Skip to Main Content
Boston University
  • Bostonia
  • BU Today
  • The Brink
  • University Publications

    • Bostonia
    • BU Today
    • The Brink
  • School & College Publications

    • The Record
Other Publications
BU Today
  • Sections
News, Opinion, Community

The safety of fuzzy secrets

NSF awards $400,000 to take cryptography to next level

March 17, 2006
  • Chris Berdik
Twitter Facebook
Leo Reyzin was rewarded for thinking outside of the cryptographic box.

Every day, millions of Americans log into “secure” Web pages and computer databases — from personal e-mail to bank accounts to corporate files — using passwords that are amalgamations of initials, birthdays, and the names of pets or children. If it’s a particularly important or complex password, they may write it down, as 64 percent of respondents in a 2003 survey by SearchSecurity.Com said they did.

All this makes for a very insecure world of computer-stored data, according to Leonid Reyzin, a College of Arts and Sciences assistant professor of computer science and a cryptographer. “The problem with passwords is that there’s an inherent conflict between a secure password and an easy-to-remember password, and you want both,” says Reyzin.

He argues that attaining real computer security requires a new approach to cryptography, and the National Science Foundation (NSF) agrees. It has awarded Reyzin a 2006 CAREER Award, $400,000 over the next five years, to pursue a collection of research initiatives titled Cryptography Outside the Box. Some of Cryptography Outside the Box will attempt to improve “cryptographic models,” the mathematical approximations of real-world computer-user and hacker habits and capabilities, which are used to prove, mathematically, that a particular computer security program works.

Traditionally, says Reyzin, these models make certain assumptions that just don’t hold up to reality. For instance, the models often falsely assume that computers themselves are “black boxes,” where, as Reyzin puts it, “whatever is computed inside doesn’t leak information until it’s sent out somewhere [such as the Internet].”

Unfortunately, research has shown that a hacker can discover secret, multidigit security keys just by measuring the electromagnetic radiation, power usage, and computation time of a computer running an encryption program. Another unrealistic assumption of cryptographic models is that computer users have access to perfectly random security keys that they can carry with them and recall at will and that are never stolen.

“That is, of course, very difficult to implement in real life,” says Reyzin. “We all know that we don’t actually carry around 60-digit secret keys. At best, we carry around some tiny little passwords in our heads that are not much good for security.” “Passwords are so easily guessed because we’re forcing [computer] users to remember them and remember them precisely,” he adds. He thinks a better solution might be so-called “fuzzy secrets,” such as answers to questionnaires, key stroke timing, or mouse-drawn sketches, which are not so easily guessed but allow for a certain degree of inexactness.

Consequently, turning fuzzy secrets into workable cryptographic tools is another focus of Cryptography Outside the Box. “There are many things that we as humans can remember very well, but not precisely,” Reyzin says. Fuzzy secrets can also include biometric measurements such as fingerprints and iris scans, which are very close but never exactly the same from measurement to measurement. While the secrets may be fuzzy, the potential payoff of better computer security is crystal clear.

According to the 2005 Computer Crime and Security Survey, conducted by the FBI and the San Francisco–based Computer Security Institute, 56 percent of surveyed companies, nonprofits, and government offices experienced a computer security breach in the past year, up from 53 percent in 2004, equaling an average loss of $204,000 per respondent. And the need for more security will only increase with the growing number of portable, and networked, computing devices, which are easily lost or stolen.

It was Edgar Allen Poe, with his keen interest in ciphers and enigmas, who predicted that “human ingenuity cannot concoct a cipher which human ingenuity cannot resolve.” Reyzin is optimistic that modern cryptography may eventually break that cycle.

“We’re starting to chip away at that idea that cryptography is sort of a cat-and-mouse game that continues forever,” he says, by proving the mettle of security tools with mathematical precision. Still, he admits, “[While a mathematical] proof is comforting, it’s only as good as how well the real world matches your model.”

 

Explore Related Topics:

  • Computers
  • Global
  • Share this story

Share

The safety of fuzzy secrets

Share

  • Twitter
  • Facebook
  • Reddit
  • LinkedIn
  • Email
  • Chris Berdik

    Chris Berdik Profile

Latest from BU Today

  • Music

    Drumroll, Please, for CFA’s Gareth Smith

  • JUNETEENTH

    Celebrating Juneteenth Around Boston

  • University News

    BU Backs Lawsuit to Halt Cuts to Department of Defense Research Funding

  • Obituaries

    Minnesota State Representative Melissa Hortman, a Boston University Alum, Shot and Killed Along with Her Husband

  • EDUCATION

    The Power of the Middle School Years

  • Film & TV

    From Superman to F1, Expect a Summer of Blockbusters

  • Social Media

    YouTube Is the Latest Media Platform to Loosen Content Moderation. What Does That Mean for Users?

  • Wellness

    In Honor of Father’s Day, 5 Foods That All Men Need in Their Diet

  • University News

    Supporting Boston University’s International Community—Q&A with President Melissa Gilliam and Willis Wang, Head of Global Operations

  • University News

    BU Joins 23 Universities in Backing Harvard’s Court Case Over Research Funding and Government Control

  • Books

    15 Books to Celebrate Pride Month

  • Things-to-do

    To Do Today: GroundBeat Concert Series

  • Social Media

    Through Instagram, BU Deaf Studies Empowers the Deaf Community

  • Things-to-do

    To Do Today: Start a Garden with Boston Public Library’s Seed Library

  • Student Life

    Your Guide to LGBTQIA+ Resources at Boston University and Beyond

  • LOCAL WEATHER

    We’ve Had 12 Consecutive Weekends of Rain. What’s Up with That?

  • Things-to-do

    To Do Today: Museum of Fine Arts First Friday

  • University News

    BU Data Platform Will Help Massachusetts Track, and Work to Close, Wage Gaps

  • Things-to-do

    To Do Today: Hello, Dolly! at the Lyric Stage Boston

  • Things-to-do

    To Do Today: Jimmy Fund Scooper Bowl to Support Cancer Care and Research

Section navigation

  • Sections
  • Must Reads
  • Videos
  • Series
  • Close-ups
  • Archives
  • About + Contact
Get Our Email

Explore Our Publications

Bostonia

Boston University’s Alumni Magazine

BU Today

News, Opinion, Community

The Brink

Pioneering Research from Boston University

  • Twitter
  • Facebook
  • Youtube
  • LinkedIn
  • Instagram
  • Weibo
  • TikTok
© Boston University. All rights reserved. www.bu.edu
© 2025 Trustees of Boston UniversityPrivacy StatementAccessibility
Boston University
Notice of Non-Discrimination: Boston University prohibits discrimination and harassment on the basis of race, color, natural or protective hairstyle, religion, sex or gender, age, national origin, ethnicity, shared ancestry and ethnic characteristics, physical or mental disability, sexual orientation, gender identity and/or expression, genetic information, pregnancy or pregnancy-related condition, military service, marital, parental, veteran status, or any other legally protected status in any and all educational programs or activities operated by Boston University. Retaliation is also prohibited. Please refer questions or concerns about Title IX, discrimination based on any other status protected by law or BU policy, or retaliation to Boston University’s Executive Director of Equal Opportunity/Title IX Coordinator, at titleix@bu.edu or (617) 358-1796. Read Boston University’s full Notice of Nondiscrimination.
Search
Boston University Masterplate
The safety of fuzzy secrets
0
share this
loading Cancel
Post was not sent - check your email addresses!
Email check failed, please try again
Sorry, your blog cannot share posts by email.