Can't Touch This--New Encryption Scheme Targets Transaction Tampering

An Estonia-based cybersecurity firm adopts a “blockchain” public ledger system to verify online transfers of sensitive information

Join Our Community of Science Lovers!

In August 1977 popular mathematician Martin Gardner introduced the concept of RSA cryptography in the pages of Scientific American. Developed by three researchers at Massachusetts Institute of Technology, the new algorithm would go on to dominate the securing of transactions over the Internet. Nearly four decades later, with cryptocurrencies and smart-device communications adding to a growing list of online transactions, the search is well underway for an even more secure and scalable replacements for RSA.

Conceived by Ron Rivest, Adi Shamir and Leonard Adleman, RSA cryptography enables Web users to conduct their business in relative privacy rather than having to send their sensitive information openly over the Internet. Enter your credit card into a Web site’s order form, for example, and that information is turned into a code that’s unreadable to anyone except for the vendor who processes your order.

A weakness with RSA, though, is that it was not designed to verify the identity of the person initiating the transaction. If someone were to intercept your online order and, say, change the information to have it shipped to a new address, it would be difficult for the vendor, or anyone, to know that the transaction had been tampered with until well after the fact. There is no way to authenticate you as the person who initiated the order, as opposed to the person who changed the shipping address. As Chris Christensen, an analyst at research firm IDC, put it in a 2006 paper (pdf) on the subject, “How does the receiver know that a message really came from the person who ‘signed’ it?”


On supporting science journalism

If you're enjoying this article, consider supporting our award-winning journalism by subscribing. By purchasing a subscription you are helping to ensure the future of impactful stories about the discoveries and ideas shaping our world today.


When looking at information stored in the cloud, transferred between smart devices—the basis for the “Internet of Things”—and managed by businesses, there is no way to know that data has not been changed, says Mike Gault, CEO of Guardtime. His Estonia–based cybersecurity firm aims to replace RSA’s signature algorithm with one that uses a different type of encryption as well as a public ledger—a so-called blockchain—that records all transactions.

Blockchains have gained notice of late for their role in securing transactions involving cryptocurrencies such as bitcoin. These digital public ledger systems record information—including time stamps and other data tags—for all transactions that have been deciphered and validated. Once a transaction is entered into the blockchain ledger, it cannot be deleted or changed. Blockchains would enable a vendor to verify that you were the person who sent an order or that a second alteration of an original communication was made, raising suspicion. They are also appealing from a security and privacy standpoint because they rely on information stored across a decentralized network of computers. There is no central repository for cyber attackers to target.

Guardtime’s authentication and signature protocol is called BLT, after the company cryptographers—Ahto Buldas, Risto Laanoja and Ahto Truu—who invented it. The company claims that, unlike RSA, its cryptographic scheme “cannot be efficiently broken” even if an attacker uses quantum-computing algorithms.

Replacing a venerable technology such as RSA is no easy task, so Guardtime has partnered with Swedish wireless-network equipment maker Ericsson, whose new cybersecurity offerings are based on BLT. Estonia has served as a test bed for Guardtime’s technology over the past few years. The Baltic nation relies heavily on the Internet for banking and other crucial day-to-day functions and is loath to see a repeat of the crippling cyber attack that paralyzed the country in 2007.

It’s Time to Stand Up for Science

If you enjoyed this article, I’d like to ask for your support. Scientific American has served as an advocate for science and industry for 180 years, and right now may be the most critical moment in that two-century history.

I’ve been a Scientific American subscriber since I was 12 years old, and it helped shape the way I look at the world. SciAm always educates and delights me, and inspires a sense of awe for our vast, beautiful universe. I hope it does that for you, too.

If you subscribe to Scientific American, you help ensure that our coverage is centered on meaningful research and discovery; that we have the resources to report on the decisions that threaten labs across the U.S.; and that we support both budding and working scientists at a time when the value of science itself too often goes unrecognized.

In return, you get essential news, captivating podcasts, brilliant infographics, can't-miss newsletters, must-watch videos, challenging games, and the science world's best writing and reporting. You can even gift someone a subscription.

There has never been a more important time for us to stand up and show why science matters. I hope you’ll support us in that mission.

Thank you,

David M. Ewalt, Editor in Chief, Scientific American

Subscribe