Sunday, September 16, 2007

Tamper evident numbers

From The Playdough Protocols:
Evolving beyond clay tokens, accounting was the first use of the external marks and started to take a familiar form. Along with the tamper evident clay, the Sumerians developed a kind of virtual tamper evidence. It took the form of two sets of numbers. On the front of the tablet, each group of commodities would be recorded separately -- For example on the front would be recorded 120 pots of wheat, 90 pots of barley, and 55 goats. On the reverse would simply be recorded "265" -- the same objects counted gain, probably in a different order, and without bothering to categorize them. The scribe, or an auditor, would then verify that the sum was correct. If not, an error or fraud had occured. Note the similarity to tamper evident seals -- if a seal is broken, this meant that error or fraud had occured. The breaker of the seals, or the scribe who recorded the wrong numbers, or the debtor who paid the wrong amounts of commodities would be called on the carpet to answer for his or her discrepancy.

Checksums still form the basis of modern accounting. Indeed, the principle of double entry bookeeping is based on two sets of independently derived numbers that must add up to the same number. Below, we will see that modern computers, using cryptographic methods, can now compute unspoofable checksums.


Blogger Citizen Dave said...

The story of the tallies also shows how low-technology tamper-evidence provides the basis for a payment system.

9:53 AM  
Anonymous nick said...

That's an interesting article. One point of variance -- tallies were in use long before the Norman invasion, and probably date from very prehistoric times. For example, some notched bones from before 10,000 BC have been found that are probably tallies. Particuarly interesting for tallies, which may be of more recent invention than prehistoric times, is the splitting protocol (each side gets half of the tally stick split lengthwise).

11:03 AM  
Blogger Daniel A. Nagy said...

The theory of cryptographic checksums (also known as hash functions or message digests) is still in its infancy. While they are arguably the most important tool in the financial cryptographer's toolbox (precisely for the reasons highlighted by this article), we know surprisingly little about them.
Most of the presently used constructs are showing weaknesses and even the criteria by which to evaluate new designs are not as clear as in the case of block ciphers.
NIST launched an international initiative to address the issue. Hopefully, this will generate more interest and more research in this very important (and very difficult) branch of cryptography.

6:18 PM  

Post a Comment

Links to this post:

Create a Link

<< Home