Anonymous Internet banking

Last updated

Anonymous Internet banking is the proposed use of strong financial cryptography to make electronic bank secrecy (or more precisely pseudonymous banking) possible. The bank issues currency in the form of electronic tokens that can be converted on presentation to the bank to some other currency. This concept has a long history in which free banking institutions have issued their own paper currency often backed by a physical commodity.

Financial cryptography is the use of cryptography in applications in which financial loss could result from subversion of the message system. Financial cryptography is distinguished from traditional cryptography in that for most of recorded history, cryptography has been used almost entirely for military and diplomatic purposes.

Bank secrecy

Banking secrecy, alternately known as financial privacy, banking discretion, or bank safety, is a conditional agreement between a bank and its clients that all foregoing activities remain secure, confidential, and private. While some banking institutions voluntarily impose banking secrecy institutionally, others operate in regions where the practice is legally mandated and protected. Almost all banking secrecy standards prohibit the disclosure of client information to third parties without consent or an accepted criminal complaint. Additional privacy is provided to select clients via numbered bank accounts or underground bank vaults. Most often associated with banking in Switzerland, banking secrecy is prevalent in Luxembourg, Monaco, Hong Kong, Singapore, Ireland, and the Cayman Islands, among other off-shore banking institutions.

Pseudonymity, a word derived from pseudonym, meaning 'false name', is a state of disguised identity. The pseudonym identifies a holder, that is, one or more human beings who possess but do not disclose their true names. Most pseudonym holders use pseudonyms because they wish to remain anonymous, but anonymity is difficult to achieve and is often fraught with legal issues. True anonymity requires unlinkability, such that an attacker's examination of the pseudonym holder's message provides no new information about the holder's true name.

Contents

History

While the academic study of trust relationships and systems has long been the domain of intelligence services such as the NSA, the growth of the Internet in the 1990s and the contemporary declassification of related knowledge allowed for greater public discussion of the potential for anonymous banking services by groups such as the cryptoanarchists and cypherpunks.

A cypherpunk is any activist advocating widespread use of strong cryptography and privacy-enhancing technologies as a route to social and political change. Originally communicating through the Cypherpunks electronic mailing list, informal groups aimed to achieve privacy and security through proactive use of cryptography. Cypherpunks have been engaged in an active movement since the late 1980s.

The underlying mathematics

Anonymous internet banking depends on the mathematics of public key cryptography and blind signature algorithms. In this simple example we have Alice and Bob and a banker. The banker generates an RSA public key with modulus , where and are large primes, making a semiprime. As described in RSA operation, the bank also generates public key exponent and private key exponent .

Blind signature form of digital signature in which the content of a message is disguised (blinded) before it is signed

In cryptography a blind signature, as introduced by David Chaum, is a form of digital signature in which the content of a message is disguised (blinded) before it is signed. The resulting blind signature can be publicly verified against the original, unblinded message in the manner of a regular digital signature. Blind signatures are typically employed in privacy-related protocols where the signer and message author are different parties. Examples include cryptographic election systems and digital cash schemes.

Alice and Bob are fictional characters commonly used as placeholder names in cryptology, as well as science and engineering literature. The Alice and Bob characters were invented by Ron Rivest, Adi Shamir, and Leonard Adleman in their 1978 paper "A method for obtaining digital signatures and public-key cryptosystems." Subsequently, they have become common archetypes in many scientific and engineering fields, such as quantum cryptography, game theory and physics. As the use of Alice and Bob became more popular, additional characters were added, each with a particular meaning. These characters do not have to refer to humans, they refer to generic agents which might be different computers or even different programs running on a single computer.

Prime number Integer greater than 1 that has no positive integer divisors other than itself and 1

A prime number is a natural number greater than 1 that cannot be formed by multiplying two smaller natural numbers. A natural number greater than 1 that is not prime is called a composite number. For example, 5 is prime because the only ways of writing it as a product, 1 × 5 or 5 × 1, involve 5 itself. However, 6 is composite because it is the product of two numbers that are both smaller than 6. Primes are central in number theory because of the fundamental theorem of arithmetic: every natural number greater than 1 is either a prime itself or can be factorized as a product of primes that is unique up to their order.

Bob asks the banker for a $100 deposit slip in anticipation of Alice wanting to transfer money to him. To generate a deposit slip the bank selects a large, globally unique random number and encrypts it using the bank's public key; this means that it can only be decrypted with the bank's secret key:

Deposit slip

A deposit slip is a form supplied by a bank for a depositor to fill out, designed to document in categories the items included in the deposit transaction. The categories include type of item, and if it is a cheque, where it is from such as a local bank or a state if the bank is not local. The teller keeps the deposit slip along with the deposit, and provides the depositor with a receipt. They are filled in a store and not a bank, so it is very convenient in paying. They also are a means of transport of money. Pay-in slips encourage the sorting of cash and coins, are filled in and signed by the person who deposited the money, and some tear off from a record that is also filled in by the depositor. Deposit slips are also called deposit tickets and come in a variety of designs. They are signed by the depositor if the depositor is cashing some of the accompanying check and depositing the rest.

Random number generation the process of generating a sequence of numbers or symbols that can not be reasonably predicted better than by random chance

A random number generator (RNG) is a device that generates a sequence of numbers or symbols that cannot be reasonably predicted better than by a random chance. Random number generators can be true hardware random-number generators (HRNG), which generate genuinely random numbers, or pseudo-random number generators (PRNG) which generate numbers which look random, but are actually deterministic, and can be reproduced if the state of the PRNG is known.

This encrypted value is sent to Bob with the promise to deposit $100 into his account when Bob sends the value back to the bank. The bank is confident that Bob won't be able to break RSA to generate from within a reasonable period without knowledge of , so it does not worry about handing out the deposit slips without receiving anything from Bob.

When Alice wants to pay Bob $100 she asks for the deposit slip and Bob sends her . Alice selects a large random value coprime with (so as to have an inverse modulo ) and uses it to blind and sends it to the bank to be blind signed. The Bank charges Alice $100 for this operation and returns the blind signed value . Due to the symmetric properties of RSA, this provides her with :

Because of the blinding process, the Bank is not able to associate or with or . The only possible way for the bank to do this is to trial divide by all the values of that it gave out or by all values of . This means the bank is unable to determine that Bob and Alice are doing business together, preserving the anonymity of the transaction. Alice unblinds (by dividing it by ) to generate the original value , which she sends to Bob. Bob verifies that can be encrypted with the bank's public key by computing , which means that Alice has deposited $100 into the bank. Bob then sends this value to the bank and the bank checks its records to be sure that has not been already used. If is confirmed to be unused the bank then deposits $100 into Bob's account and updates its database that the unique value has been redeemed.

Different public keys can be used for different denominations of currency so this system doesn't take appreciably longer for large transactions.

Note that if neither Alice nor Bob wishes the bank to know that they performed a transaction with each other, then it is hard for the bank to find out. However, in order to ensure this is the case many people need to be making transactions at the same time. Otherwise the bank can figure it out by the timing of the transactions, using traffic analysis.

Traffic analysis is the process of intercepting and examining messages in order to deduce information from patterns in communication, which can be performed even when the messages are encrypted. In general, the greater the number of messages observed, or even intercepted and stored, the more can be inferred from the traffic. Traffic analysis can be performed in the context of military intelligence, counter-intelligence, or pattern-of-life analysis, and is a concern in computer security.

See also

Bearer bond a debt security not registered to any specific investor

A bearer bond is a bond or debt security issued by a business entity such as a corporation, or a government. As a bearer instrument, it differs from the more common types of investment securities in that it is unregistered—no records are kept of the owner, or the transactions involving ownership. Whoever physically holds the paper on which the bond is issued owns the instrument. This is useful for investors who wish to retain anonymity. Recovery of the value of a bearer bond in the event of its loss, theft, or destruction is usually impossible. Some relief is possible in the case of United States public debt.

Bitcoin () is a cryptocurrency, a form of electronic cash. It is a decentralized digital currency without a central bank or single administrator that can be sent from user to user on the peer-to-peer bitcoin network without the need for intermediaries.

Monero (XMR) is an open-source cryptocurrency created in April 2014 that focuses on fungibility, privacy and decentralization. Monero uses an obfuscated public ledger, meaning anybody can broadcast or send transactions, but no outside observer can tell the source, amount or destination. Monero uses a Proof of Work mechanism to issue new coins and incentivize miners to secure the network and validate transactions.

References