temple is loca...
Physiognomy is a kind of folk knowledge that pred...
Your wealth and marriage can be seen from your no...
In physiognomy, the mole of misery represents hav...
It is not easy for a beautiful woman to give birt...