Homomorphic Cryptography Presented By MUSTAFA SAAD MOHAMMED
What Is Encryption ? Encryption Is encoding messages or information with a key in such a way that only authorized parties can read it. Used to protect data in transit.
How It Works ? Party A Party B Traditional Encryption Plain Text Cipher Text key
Problem With Traditional Encryption ? Party A Party B Data needs t o b e d ecrypted Whenever we have to perform any computation on the data.
Problem With Traditional Encryption ? Party A Party B What If Party A does not t rusts Party B, with its confidential data. ?
Homomorphic Encryption Party A Party B Party B does NOT requires the secret key for answering this query from A
Homomorphic Encryption Homomorphic : describes the transformation of one data set into another while preserving relationships between elements in both sets. Homomorphic is a Greek word for " same structure “. D ata in a H omomorphic encryption scheme retains the same encrypted structure.
Homomorphic Encryption Definition : A crypto-system that allows another party to perform operations on cipher text(Encrypted Text) without having knowledge of your secret key/Password. So if X1 and X2 are two numbers , E(X1) and E(X2) represents the encryption of these numbers with a secret key, another party would be able to compute E(X1 + X2) or E(X1 * X2) without knowing the secret key.
Advantages Increased Security of offshore data, While computing on it. Guarantees confidentiality of user data. Will make distributed computing secure.
Applications Encrypted Query Processing on an offshore server : MIT CryptDB It works by executing SQL queries over encrypted data. Support six basic functions: Addition, multiplication, greater than, equality, search, and nesting these functions which are used to run Database queries. User Offshore Server
Applications Building secure voting systems : Solves the tally problem with online votes. Protection Of proprietary Algorithms : eg can be used by Stock Market Analysts to protect their algorithms. Everyday Usage Where You need to send your confidential data to another computer. For example you have to convert your confidential pdf document to another format (doc ) using an online service. You want to search something on Google without letting G oogle know what you are searching. Spam Filtering – in Encrypted Mail.
Applications One of most expensive part of the MRI (Magnetic resonance imaging )machine is the chip which the machine uses to analyzes the magnetic resonance data. If an MRI maker could centralize MRI data computing It could Reduce the cost of MRI
Current Research Companies like Fujitsu Laboratories (Japan) and IBM are moving forward with practical testing of this technology with a goal of commercial applications in 2015.