Category Archives: Cryptography

Unexpected Consequences of P ≠NP

Philip Maymin, Markets are Efficient if and Only if P = NP.

I prove that if markets are efficient, meaning current prices fully reflect all information available in past prices, then P = NP, meaning every computational problem whose solution can be verified in polynomial time can also be solved in polynomial time. I also prove the converse by showing how we can “program” the market to solve NP-complete problems. Since P probably does not equal NP, markets are probably not efficient. Specifically, markets become increasingly inefficient as the time series lengthens or becomes more frequent. An illustration by way of partitioning the excess returns to momentum strategies based on data availability confirms this prediction.

But if P = NP then that’s it for most of modern cryptography, especially public/private key encryption. We’ll have to send giant one-time pads to each other before we can have secure communications.

So it turns out (if this paper is correct) that the choice is not (national) security or privacy. It’s market efficiency or (data) security and privacy.

Then again, it’s hardly news that markets fail. Look outside your window.

Posted in Cryptography, Econ & Money | 8 Comments

Bitcoin is Subject to Traffic Analysis

Bitcoin is not securely anonymous. The publication of all spends creates a data pool that allows a motivated monitor to infer money flow facts about some users, and given the small number of key intermediaries would allow them to infer even more.

This is a straight-forward passive analysis of public data that allows us to de-anonymize considerable portions of the Bitcoin network. We can use tools from network analysis to visualize egocentric networks and to follow the flow of Bitcoins. This can help us identify several centralized services that may have even more details about interesting users. We can also apply techniques such as community finding, block modeling, network flow algorithms, etc. to better understand the network.

An Analysis of Anonymity in the Bitcoin System: Bitcoin is not Anonymous. Spotted via Slashdot, Bitcoin Is Not Anonymous.

Posted in Cryptography | Comments Off on Bitcoin is Subject to Traffic Analysis

Telex, Coming to a Planet Near You

James Grimmelmann’s neat description of the Telex project and its implications is the most interesting thing I’ve read today this week this fortnight in some time.

Must reading for anyone interested in crypto policy, free speech, or internet freedom generally.

Posted in Cryptography, Internet, Law: Free Speech | Comments Off on Telex, Coming to a Planet Near You

Crypto: The Sky Did Not Fall

In Wiretapping and Cryptography Today Matt Blaze looks at the latest 2010 U.S. Wiretap Report and discusses why, despite all the predictions of doom we heard about strong crypto 15 years ago, in fact crypto has basically no effect at all on law enforcement ability to pursue an ever-increasing number of wiretaps:

the latest wiretap report identifies a total of just six (out of 3194) cases in which encryption was encountered, and that prevented recovery of evidence a grand total of … (drumroll) … zero times. Not once. Previous wiretap reports have indicated similarly minuscule numbers.

What’s going on here? Shouldn’t all this encryption be affecting government eavesdroppers at least a little bit more than the wiretap report suggests? Do the police know something about cryptanalysis that the rest of us don’t, enabling them to effortlessly decrypt criminal messages in real time without batting an eye? Is AES (the federally-approved algorithm that won an open international competition for a new standard block cipher in 2001) part of an elaborate conspiracy to lull us into a sense of complacency while enabling the government to secretly spy on us? Perhaps, but the likely truth is far less exciting, and ultimately, probably more comforting.

The answer is that faced with encryption, capable investigators in federal and local law enforcement have done what they have always done when new technology comes around: they’ve adapted their methods in order to get their work done.

Remember this the next time an earnest government official explains why they just have to store all your online communications for a couple of years.

Posted in Cryptography, National Security | Comments Off on Crypto: The Sky Did Not Fall

Bitcoin Compared Unfavorably to Game Currency

Edward Castronova, the leading economist of online gaming, writes that “Experience with game currencies makes me skeptical about Bitcoin“.

Game currencies are good currencies. What are the features of those currencies?

  • You get money only by doing things that can be interpreted as “productive work.” No freebies or handouts, and nothing abstract. You don’t solve puzzles to get coin, you run FedEx quests. 
  • Mild inflation. As in the real world, mild inflation makes people happiest. Small enough to be unnoticeable in the short run, yet gives people a sense over time that their wealth and power is rising (even if it isn’t). 
  • It assumed that the currency will be hacked and exploited. A strong central authority is in place to seize illicit funds and roll back damage.

Bitcoins don’t have these features.

One thing, though: the last point is probably not consistent with strong anonymity. If you think that’s a valuable part of your coin model, you usually have to pay a price on the repudiation front.

Posted in Cryptography, Econ & Money | 6 Comments

Microsoft Seeks Patent for Skype-Bugging Application

I got interviewed for this article on Microsoft seeks patent for spy tech for Skype
‘Legal Intercept’ would allow it to silently record VoIP communications
, and said a few things.

Posted in Cryptography, Internet, The Media | Comments Off on Microsoft Seeks Patent for Skype-Bugging Application