.
AI_133px.jpg
ai
Artificial Intelligence
.
biotech
biotech
Biotechnology and Synthetic Biology
.
Lasers
Lasers
Lasers
.
materialscience
nano
Materials Science
.
neuroscience
neuroscience
Neuroscience
.
robotics
robotics
Robotics
.
semiconductor
semiconductors
Semiconductors

KEY TAKEAWAYS

•  Cryptography is essential for protecting information, but alone it cannot secure cyberspace against all threats.

•  Cryptography is the enabling technology of blockchain, which is the enabling technology of cryptocurrencies.

•  Central bank digital currencies (CBDCs) are a particular type of cryptography-based digital currency supported by states and one that could enhance financial inclusion. Although the United States lags some countries in experimenting with a CBDC, it may benefit from a cautious, well-timed approach by learning from other nations’ efforts.

Icons_card_Crypto.png

Overview

Cryptography refers to the mathematics of protecting data from being surreptitiously altered or accessed inappropriately. It is essential for most internet activity, including messaging, e-commerce, and banking. There are two main types of cryptography: symmetric and asymmetric. Symmetric cryptography requires both parties to share one secret key to encrypt and decrypt data. In practice, sharing this secret key can be difficult. This led to the development of asymmetric encryption, which uses one public key, freely available to anyone, to encrypt data and a different private key to decrypt data. Hashing is another cryptographic method that generates a unique fixed-length string of numbers for a given input. Through the combination of hashing and other techniques, cryptography also enables identity verification and allows a recipient to confirm that a message was not altered in transit.

 

KEY DEVELOPMENTS

BLOCKCHAIN

Blockchain technology employs cryptography to create a ledger that is secure and immutable. Each digital block in the blockchain contains a transaction and a cryptographic hash of the previous block, forming a chain. In this way, the blockchain is immutable, since changing earlier blocks would change the hashes and be easily detected. Blockchain technology has been applied to a variety of use cases:

  • Identity Management: Blockchain securely stores a person’s essential documents (like tax returns and health records), allowing selective data disclosure upon request. Applications are already emerging for identity management using blockchain.
  • Supply Chain Management: Blockchain offers a transparent way to track goods, their origins, and their quantities, benefiting industries with authenticity concerns, including ones involving high-value products such as diamonds and other luxury goods.
  • Smart Contracts: These are programmable self-executing contracts stored
    on the blockchain, eliminating the need for a third-party executor and
    increasing transaction efficiency.
  • Transactional records: Any kind of transactional record can be stored on a
    blockchain, thereby streamlining the process of buying and selling items by
    reducing fraud, increasing transparency, and cutting paperwork.
  • Cryptocurrencies: Digital currencies like Bitcoin and Ethereum use blockchain technology to create tokens that can act as a form of currency that does not have to be regulated or controlled by any central authority.

SECURE COMPUTATION

Another important subfield of cryptography is secure computation, which enables multiple parties to contribute inputs to a function that they jointly compute without sharing their individual inputs with each other. Secure computation is extremely useful in financial and health settings where sharing individual client/patient data is unethical or even illegal.

Within secure computation are zero-knowledge proofs, which are cryptographic methods that allow one person to prove to someone else that he or she knows a specific piece of information without revealing to the other person any details about that information. The term “zero-knowledge” indicates that the receiver gains zero new knowledge about the information in question, apart from the fact that what the prover is saying is true. Zero-knowledge proofs have applications in banking, where a buyer may wish to prove to a seller the possession of sufficient funds for a transaction without revealing the exact amount of those funds. There are also applications ranging from cooperative tracking and verification of numbers of tactical nuclear warheads to checking provenance of digital images.

Over the Horizon

There are a broad range of possibilities for cryptographically enabled data management services, but whether we will see their widespread deployment depends on complicated decisions about economic feasibility, costs, regulations, and ease of use. Misaligned incentives at companies (which have strong incentives to gather consumer data) and the difficulties of consumer and policymaker education present challenges to widespread adoption. Extensive deployment will also require would-be users to have confidence that proposed innovations will work as advertised. However, the mathematical and counterintuitive nature of cryptography concepts will make it challenging for policymakers, consumers, and regulators to place their trust in these applications.

Additionally, although cryptography is fundamentally a mathematical discipline, it relies on both human talent and computing power, with interdisciplinary centers advancing research through collaboration. Research can be funded by both the US government and private industry, but onerous proposal requirements make government funding far more difficult to achieve at present. As a result, research faculty prefer arrangements with the private sector, but only the US government is capable of funding research that may not pay off for many years.

POLICY, LEGAL & REGULATORY ISSUES

There has been no push to regulate basic research in cryptography for several decades. However, a number of aspects of the field do raise important policy issues:

  • Exceptional access (EA): EA refers to a requirement that forces communications carriers and technology vendors to provide US law enforcement agencies access to encrypted information under specific legal conditions. Opponents argue that EA would inevitably weaken the security afforded by encryption to everyone, while supporters argue that the price of weakened security is worth the benefits to law enforcement. 
  • Quantum computing: When realized, this novel form of computing is likely to pose a significant threat to today’s public-key algorithms, and the US government has already initiated a transition to quantum-resistant ones. Continuing support for this transition is needed to protect sensitive information. 
  • Cryptocurrencies: The lack of a regulatory framework for cryptocurrency often leaves many American users and investors confused about the basic workings of cryptocurrencies and their markets. It may also inadvertently incentivize entrepreneurs to move offshore. 
  • A US central bank digital currency (CBDC): CBDCs combine the convenience and lower costs of digital transactions with the regulatory oversight of traditional banking. While the United States is considering issuing its own CBDC, more than ninety other nations are currently researching, piloting, or rolling them out— including China with its deployment of the digital yuan. The development of CBDCs by other nations could reduce global dependence on the US dollar and on the largely US-controlled international financial infrastructure, thus undermining the effectiveness of US economic sanctions and other financial tools. America may lag China and some other countries with respect to introducing a CBDC, but implementation of a US CBDC could benefit from a cautious, well-timed approach by learning from earlier adopters’ experiences.

Report Preview: Cryptography

Faculty Council Advisor

dan-boneh_profilephoto.jpg
Dan Boneh
Author
Dan Boneh

Dan Boneh is professor of cryptography and electrical engineering at Stanford University, codirector of the Stanford Computer Security Lab, and a senior fellow at the Freeman Spogli Institute for International Studies. His research focuses on applied cryptography and computer security. He has authored over one hundred publications. He received his PhD in computer science from Princeton University.

View Bio
dan-boneh_profilephoto.jpg
Dan Boneh

Dan Boneh is professor of cryptography and electrical engineering at Stanford University, codirector of the Stanford Computer Security Lab, and a senior fellow at the Freeman Spogli Institute for International Studies. His research focuses on applied cryptography and computer security. He has authored over one hundred publications. He received his PhD in computer science from Princeton University.

Access the Complete Report

Read the complete report.

Explore

Date Range
CONTENT TYPE

Select Content Type

  • News
  • Article
  • Videos
  • Podcasts
  • Events
AUTHORS

Select Author

  • Condoleezza Rice
  • John Taylor
  • Jennifer Widom
  • Amy Zegart
  • Herbert Lin
  • Hon. Jerry McNerney
  • Hon. Robert Gates
  • Hon. Steven Chu
  • Hon. Susan M. Gordon
  • John Hennessy
  • Lloyd B. Minor
  • Mary Meeker
  • Peter Scher
  • Thomas M. Siebel
  • Zhenan Bao
  • Dan Boneh
  • Yi Cui
  • Simone D’Amico
  • Drew Endy
  • Siegfried Glenzer
  • Mark A. Horowitz
  • Fei-Fei Li
  • Allison Okamura
  • Kang Shen
  • Eric Schmidt
  • Steven Koonin
  • Sally Benson
  • Norbert Holtkamp
  • Martin Giles
FOCUS AREAS

Cryptography

  • Artificial Intelligence
  • Biotechnology and Synthetic Biology
  • Sustainable Energy Technologies
  • Cryptography
  • Materials Science
  • Neuroscience
  • Nuclear Technologies
  • Robotics
  • Semiconductors
  • Space
  • Technology Test Page
  • Lasers
  • Artificial Intelligence
  • Biotechnology and Synthetic Biology
  • Cryptography
  • Materials Science
  • Neuroscience
  • Robotics
  • Semiconductors
  • Sustainable Energy Technologies
  • Space
Date (field_date)
Read More
Materials Science
Article
Books
Materials Science: Building the Tech Future

Researchers are finding, transforming, and creating the material building blocks of science and industry.

July 26, 2024
Read More
Space
Article
Books
A Deeper Dive into Space

Stanford University experts survey the aeronautics and astronautics research landscape on campus, covering topics including multisatellite autonomy; in-space logistics, servicing, assembly, and manufacturing (ISAM); space sustainability; spacecraft systems and…

June 17, 2024 by Herbert Lin, Simone D’Amico
Read More
Semiconductor Day at the Hoover Institution
News
Books
Experts, Diplomats, and Industry Representatives Discuss US Semiconductor Future after Passage of CHIPS Act

As dollars from the CHIPS and Science Act flow to strengthen the US semiconductor industry, senior leaders from the US government, industry, academia, and international partners met at the Hoover Institution to discuss current challenges and the field’s next…

June 13, 2024
Read More
SETR_CongressionalFellowship
News
Books
Stanford Emerging Technology Review Congressional Fellowship Program

The Hoover Institution and Stanford School of Engineering appreciate the important role of Congressional staff as they advise Members on the critically important policy issues that routinely come before Congress.

March 21, 2024
Read More
Space Innovation Roundtable
News
Books
Senior Leaders in Government, Industry, and Academia Convene for Discussions on Space Innovation and Commercial Integration
March 08, 2024
Read More
Artificial Intelligence
News
Books
US Wants Cloud Firms to Report Foreign Users Building AI

US Commerce Secretary Gina Raimondo said her department is exploring how to force cloud companies to disclose when a foreigner taps their computing power to fuel artificial intelligence applications, signaling the next phase of the tech war between Washington…

January 26, 2024
Read More
artificial intelligence
News
Books
Raimondo considers cloud reporting rules for foreign AI developers

Commerce Secretary Gina Raimondo said Friday that she is considering requiring cloud server providers to report details on whether foreign users are developing artificial intelligence models, an extension of the Biden administration’s efforts to institute AI…

January 29, 2024
Read More
artificial intelligence
News
Books
OpenAI and Other Tech Giants Will Have to Warn the US Government When They Start New AI Projects

The Biden administration is using the Defense Production Act to require companies to inform the Commerce Department when they start training high-powered AI algorithms.

January 26, 2024 by Condoleezza Rice, Fei-Fei Li
Read More
technologyiStock-1328282379
Videos
Books
Commerce Secretary and Others on AI and Innovation

Commerce Secretary Gina Raimondo, former Secretary of State Condoleezza Rice, and Stanford University computer scientist Fei-Fei Li discussed artificial intelligence and technological innovation at an event hosted by the Hoover Institution in Washington, DC.…

January 26, 2024 by Condoleezza Rice, Fei-Fei Li
Read More
SETR
News
Books
Stanford Emerging Technology Review Launches in Washington DC

Contributor scholars, Stanford engineers all, of the Stanford Emerging Technology Review brought their insights to the nation’s capital last week, launching the initiative with events in the nation’s capital.

January 29, 2024

You May Also Like

.
Stanford and Hoover Institution contributors to the Stanford Emerging Technology Review are seen on Capitol Hill on February 25, 2025. (DMV Productions)
Stanford Emerging Technology Review Highlights Promise and Risk of Frontier Tech to Washington, DC Policymakers
.
SETR 2025 Cover
Stanford Emerging Technology Review Offers Policymakers New Insights
.
The Interconnect Logo
CFR and the Stanford Emerging Technology Review Launch New Podcast Series on Frontier Technologies
overlay image