Stories
Slash Boxes
Comments

SoylentNews is people

posted by cmn32480 on Saturday July 04 2015, @08:20PM   Printer-friendly
from the kids-are-smarter-these-days dept.

Encrypting emails can be tedious, difficult and very confusing. And even for those who have mastered the process, it's useless unless the intended recipient has the correct software to decode the message. A Georgia Institute of Technology researcher has created an easier method – one that sounds familiar to parents who try to outsmart their 8-year-old child. The new technique gets rid of the complicated, mathematically generated messages that are typical of encryption software. Instead, the method transforms specific emails into ones that are vague by leaving out key words.

"It's kind of like when mom and dad are talking about potential vacation spots while the kids are nearby," said Eric Gilbert, the Georgia Tech assistant professor who developed the software. "They can't say or spell 'Disney,' or the children will get too excited. So they use other words and the meaning is implied. Instead of 'Disney,' they could say 'have you bought tickets to the place yet.'"

Gilbert's Open Book system, a prototype that uses a Google Mail plug-in called Read Me, works the same way by substituting specific words with ambiguous ones. If the above example was an email conversation, the sender would write, "Have you bought tickets to Disney yet?" Open Book would change the message when it was sent. The other person would see, "Have you bought tickets to (place) yet?"

The process reduces the information disclosed to eavesdroppers or computer systems that monitor online communications, while taking advantage of common ground between the participants.

The system was presented at the ACM Conference on Human Factors in Computing Systems (CHI 2015) in Seoul, South Korea, April 18-23 (Open Book: A Socially Inspired Cloaking Technique that Uses Lexical Abstraction to Transform Messages) [PDF].


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 2, Informative) by Kent_Diego on Sunday July 05 2015, @05:36AM

    by Kent_Diego (4929) on Sunday July 05 2015, @05:36AM (#205201)

    Mobsters and prisoners do this all the time assuming the conversation in monitored. The cops still figure it out and get the convictions. They will figure it out. Without public key/private key encryption you are wasting your time.

    Starting Score:    1  point
    Moderation   +1  
       Informative=1, Total=1
    Extra 'Informative' Modifier   0  

    Total Score:   2  
  • (Score: 2) by wonkey_monkey on Sunday July 05 2015, @09:24PM

    by wonkey_monkey (279) on Sunday July 05 2015, @09:24PM (#205377) Homepage

    utsNay otay youyay, oppercay!

    --
    systemd is Roko's Basilisk
    • (Score: 1) by Yog-Yogguth on Wednesday July 08 2015, @03:55AM

      by Yog-Yogguth (1862) Subscriber Badge on Wednesday July 08 2015, @03:55AM (#206332) Journal

      Ansckwer insck Cushin: cushOOn! [youtube.com]

      --
      Bite harder Ouroboros, bite! tails.boum.org/ linux USB CD secure desktop IRC *crypt tor (not endorsements (XKeyScore))