Table of Contents Table of Contents
Previous Page  56 / 64 Next Page
Information
Show Menu
Previous Page 56 / 64 Next Page
Page Background

56

S T E M I N C U R R E N T E V E N T S

Theanswermight lie ina technology that

allows users to interact with encrypted

data without actually deciphering the

encryptedfile.For example,a third-party

couldperformcomputations onencrypt-

ed data, such as the sales numbers or

projections of a company,without seeing

the actual numbers involved.While that

may sound impossible, the problemmay

have been solved by research student

Craig Gentry. Gentry applied a math-

ematical model to help make this type

of encryption a reality. In its simplest

form, a coded document is translated

into a formusable by a third party.Once

the third party performs its analysis or

calculations, that information is trans-

lated back into a form applicable to the

original document.While themathemat-

ics can be overwhelming, the result is

that documents can remain encrypted

and yet still be available for processing;

documents can remain in the “safe” and

yet still be “read” by others.

If this works, then medical files could be

sent to other doctors and hospitals without patient privacy con-

cerns. Financial documents could be analyzed without revealing

any“insider”information.Everything fromvoting records to search

engine inputs could eventually operate under an additional layer

What Is a

Hacker?

A hacker is someone who accesses

computer systems without authori-

zation. Typically, this involves using

programming designed to defeat

computer defenses. While hackers

are not always malicious—some are

simply kids or programmers out for

the equivalent of a joyride—hacking

has become a dark and growing

industry, with hundreds of billions

of dollars of trade theft occurring

every year. Attacks on individuals

often target passwords, financial

information, and other private data.

Corporate websites are regularly

hacked in

denial-of-service

attacks

or in attempts to steal

corporate secrets. Government

servers are prized targets, especially

of foreign hackers, as they contain

sensitive national secrets. Advanced

mathematical encryption models

are used to help defend against

hackers, but no system yet created is

entirely bulletproof.