Skip to Main Content
Boston University
  • Bostonia
  • BU-Today
  • The Brink
  • University Publications

    • Bostonia
    • BU-Today
    • The Brink
Other Publications
BU-Today
  • Sections
News, Opinion, Community

The safety of fuzzy secrets

NSF awards $400,000 to take cryptography to next level

March 17, 2006
  • Chris Berdik
Twitter Facebook
Leo Reyzin was rewarded for thinking outside of the cryptographic box.

Every day, millions of Americans log into “secure” Web pages and computer databases — from personal e-mail to bank accounts to corporate files — using passwords that are amalgamations of initials, birthdays, and the names of pets or children. If it’s a particularly important or complex password, they may write it down, as 64 percent of respondents in a 2003 survey by SearchSecurity.Com said they did.

All this makes for a very insecure world of computer-stored data, according to Leonid Reyzin, a College of Arts and Sciences assistant professor of computer science and a cryptographer. “The problem with passwords is that there’s an inherent conflict between a secure password and an easy-to-remember password, and you want both,” says Reyzin.

He argues that attaining real computer security requires a new approach to cryptography, and the National Science Foundation (NSF) agrees. It has awarded Reyzin a 2006 CAREER Award, $400,000 over the next five years, to pursue a collection of research initiatives titled Cryptography Outside the Box. Some of Cryptography Outside the Box will attempt to improve “cryptographic models,” the mathematical approximations of real-world computer-user and hacker habits and capabilities, which are used to prove, mathematically, that a particular computer security program works.

Traditionally, says Reyzin, these models make certain assumptions that just don’t hold up to reality. For instance, the models often falsely assume that computers themselves are “black boxes,” where, as Reyzin puts it, “whatever is computed inside doesn’t leak information until it’s sent out somewhere [such as the Internet].”

Unfortunately, research has shown that a hacker can discover secret, multidigit security keys just by measuring the electromagnetic radiation, power usage, and computation time of a computer running an encryption program. Another unrealistic assumption of cryptographic models is that computer users have access to perfectly random security keys that they can carry with them and recall at will and that are never stolen.

“That is, of course, very difficult to implement in real life,” says Reyzin. “We all know that we don’t actually carry around 60-digit secret keys. At best, we carry around some tiny little passwords in our heads that are not much good for security.” “Passwords are so easily guessed because we’re forcing [computer] users to remember them and remember them precisely,” he adds. He thinks a better solution might be so-called “fuzzy secrets,” such as answers to questionnaires, key stroke timing, or mouse-drawn sketches, which are not so easily guessed but allow for a certain degree of inexactness.

Consequently, turning fuzzy secrets into workable cryptographic tools is another focus of Cryptography Outside the Box. “There are many things that we as humans can remember very well, but not precisely,” Reyzin says. Fuzzy secrets can also include biometric measurements such as fingerprints and iris scans, which are very close but never exactly the same from measurement to measurement. While the secrets may be fuzzy, the potential payoff of better computer security is crystal clear.

According to the 2005 Computer Crime and Security Survey, conducted by the FBI and the San Francisco–based Computer Security Institute, 56 percent of surveyed companies, nonprofits, and government offices experienced a computer security breach in the past year, up from 53 percent in 2004, equaling an average loss of $204,000 per respondent. And the need for more security will only increase with the growing number of portable, and networked, computing devices, which are easily lost or stolen.

It was Edgar Allen Poe, with his keen interest in ciphers and enigmas, who predicted that “human ingenuity cannot concoct a cipher which human ingenuity cannot resolve.” Reyzin is optimistic that modern cryptography may eventually break that cycle.

“We’re starting to chip away at that idea that cryptography is sort of a cat-and-mouse game that continues forever,” he says, by proving the mettle of security tools with mathematical precision. Still, he admits, “[While a mathematical] proof is comforting, it’s only as good as how well the real world matches your model.”

 

Explore Related Topics:

  • Computers
  • Global
  • internet
  • Share this story

Share

The safety of fuzzy secrets

Share

  • Twitter
  • Facebook
  • Reddit
  • LinkedIn
  • Email
  • Print

Latest from BU Today

  • Varsity Sports

    Women’s Basketball Advances to Patriot League Semifinals for First Time

  • Student Life

    Terriers in Charge: Elizabeth Slade (ENG’20)

  • Varsity Sports

    Men’s Basketball Terriers Go Head-to-Head with Colgate in Patriot League Championship Wednesday in New York

  • University News

    BU Puts Plan for Remote Learning in Place if Coronavirus Forces Campus Closure

  • Student Life

    Terriers in Charge: Valerie Nam (Sargent’20)

  • Varsity Sports

    BU Men’s Basketball Advances to Patriot League Semifinals, Hosts Bucknell Sunday

  • Fine Arts

    Accurate Art

  • Things-to-do

    Spring Break in Boston? There’s Lots on Offer

  • Varsity Sports

    Men’s Lacrosse Hungry to Take Program to Next Level

  • Campus Life

    BU Suspends Out-of-State Alternative Service Break Trips as Coronavirus Spreads

  • Student Clubs

    What’s New, What’s Hot on WTBU

  • Voices & Opinion

    POV: We Need Unemployment Insurance to Protect Workers and the Economy from Coronavirus

  • In the City

    Getting to Know Your Neighborhood: Roxbury

  • Arts & Culture

    Creator and Cast of ABC’s A Million Little Things Visits BU Tomorrow, Will Screen Latest Episode

  • Varsity Sports

    Women’s Lacrosse Sees Offense as Key to a 2020 Patriot League Championship

  • Computational Science

    Game Changer: Azer Bestavros’ Journey from Egypt to Cambridge to BU’s Computing Mastermind

  • Coronavirus

    Explaining BU’s Coronavirus Plan

  • Construction

    Private Development Project Advances Albany Street Makeover

  • University News

    BU Launches Coronavirus Website

  • Politics

    Video: Students on the Issues That Matter Most to Them in the 2020 Presidential Election

Section navigation

  • Sections
  • Must Reads
  • Videos
  • Series
  • Close-ups
  • Archives
  • About + Contact
Get Our Email

Explore Our Publications

Bostonia

Boston University’s Alumni Magazine

BU-Today

News, Opinion, Community

The Brink

Pioneering Research from Boston University

  • Twitter
  • Facebook
  • Youtube
  • Linked-In
© Boston University. All rights reserved. www.bu.edu
© 2025 Trustees of Boston UniversityPrivacy StatementAccessibility
Boston University
Notice of Non-Discrimination: Boston University policy prohibits discrimination against any individual on the basis of race, color, religion, sex, age, national origin, physical or mental disability, sexual orientation, gender identity, genetic information, military service, pregnancy or pregnancy-related condition, or because of marital, parental, or veteran status, and acts in conformity with all applicable state and federal laws. This policy extends to all rights, privileges, programs and activities, including admissions, financial assistance, educational and athletic programs, housing, employment, compensation, employee benefits, and the providing of, or access to, University services or facilities. See BU’s Equal Opportunity/Affirmative Action Policy.
Search
Boston University Masterplate
loading Cancel
Post was not sent - check your email addresses!
Email check failed, please try again
Sorry, your blog cannot share posts by email.
The safety of fuzzy secrets
0
share this