Audio and Slides 
                    of Talk 
                    November 22, 2006 -3:30 pm  
                    Limits of Obfuscation 
                  
                  November 23, 2006 -3:30 pm  
                    New Proofs for Hard Core Predicates  
                  
                  The goal of program obfuscation is to make a program completely 
                    "unintelligible" while preserving its functionality. 
                    Obfuscation is a cryptographer's dream: nearly any cryptographic 
                    task could be achieved securely by writing a simple 
                    program and then obfuscating it (if possible!). In addition, 
                    obfuscation has been used for years in attempts to prevent 
                    reverse engineering. 
                  Barak et. al. (2001) formalized the notion of obfuscation 
                    and demonstrated the existence of a (contrived) class of functions 
                    that provably cannot be obfuscated. In contrast, Canetti and 
                    Wee gave an obfuscator for a particular  
                    class of simple functions, called point functions, that output 
                    1 on a single point (and output 0 everywhere else). Thus, 
                    it seemed completely possible that most functions of interest 
                    can be obfuscated, even though in principle general  
                    purpose obfuscation is impossible. 
                  We argue that this is unlikely to be the case, by showing 
                    that general classes of functions that one would like to obfuscate, 
                    are actually not obfuscatable. In particular, we show that 
                    for one of our classes, given an obfuscation of two functions 
                    in the class, each with a secret of its own, one can 
                    compute a hidden function of these secrets. Surprisingly, 
                    this holds even when the secrets are chosen completely independently 
                    of each other. Our results hold in an augmentation of the 
                    formal obfuscation model of Barak et. al. (2001) that includes 
                    auxiliary input. 
                     
                    We will also discuss alternatives to go outside the standard 
                    software model, in which general program obfuscation may be 
                    doable after all. 
                  Joint work with Yael Tauman Kalai (a postdoc at the Weizmann 
                    Institute) 
                  Thematic Program Home page 
               
              The Fields Institute Coxeter Lecture Series (CLS) brings a leading 
                mathematician to the Institute to give a series of three lectures 
                in the field of the current thematic program. The first talk is 
                an overview for a general mathematical audience, postdoctoral 
                fellows and graduate students. The other two talks are chosen, 
                in collaboration with the organizers of the thematic program, 
                to target specialists in the field. 
               | 
              |