.
AI_133px.jpg
ai
Artificial Intelligence
.
biotech
biotech
Biotechnology and Synthetic Biology
.
Lasers
Lasers
Lasers
.
materialscience
nano
Materials Science
.
neuroscience
neuroscience
Neuroscience
.
robotics
robotics
Robotics
.
semiconductor
semiconductors
Semiconductors

KEY TAKEAWAYS

•  Cryptography is essential for protecting information, but alone it cannot secure cyberspace against all threats.

•  Cryptography is the enabling technology of blockchain, which is the enabling technology of cryptocurrencies.

•  Central bank digital currencies (CBDCs) are a particular type of cryptography-based digital currency supported by states and one that could enhance financial inclusion. Although the United States lags some countries in experimenting with a CBDC, it may benefit from a cautious, well-timed approach by learning from other nations’ efforts.

Icons_card_Crypto.png

Overview

Cryptography refers to the mathematics of protecting data from being surreptitiously altered or accessed inappropriately. It is essential for most internet activity, including messaging, e-commerce, and banking. There are two main types of cryptography: symmetric and asymmetric. Symmetric cryptography requires both parties to share one secret key to encrypt and decrypt data. In practice, sharing this secret key can be difficult. This led to the development of asymmetric encryption, which uses one public key, freely available to anyone, to encrypt data and a different private key to decrypt data. Hashing is another cryptographic method that generates a unique fixed-length string of numbers for a given input. Through the combination of hashing and other techniques, cryptography also enables identity verification and allows a recipient to confirm that a message was not altered in transit.

 

KEY DEVELOPMENTS

BLOCKCHAIN

Blockchain technology employs cryptography to create a ledger that is secure and immutable. Each digital block in the blockchain contains a transaction and a cryptographic hash of the previous block, forming a chain. In this way, the blockchain is immutable, since changing earlier blocks would change the hashes and be easily detected. Blockchain technology has been applied to a variety of use cases:

  • Identity Management: Blockchain securely stores a person’s essential documents (like tax returns and health records), allowing selective data disclosure upon request. Applications are already emerging for identity management using blockchain.
  • Supply Chain Management: Blockchain offers a transparent way to track goods, their origins, and their quantities, benefiting industries with authenticity concerns, including ones involving high-value products such as diamonds and other luxury goods.
  • Smart Contracts: These are programmable self-executing contracts stored
    on the blockchain, eliminating the need for a third-party executor and
    increasing transaction efficiency.
  • Transactional records: Any kind of transactional record can be stored on a
    blockchain, thereby streamlining the process of buying and selling items by
    reducing fraud, increasing transparency, and cutting paperwork.
  • Cryptocurrencies: Digital currencies like Bitcoin and Ethereum use blockchain technology to create tokens that can act as a form of currency that does not have to be regulated or controlled by any central authority.

SECURE COMPUTATION

Another important subfield of cryptography is secure computation, which enables multiple parties to contribute inputs to a function that they jointly compute without sharing their individual inputs with each other. Secure computation is extremely useful in financial and health settings where sharing individual client/patient data is unethical or even illegal.

Within secure computation are zero-knowledge proofs, which are cryptographic methods that allow one person to prove to someone else that he or she knows a specific piece of information without revealing to the other person any details about that information. The term “zero-knowledge” indicates that the receiver gains zero new knowledge about the information in question, apart from the fact that what the prover is saying is true. Zero-knowledge proofs have applications in banking, where a buyer may wish to prove to a seller the possession of sufficient funds for a transaction without revealing the exact amount of those funds. There are also applications ranging from cooperative tracking and verification of numbers of tactical nuclear warheads to checking provenance of digital images.

Over the Horizon

There are a broad range of possibilities for cryptographically enabled data management services, but whether we will see their widespread deployment depends on complicated decisions about economic feasibility, costs, regulations, and ease of use. Misaligned incentives at companies (which have strong incentives to gather consumer data) and the difficulties of consumer and policymaker education present challenges to widespread adoption. Extensive deployment will also require would-be users to have confidence that proposed innovations will work as advertised. However, the mathematical and counterintuitive nature of cryptography concepts will make it challenging for policymakers, consumers, and regulators to place their trust in these applications.

Additionally, although cryptography is fundamentally a mathematical discipline, it relies on both human talent and computing power, with interdisciplinary centers advancing research through collaboration. Research can be funded by both the US government and private industry, but onerous proposal requirements make government funding far more difficult to achieve at present. As a result, research faculty prefer arrangements with the private sector, but only the US government is capable of funding research that may not pay off for many years.

POLICY, LEGAL & REGULATORY ISSUES

There has been no push to regulate basic research in cryptography for several decades. However, a number of aspects of the field do raise important policy issues:

  • Exceptional access (EA): EA refers to a requirement that forces communications carriers and technology vendors to provide US law enforcement agencies access to encrypted information under specific legal conditions. Opponents argue that EA would inevitably weaken the security afforded by encryption to everyone, while supporters argue that the price of weakened security is worth the benefits to law enforcement. 
  • Quantum computing: When realized, this novel form of computing is likely to pose a significant threat to today’s public-key algorithms, and the US government has already initiated a transition to quantum-resistant ones. Continuing support for this transition is needed to protect sensitive information. 
  • Cryptocurrencies: The lack of a regulatory framework for cryptocurrency often leaves many American users and investors confused about the basic workings of cryptocurrencies and their markets. It may also inadvertently incentivize entrepreneurs to move offshore. 
  • A US central bank digital currency (CBDC): CBDCs combine the convenience and lower costs of digital transactions with the regulatory oversight of traditional banking. While the United States is considering issuing its own CBDC, more than ninety other nations are currently researching, piloting, or rolling them out— including China with its deployment of the digital yuan. The development of CBDCs by other nations could reduce global dependence on the US dollar and on the largely US-controlled international financial infrastructure, thus undermining the effectiveness of US economic sanctions and other financial tools. America may lag China and some other countries with respect to introducing a CBDC, but implementation of a US CBDC could benefit from a cautious, well-timed approach by learning from earlier adopters’ experiences.

Report Preview: Cryptography

Faculty Council Advisor

dan-boneh_profilephoto.jpg
Dan Boneh
Author
Dan Boneh

Dan Boneh is professor of cryptography and electrical engineering at Stanford University, codirector of the Stanford Computer Security Lab, and a senior fellow at the Freeman Spogli Institute for International Studies. His research focuses on applied cryptography and computer security. He has authored over one hundred publications. He received his PhD in computer science from Princeton University.

View Bio
dan-boneh_profilephoto.jpg
Dan Boneh

Dan Boneh is professor of cryptography and electrical engineering at Stanford University, codirector of the Stanford Computer Security Lab, and a senior fellow at the Freeman Spogli Institute for International Studies. His research focuses on applied cryptography and computer security. He has authored over one hundred publications. He received his PhD in computer science from Princeton University.

Access the Complete Report

Read the complete report.

Explore

Date Range
CONTENT TYPE

Select Content Type

  • News
  • Article
  • Videos
  • Podcasts
  • Events
AUTHORS

Select Author

  • Condoleezza Rice
  • John Taylor
  • Jennifer Widom
  • Amy Zegart
  • Herbert Lin
  • Hon. Jerry McNerney
  • Hon. Robert Gates
  • Hon. Steven Chu
  • Hon. Susan M. Gordon
  • John Hennessy
  • Lloyd B. Minor
  • Mary Meeker
  • Peter Scher
  • Thomas M. Siebel
  • Zhenan Bao
  • Dan Boneh
  • Yi Cui
  • Simone D’Amico
  • Drew Endy
  • Siegfried Glenzer
  • Mark A. Horowitz
  • Fei-Fei Li
  • Allison Okamura
  • Kang Shen
  • Eric Schmidt
  • Steven Koonin
  • Sally Benson
  • Norbert Holtkamp
  • Martin Giles
FOCUS AREAS

Cryptography

  • Artificial Intelligence
  • Biotechnology and Synthetic Biology
  • Sustainable Energy Technologies
  • Cryptography
  • Materials Science
  • Neuroscience
  • Nuclear Technologies
  • Robotics
  • Semiconductors
  • Space
  • Technology Test Page
  • Lasers
  • Artificial Intelligence
  • Biotechnology and Synthetic Biology
  • Cryptography
  • Materials Science
  • Neuroscience
  • Robotics
  • Semiconductors
  • Sustainable Energy Technologies
  • Space
Date (field_date)
Read More
Stanford and Hoover Institution contributors to the Stanford Emerging Technology Review are seen on Capitol Hill on February 25, 2025. (DMV Productions)
News
Books
Stanford Emerging Technology Review Highlights Promise and Risk of Frontier Tech to Washington, DC Policymakers

Contributors to the 2025 edition of the Stanford Emerging Technology Review brought its findings to America’s capital on February 25, with the challenge and promise presented by frontier technologies now clearer than ever before.

March 11, 2025
Read More
SETR 2025 Cover
News
Books
Stanford Emerging Technology Review Offers Policymakers New Insights

The 2025 edition of the Stanford Emerging Technology Review (SETR) report is now available, offering American policymakers a comprehensive overview of how ten frontier technologies, from artificial intelligence to robotics, are transforming the world.

February 24, 2025
Read More
DeepSeek logo in front of a Chinese flag
Article
Books
How Disruptive Is DeepSeek? Stanford HAI Faculty Discuss China’s New Model

Experts weigh in on the implications of DeepSeek’s open-source model and its impact on technology, geopolitics, the arts, and more.

February 13, 2025 by Amy Zegart
Read More
The Interconnect Logo
News
Books
CFR and the Stanford Emerging Technology Review Launch New Podcast Series on Frontier Technologies

Frontier technologies are transforming international relations and the U.S. economy. As a result, more bridges between science and engineering labs, Washington, DC, and the world of business are needed. The Hoover Institution and Stanford University’s School…

February 12, 2025
Read More
SETR in DC | Feb. 25, 2025
Events
Books
The Stanford Emerging Technology Review 2025: Frontier Tech For A New Geopolitical Era

The Hoover Institution and the School of Engineering at Stanford University invite you to a panel discussion for the launch of the Stanford Emerging Technology Review 2025 report in Washington, DC.

Read More
Hoover Institution fellow Drew Endy testifies before the US-China Economic and Security Review Commission at a hearing on "Made in China 2025—Who Is Winning?"
News
Books
Drew Endy: Made In China 2025—Who Is Winning?

Hoover Institution fellow Drew Endy testifies before the US-China Economic and Security Review Commission at a hearing on "Made in China 2025—Who Is Winning?"

February 06, 2025 by Drew Endy
Read More
Bio-Strategies and Leadership Holds Inaugural Congressional Fellowship Program on Biotechnology Strategy
Events
Books
Bio-Strategies and Leadership Holds Inaugural Congressional Fellowship Program on Biotechnology Strategy

Drew Endy, a Hoover science fellow and senior fellow and Martin Family University Fellow in Undergraduate Education (Bioengineering) at Stanford University, convened nearly two dozen Hoover and Stanford experts, policymakers, and business leaders earlier this…

October 18, 2024
Read More
Tech Track II 2024
Events
Books
Government Officials, Hoover Fellows, and Silicon Valley Leaders Discuss Cooperation at Sixth Annual Tech Track II Symposium

Fifty US government officials, scholars from the Hoover Institution, Stanford University scientists and engineers, technology experts, venture capitalists, and business leaders convened at the Sixth Annual Tech Track II Symposium hosted by the Hoover…

December 16, 2024
Read More
Drone
Article
Books
Technology Applications By Policy Area

This chapter explores applications from each of the ten technology fields described in the report as they may relate to five important policy themes: economic growth, national security, environmental and energy sustainability, health and medicine, and civil…

February 07, 2025
Read More
Globe
Article
Books
Cross-Cutting Themes

One of the most important and unusual hallmarks of this moment is convergence: emerging technologies are intersecting and interacting in a host of ways, with important implications for policy. This chapter identifies themes and commonalities that cut across…

February 07, 2025

You May Also Like

.
Stanford and Hoover Institution contributors to the Stanford Emerging Technology Review are seen on Capitol Hill on February 25, 2025. (DMV Productions)
Stanford Emerging Technology Review Highlights Promise and Risk of Frontier Tech to Washington, DC Policymakers
.
SETR 2025 Cover
Stanford Emerging Technology Review Offers Policymakers New Insights
.
The Interconnect Logo
CFR and the Stanford Emerging Technology Review Launch New Podcast Series on Frontier Technologies
overlay image