DV Hardware bringing you the hottest news about processors, graphics cards, Intel, AMD, NVIDIA, ATi, hardware and technology!

   Home | News submit | News Archives | Reviews | Articles | Howto's | Advertise
 
DarkVision Hardware - Daily tech news
August 21, 2014 
Main Menu

Home
Info
News archives
Articles
Howto
Reviews
 

Who's Online
There are currently 113 people online.

 

Latest Reviews
Zowie P-TF Rough mousepad
Zowie FK mouse
BitFenix Ronin case
Ozone Rage ST headset
Lamptron FC-10 SE fan controller
ZOWIE G-TF Rough mousepad
ROCCAT Isku FX gaming keyboard
Prolimatech Magnetic Pin
 

RSS
RSS





 

IBM and Microsoft researchers to make software unhackable?

Posted on Wednesday, February 05 2014 @ 11:59:01 CET by


Researchers from IBM and Microsoft announced they've made a breakthrough in the quest for unbreakable cryptography. The team claims their new encryption algorithm could protect not just an output, but an entire program. This type of program obfuscation could lead to ultra-secure software that it very hard to hack.
The idea of obfuscating a program has been around for decades — software companies have tried all sorts of methods to distort their code in order to prevent others from seeing how it worked. However, the security and hacking communities have been able to defeat all these measures. Cryptographic experts have long been tinkering with stronger approaches, but it wasn’t until the most recent collaboration that the pieces started falling into place.

Cryptographers have been chasing the idea of a so-called “black box obfuscator” for years. The idea is that any program passed through the black box would be so fundamentally garbled that no one would be able to figure out how it worked or what secrets it might hold — only inputs and outputs would be visible, which is exactly what you want. This method could make communications almost completely secure. All you would need to do is create encryption keys with an obfuscated program, then make that program available to the other party — or everyone for that matter, since no one would be able to figure out the decryption key from examining the obfuscated program.
Full details at ExtremeTech.


 



 

DV Hardware - Privacy statement
All logos and trademarks are property of their respective owner.
The comments are property of their posters, all the rest © 2002-2014 DM Media Group bvba