• Subscribe

At Science Node, we need your help. We have ALMOST reached our fund-raising goal. In order to maintain our independence as a source of unbiased news and information, we don’t take money from big tech corporations. That’s why we’re asking our readers to help us raise the final $10,000 we need to meet our budget for the year. Donate now to Science Node's Gofundme campaign. Thank you!

The future of encryption

Speed read
  • More and more of our data is stored up in the cloud — how can we trust its safety?
  • NSF-supported researchers are working to develop forward-thinking encryption technologies.
  • Craig Gentry came up with the concept of fully homomorphic encryption that processes data without decrypting it.

If you want to protect valuable information, wouldn't you keep it under lock and key?

Today, modern encryption uses 'keys' to safeguard data on our computers, mobile devices, and communication networks. Encryption converts data into digital gibberish, so it can't be used maliciously. If the message recipient has the right keys, then the data can be decrypted for processing by a computer or mobile device.

But even encrypted data can sometimes be intercepted and accessed. So how can we keep our data safe?In 2010, Craig Gentry, a graduate student supported by the US National Science Foundation (NSF), thought of a new way to protect data. He called it fully homomorphic encryption: a way to process data without ever decrypting it. Courtesy Amina Khan, NSF.

Fully homomorphic encryption

In 2010, Craig Gentry, a graduate student supported by the US National Science Foundation (NSF), thought of a new way to protect data. He called it fully homomorphic encryption — a way to process data without ever decrypting it.

To explain this concept, he invented an imaginary character named Alice who owns a jewelry store. Alice doesn't trust her staff with her expensive gems, so she gets an impenetrable box. Only she has the key.

When Alice wants her employees to make a new piece of jewelry, she locks the materials inside the box and hands it off to her workers. Using special gloves, employees can work on the gems inside the box, but can't get them out.

Once the work is done, Alice opens the box with her key and takes out the finished jewelry. In this way, her workers process raw materials into jewelry without ever truly having access to the materials themselves.

Fully homomorphic encryption basically does the same thing. As data and computation move to the cloud, fully homomorphic encryption would allow your data to be processed without your ever having to allow access to it. For instance, a web application could process your tax return's encrypted financial information without actually seeing any of it.

Cryptographers, including Gentry, are still figuring out how to turn the idea of homomorphic encryption into a practical reality.

Other new approaches to cryptography

Fully homomorphic encryption isn't the only forward-looking cryptographic protocol that researchers are exploring. The NSF is supporting several active areas of study:

  1. 'Honey encryption,' where wrong guesses of the key produce information that looks accurate but isn't
  2. 'Functional encryption,' where restricted secret keys enable a key holder to learn about only a specific function of encrypted data and nothing else
  3. 'Quantum key encryption,' where the quantum nature of atoms protects the data

The goal of all of this research is that one day, it will be possible to ensure security of important information wherever it might be — on our computers, mobile devices, and even in the cloud.

With so much of our information now stored or processed in the cloud, how can we make sure it’s safe from unauthorized access? The US National Science Foundation is funding researchers looking for answers to cyber-security challenges and exploring the future of encryption. The goal is that, one day, we will be able to ensure the security of important information wherever it may be: on our computers, mobile devices, and even in the cloud. Courtesy Amina Khan.

Join the conversation

Do you have story ideas or something to contribute? Let us know!

Copyright © 2019 Science Node ™  |  Privacy Notice  |  Sitemap

Disclaimer: While Science Node ™ does its best to provide complete and up-to-date information, it does not warrant that the information is error-free and disclaims all liability with respect to results from the use of the information.


We encourage you to republish this article online and in print, it’s free under our creative commons attribution license, but please follow some simple guidelines:
  1. You have to credit our authors.
  2. You have to credit ScienceNode.org — where possible include our logo with a link back to the original article.
  3. You can simply run the first few lines of the article and then add: “Read the full article on ScienceNode.org” containing a link back to the original article.
  4. The easiest way to get the article on your site is to embed the code below.