Difference between revisions of "Indistinguishability Obfuscation"

From MgmtWiki
Jump to: navigation, search
(Contexts)
(Contexts)
Line 3: Line 3:
 
A process that enables a computer program to hide not just collections of data but the inner workings of itself.
 
A process that enables a computer program to hide not just collections of data but the inner workings of itself.
  
==Contexts==
+
==Problems
First described in 2018 a program at UCLA<ref>Erica Klarreich, ''Computer Scientists Achieve the ‘Crown Jewel’ of Cryptography.'' Wired (2020-11-15) https://www.wired.com/story/computer-scientists-achieve-the-crown-jewel-of-cryptography/</ref> developed a technique considered prior to that to be impossible. An algorithm that could serve as the basis for nearly any imaginable type of cryptographic protocol.
+
* The ability of a computer program to hide its internal operations for view has be a goal, and a claim of many obfuscation methods for decades.
 +
* As soon as an obfuscation program was release, it as broken. Often within days of its release.
 +
* In 2001 the strongest form of obfuscation was proven to be impossible.
 +
==Contexts==  
 +
* First described in 2018 a program at UCLA<ref>Erica Klarreich, ''Computer Scientists Achieve the ‘Crown Jewel’ of Cryptography.'' Wired (2020-11-15) https://www.wired.com/story/computer-scientists-achieve-the-crown-jewel-of-cryptography/</ref> developed a technique considered prior to that to be impossible. An algorithm that could serve as the basis for nearly any imaginable type of cryptographic protocol.
 +
 
 +
=
  
 
==References==
 
==References==
  
 
[[Category: Cryptography]]
 
[[Category: Cryptography]]

Revision as of 08:11, 27 November 2021

Full Title or Meme

A process that enables a computer program to hide not just collections of data but the inner workings of itself.

==Problems

  • The ability of a computer program to hide its internal operations for view has be a goal, and a claim of many obfuscation methods for decades.
  • As soon as an obfuscation program was release, it as broken. Often within days of its release.
  • In 2001 the strongest form of obfuscation was proven to be impossible.

Contexts

  • First described in 2018 a program at UCLA[1] developed a technique considered prior to that to be impossible. An algorithm that could serve as the basis for nearly any imaginable type of cryptographic protocol.

=

References

  1. Erica Klarreich, Computer Scientists Achieve the ‘Crown Jewel’ of Cryptography. Wired (2020-11-15) https://www.wired.com/story/computer-scientists-achieve-the-crown-jewel-of-cryptography/