[Yr7-10it] A Tool to Verify Digital Records
stephen at melbpc.org.au
stephen at melbpc.org.au
Wed Jan 28 04:11:20 EST 2009
A Tool to Verify Digital Records, Even as Technology Shifts
By JOHN MARKOFF Published: January 26, 2009
http://www.nytimes.com/2009/01/27/science/27arch.html?_r=1
On Tuesday a group of researchers at the University of Washington are
releasing the initial component of a public system to provide
authentication for an archive of video interviews with the prosecutors
for the Rwandan genocide. The group will also release the first portion
of the Rwandan archive.
This system is intended to be available for future use in digitally
preserving and authenticating first-hand accounts of war crimes,
atrocities and genocide.
Such tools are of vital importance because it has become possible to
alter digital text, video and audio in ways that are virtually
undetectable to the unaided human eye and ear.
The researchers said history was filled with incidents of doctoring,
deleting or denying written records.
Now, they say, the authenticity of digital documents like videos,
transcripts of personal accounts and court records can be indisputably
proved for the first time.
Designing digital systems that can preserve information for many
generations is one of the most vexing engineering challenges.
The researchers solution is to create a publicly available digital
fingerprint, known as a cryptographic hash mark, that will make it
possible for anyone to determine that the documents are authentic and
have not been tampered with.
The concept of a digital hash was pioneered at I.B.M. by Hans Peter Luhn
in the early 1950s.
The University of Washington researchers are the first to try to simplify
the application for nontechnical users and to try to offer a complete
system that would preserve information across generations.
Both because of the rapid pace of innovation and the tendency of
computers to wear out in months or years, the likelihood that digital
files will be readable over long periods of time is far less certain even
than the survival of paper documents.
Computer processors are quickly replaced by incompatible models, software
programs are developed with new data formats, and digital storage media,
whether digital tape, magnetic disk or solid state memory chips, are all
too ephemeral.
Several technologists are already grappling with the evanescent nature of
digital records.
Danny Hillis, a computer scientist, helped found the Long Now project in
1996, warning about the possibility of a digital dark age.
Mr. Hillis has argued that before the rise of digital information people
valued paper documents and cared for them. Since then, there has been
progressively less attention paid to the preservation of information. Now
information is routinely stored on media that may last for only several
years.
To that end, another computer scientist, Brewster Kahle, founded the
Internet Archive in 1996 in an effort to preserve a complete record of
the World Wide Web and other digital documents.
Similarly, in 2000 librarians at Stanford University created LOCKSS, or
Lots of Copies Keep Stuff Safe, to preserve journals in the digital age,
by spreading digital copies of documents through an international
community of libraries via the Internet.
However, Ms. Friedman distinguishes her design work from those who have
focused on the simple preservation of digitized materials.
Instead, she said she was trying to design complete digital systems that
would play a role in strengthening social institutions over time by
creating a digital historical record that offered continuity across
multiple life spans.
Building a clock is iconic, she said. What is really different is that
we are trying to solve socially significant, real-world problems.
Because problems like genocide, H.I.V. and AIDS, famine, deforestation
and global warming will not be solved in a single human lifetime, she
argues that information systems designed to ensure continuity across many
generations are a necessity.
To ground the groups research in a real-world situation, the researchers
began by building an archive of video interviews with the judges,
prosecutors and other members of the International Criminal Tribunal for
Rwanda.
The goal was to design a system that would ensure that the information
was secure for more than a century.
Last fall Ms. Friedman traveled with a group of legal experts and
cinematographers to Arusha, Tanzania, where the tribunal is based, and to
Kigali, Rwanda, to conduct video interviews.
After capturing five gigabytes of video in 49 interviews, the group began
to work on a system that would make it possible for viewers to prove for
themselves that the videos had not been tampered with or altered even if
they did not have access to powerful computing equipment or a high-speed
Internet connection.
Despite the fact that there are commercial applications that make it
possible to prove the time at which a document was created and verify
that it has not been altered, the researchers wanted to develop a system
that was freely available and would stand a chance of surviving repeated
technology shifts.
At the heart of the system is an algorithm that is used to compute a 128-
character number known as a cryptographic hash from the digital
information in a particular document. Even the smallest change in the
original document will result in a new hash value.
In recent years researchers have begun to find weaknesses in current hash
algorithms, and so last November the National Institute of Standards and
Technology began a competition to create stronger hashing technologies.
The University of Washington researchers now use a modern hash algorithm
called SHA-2, but they have designed the system so that it can be easily
replaced with a more advanced algorithm.
Their system will be distributed as part of a CD known as a live CD,
making it possible to compute or verify the hash just by inserting the
disk in a computer. The disk will also include software components that
will make it possible to view documents and videos that may not be
accessible by future software.
The problem is complex, said Michael Lesk, a professor in the department
of library and information science at Rutgers University, because not
only must you be able to prove that the information has not changed in
its original format, but you must also be able to prove that once the
format is altered, the original digital hash is still valid.
The Long Now Foundation is developing a software tool to easily convert
documents between digital formats, said Stewart Brand, a co-founder of
the project. The idea is to be able to change anything into anything
else, he said.
A version of this article appeared in print on January 27, 2009
--
However there appear some doubters 'Canonical Hashes over video? Be
skeptical' http://financialcryptography.com/mt/archives/001143.html
Cheers people
Stephen Loosley
Victoria, Australia
Message sent using MelbPC WebMail Server
More information about the Yr7-10it
mailing list