Jump to content United States-English
HP.com Home Products and Services Support and Drivers Solutions How to Buy
» Contact HP

HP.com home

Cryptography

» 

HP Labs

» Research
» News and events
» Technical reports
» About HP Labs
» Careers @ HP Labs
» People
» Worldwide sites
» Downloads
Content starts here
lock and chain
 

Research opportunities

Cryptography is an essential tool in the world of information technology, helping to protect privacy, ensure trust, control access, secure electronic transactions, manage digital rights and much more.

Once the province of spies, governments and military organizations, it now touches people's everyday lives when they use an ATM machine, log on to their computers, buy something online or purchase music for an MP3 player.

Research focus

At HP Labs, our research in cryptography is focused on data integrity, identity-based encryption and creating more trustworthy PCs. We also work in the area of quantum cryptography.

Current work

Data integrity

One key effort involves data integrity and digital signatures. Digital signatures are often used to sign data so that changes can be easily detected, but sometimes changes are acceptable -- even unavoidable.

Over decades or longer, applications may change and data may need to be reformatted. Yet any format change would render a digital signature useless. We have addressed this with new cryptographic protocols that establish the integrity of the data in the face of format changes.

A similar problem arises with data containing confidential or privacy-sensitive information that cannot be disclosed. HP researchers have developed improved digital-signature algorithms that allow data to be signed, but also allow confidential portions to be deleted or replaced with pseudonyms to protect privacy.

These techniques are being applied to establishing the integrity of enterprise event and audit logs, where a voluminous amount of information needs to be protected, and where disclosure of that information needs to be carefully controlled.

Identity-based encryption

Another area of focus is in the area of identity-based encryption (IBE), an emerging set of cryptographic techniques which provide mechanisms for flexible encryption of digital information.

Past encryption techniques relied on long, randomly generated keys that were associated with identities using digital certificates. But generating and managing those keys required a costly and complex infrastructure.

IBE avoids this complication by allowing the sender of an encrypted message to choose any arbitrary string even an e-mail address -- as a public key. The decrypting key comes from a trusted server, which generates keys and manages policy enforcement.

W e are developing algorithms and reasoning techniques to secure IBE use in complex systems. In addition, we are contributing to industry standards for this type of encryption.

Technical contributions

HP Labs cryptographers contributed to a cryptographic protocol called direct anonymous attestation (DAA), a method for remote authentication of a hardware module (known as the trusted platform module or TPM) while preserving the user's privacy.

The protocol is included in the latest version of the Trusted Platform Module specification adopted by the Trusted Computing Group (TCG). This work is part of our research in trusted computing.

In the area of IBE, a secure messaging system based on our technology was implemented and used in a trial with a major European health service organization.

Security & compliance

       
  » Platform & infrastructure security  
» Security management
  » Compliance management  
  » Privacy & identity management  
  » Cryptography  
       
 

Related research

»  Direct anonymous attestation (tech report)
»  IBE health care trial (tech report)
 

Learn more

»  Trusted Platform Module
»  Trusted Computing Group
Printable version
Privacy statement Using this site means you accept its terms Feedback to HP Labs
© 2009 Hewlett-Packard Development Company, L.P.