Anyone with a moderate amount of skill can intercept Internet mail

messages and private web pages to see what they say; can modify

messages in transit, changing their content without any trace; and

can send fake messages that are indistinguishable from legitimate

messages. Cryptography responds to these threats by scrambling and

unscrambling packets to protect against forgery and against

espionage. An attacker who forges a message can't scramble it in the

right way; when legitimate users' computers unscramble the message,

they see that it's a forgery and that it should be thrown away. An

attacker who intercepts a scrambled credit-card number can't figure

out the original number.

Unfortunately, cryptography is often too slow to deploy on busy

network servers. Widely used web sites such as google.com and

livejournal.com have installed all the necessary cryptographic

software but use it for only a small fraction of their web pages.

When a user tells his web browser to make a cryptographically

protected connection to www.google.com, Google redirects the

browser to www.google.com, turning off the cryptography!

Similar comments apply to SMTP (mail), DNS (name lookup), and other

Internet protocols: even when the necessary cryptographic software

has been written and installed, users are often forced to disable or

limit the software so that their computers are not overloaded. This

research responds by producing new speed records for the

cryptographic operations needed to protect the Internet. These

speedups allow cryptography to handle a larger fraction of the total

volume of Internet communication, reducing the Internet's overall

exposure to attack.

Project Start
Project End
Budget Start
2007-09-01
Budget End
2012-08-31
Support Year
Fiscal Year
2007
Total Cost
$400,000
Indirect Cost
Name
University of Illinois at Chicago
Department
Type
DUNS #
City
Chicago
State
IL
Country
United States
Zip Code
60612