Decrypting the Internet of value

The art of encryption, called cryptography, is the way information is secured. Cryptography is primarily the question of: How can Alice send critical information to Bob without Eve being able to decode it? Before the Internet, history has seen many clever ways to encode and send information, followed by clever ways to decipher. Cryptography has also been a powerful force for technological progress: Alan Turing, the father of computer science, was a codebreaker in World War II.

As computers connected to form the early Internet, the network was built to withstand nuclear attacks. However, the early Internet had a flaw, and high school students were able to infiltrate the network as it was unencrypted. So as the Internet develops to connect billions of people today, strong encryption is required to secure an increasingly digital global economy. Unlike the Internet however, the global economy is highly fragmented, being divided into 180 local fiat monetary systems. Building upon the history of encryption and the decentralized Internet, Bitcoin, a native Internet currency has emerged. Bitcoin is the culmination of a powerful technological history.

A long time ago, one of the earliest encryption techniques was used in Ancient Rome. Caesar himself would communicate using a substitution cipher: “If he had anything confidential to say, he wrote it in [substitution] cipher… If anyone wishes to decipher these, he must substitute the fourth letter of the alphabet, namely D for A.” His confidants would agree upon the alphabetic shift beforehand, i.e. +3, as a private key. For centuries, Caesar’s cipher was effective at protecting critical information.

Variations of Caesar’s cipher were later broken by techniques such as brute force, i.e. testing all 26 different letter combos, and frequency analysis. In the 9th century Al-Kindi, the father of Arab philosophy, invented frequency analysis to break the Caesar cipher. Across all languages, certain letters appear more frequently than others. Any piece of writing will tend to follow the same letter frequency distribution, i.e. E appears most frequently at ~12% of the time and Z only appears ~.07%.

As an example of frequency analysis, we can encrypt this entire paragraph using the Caesar cipher with a shift of +3. If an attacker were to intercept the message and tally the letter frequency, the original shift could be easily found. After tallying the letters in the encrypted message, H appears ~12% of the time. Compared to the master English Letter Frequency chart, H should shift back to E, indicating a shift of +3.

Frequency analysis required cryptography to evolve past simple alphabetic substitution ciphers. Polyalphabetic substitution, resulting most infamously in the Nazi Enigma machine, was evolved to be unbreakable by conventional frequency analysis. World War II depended on breaking the Nazi Enigma, which at first glance looked like a simple typewriter. Typing a letter on the keyboard would light up a different letter on the lightboard. Behind the scenes, an electrical circuit conducted polyalphabetic substitution.

In simple form, typing A on the Enigma keyboard would encrypt to signal B on the lightboard. To decode, typing in B would light up A and vice versa, after going through a maze of wires in the Rotor and Reflector. As WWII raged, the Nazi regime would further complicate the wiring by adding a plugboard and more rotors. An Enigma flaw was that no typed letter could light itself: A could never light A, Z could never be Z, etc. Such clues would increase the probability of swift Enigma decryption, which could have 150 trillion possible combinations.¹

British codebreaker Alan Turing was able to decrypt Enigma using another electromechanical device called the Bombe, which processed many combinations at once. However, Nazis had a more powerful encryption than Enigma: the Lorenz cipher. Breaking Lorenz required Bombe engineers to go on to build the first electronic computer, the Colossus, aided by Turing’s work. Colossus used vacuum tubes to simulate transistors that speak the basic language of computing: i.e. running a current to switch transistors on (1) or off (0) creates binary code.

Colossus’ design later evolved into the computer we know today. The drive to decode is a powerful catalyst for technological revolution. As computers became interconnected across vast distances, a truly decentralized communication network was born. If one node were destroyed, even a major city, sent messages could circumvent the point of failure. Unlike existing phone lines, TV & Radio stations, “computer-communications had no hub, no central switching station, no governing authority, and assumed that the links connecting any city to any other were totally unreliable.”²

Called the Arpanet, this network was built to withstand nuclear attacks during the height of the Cold War. Interestingly, the network’s ability for fault tolerance also made communications on the network extremely difficult to control. As pioneer John Gilmore once put it, “The Internet interprets censorship as damage and routes around it.”³ However, despite its resilience, the Arpanet had a flaw: it was unencrypted. In 1973, a group of high school students were able to infiltrate the military grade network.⁴

Internet pioneers Vint Cerf and Bob Kahn were initially interested in building encryption into the core Internet protocol (called TCP/IP) to avoid such infiltrations, but their hands were tied. One of the techniques Vint Cerf considered was “public key crypto”. As an example of this technology, Caesar could use public-private key cryptography to make his cipher more difficult to break: I.e. instead of sharing a simple shift of +3 with close friends, Caesar could share a private key with a series of custom shifts.

Using public key crypto, frequency analysis is ineffective as single letters can represent multiple other letters at a time (mapping F -> H, and F -> E simultaneously). Today however, even Caesar’s improved cipher would be easily broken in the age of computers. The only way to avoid a computer brute forcing all possible combinations would be to use an extremely long private key, such as a 256-bit encryption (imagine the security of a private key that is 256 1’s and 0’s long). However, if Caesar’s private key is itself compromised, the message is no longer safe. Needing to actively share a private key with friends increases the risk of it falling into the wrong hands.

So today, how are Internet computers able to communicate securely without needing to actively share private keys? Transport Layer Security (TLS) helped solve this problem using a technique called asymmetric encryption: whereby your public key allows anyone to communicate with you, but your private key does not need to be shared with anyone else.

By asymmetric encryption, anyone can send you a message encrypted using your known public key. While that information is sent openly across the Internet, it can be deciphered by using only your private key, and vice versa. Asymmetric encryption allowed public key cryptography to become the foundation of secure messaging on the open internet today.⁵ TLS uses 256-bit keys that are impossible to brute force. For context, 256-bit encryption means there are 2256 possible combinations, an astronomical number:⁶

Despite such innovations as TLS, however, Internet security today is somewhat flawed. People have to keep track of countless “private keys” that need to be actively shared with others. Credit cards, for example, do not possess the virtues of asymmetric encryption. By using a credit card, you are essentially regularly revealing a private key to your finances with third parties. Your critical information is only as safe as these private keys, which are required to be actively shared with strangers.

Furthermore, the virtues of the Internet have not yet been fully applied to the global monetary system. The U.N. recognizes 180 different local fiat currencies across the world, many of which are incompatible or require a great deal of friction to exchange across borders. Bank accounts in Argentina are fundamentally incompatible with bank accounts in the United States, etc. And as of 2017, billions of people across the world do not even have access to a bank account.⁷

According to the Bank of International Settlements, “Current payment systems have two major failings: lack of universal access to financial service for a large share of the world’s population and inefficient cross-border retail payments.” So while speech is generally free across the decentralized network that evolved into the global Internet, money is still fundamentally restricted. Upon the foundations of encryption and the decentralized Internet, a solution to the downfalls of the digital economy has emerged.

In the wake of the 2008 Financial Crisis, a mysterious cryptographer named Satoshi proposed an encrypted and decentralized currency for the Internet called Bitcoin. Bitcoin was designed to be globally accessible, unlike the modern monetary system. Anyone, in any country with Internet access, can use a Bitcoin wallet to send or receive value globally. As the Internet connects the world, Bitcoin’s network is similarly expanding. Full nodes, which verify Bitcoin transactions, indicate a decentralized and global Internet for transferring value.

Bitcoin’s decentralized network is growing like the Arpanet once did, with over 55k full nodes operating in at least 96 countries worldwide (as of Oct. 2019). Just like the Arpanet, Bitcoin is fault tolerant and resistant to nuclear attacks. If one node goes down or is attacked, thousands of others remain to verify the integrity of the network. Yet unlike the Arpanet, Bitcoin is natively built with ultra secure encryption. Bitcoin’s powerful encryption method is also a reason for its universal accessibility.

Consider again the possible combinations of 256-bit keys. There are more possible 256-bit key combinations than there are atoms in the universe. Now, imagine you wanted to create a bank account that has the following properties:

  1. Does not require you to actively share your private keys.
  2. Can be generated from any country in the world with an Internet connection.
  3. Can transfer value with any other account, to or from any country in the world.
  4. Does not require permission of any middleman, bank, or country to send or receive.

These properties describe Bitcoin, and to participate in its global economy you use a computer to generate a unique personal key out of 2256 possible combinations. Imagine choosing one atom out of the entire universe as your own; And with that atom, you can transfer value to any other atom in the universe.⁸ It would be impossible for anyone else to randomly pick your same atom as their own. This is similar to what it means to create a Bitcoin “bank account”, or address.

Anyone can send bitcoin to your public key, yet spending requires your unique private key. Your private key never needs to be actively shared with anyone else, thanks to asymmetric encryption. Unlike credit cards or bank accounts, transferring Bitcoin does not require the security risk of actively sharing your private keys. And unlike the global monetary system, Bitcoin is as universally accessible as the Internet itself; participating in the global economy no longer requires a bank account.

Today, central banks are now studying Bitcoin’s distributed ledger technology to create digital fiat currencies. According to the IMF, digital currencies can be especially useful for the billions of people without access to traditional bank accounts.⁹ The impending future of central bank digital currencies will likely drive great awareness for Bitcoin itself.

A recent survey by the BIS found that 80 percent of the 66 global central banks surveyed were researching Central Bank Digital Currencies. Bitcoin is a catalyst for this inevitable innovation. Because today the world of money is in the pre-Arpanet era, being fragmented, reliant on central hubs, and requiring flawed security practices.

As the Internet of value is finally unlocked, Bitcoin is the key.

Written by

Charting the digital sea — Capitalism, data, and democracy.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store