industry news
Subscribe Now

Tide Foundation’s Splintering Mechanism Makes Passwords 14 Million Percent Harder to Hack in the Face of Continued Data Breaches

Online test of “splintered” password proves resilient over three months and 6.5 million attempts; first step in development of a new personal data economy

Sydney, Australia, September 5, 2019 – In the wake of daily data breaches where hundreds of millions of individuals’ sensitive data has been stolen by hackers, a non-profit community-driven organization is on a mission to provide the world with an unprecedented level of protection against personal data loss. Tide.org has developed a new encryption scheme called “splintering” that makes username/password authentication 14 million percent more difficult to hack. 

In May 2019, Tide.org invited hackers to break a single username/password in the ongoing Tide H4X campaign, with a Bitcoin up for grabs – to elicit scrutiny from the community. Even with hints and help from the Tide team, after 6.5 million attempts no hacker has managed to break through. 

Splintering is one of several ground-breaking open-source technologies from Tide.org designed to form the backbone of a new, secure “personal data economy” with the aim of securing the privacy of data for businesses, consumers and data seekers (marketing or research firms). Comprised of a team of engineers and entrepreneurs, Tide is developing an overarching technology infrastructure that aims to give control of personal data back to the consumer and create a broad opportunity beyond simply making passwords millions of times more difficult to crack. Called the Tide Protocol, the entire open-source software solution will be distributed free.

Splintering Authentication Mechanism

Data breaches like those suffered by Capital One, Equifax and Marriott cost companies in many ways, including large fines, legal problems and PR crises, not to mention loss of customer trust. With the new Tide splintering mechanism for data encryption, companies can deliver exponentially higher levels of security for customers’ passwords. The approach enables username/password authentication that is closer to the security level of a bitcoin private key, but with the familiar username/password experience. For businesses, the authentication is seamlessly integrated with any website user interface. 

The encrypted passwords within the authentication system are splintered — essentially broken up into tiny pieces and stored using a decentralized scheme. This technique makes it tremendously more difficult to reconstruct one complete password, let alone all the passwords, using either reverse engineering or common brute force attack methods.

Tide engineers tested the technique in a focused research project by using 60 million LinkedIn credentials that had been exposed in a previous attack. The team found that splintering dropped the odds of a “dictionary attack” breach — the most common kind of attack — from 100 percent to 0.00072 percent (an improvement of 14,064,094 percent when the splintering mechanism was deployed). 

“Even though the database of exposed LinkedIn usernames/passwords that Tide used in the study of splintering had been hashed and salted, all 60 million passwords were cracked when they hit the black market,” said Professor Willy Susilo, a cryptology expert and advisor to the company. “In contrast, Tide’s algorithm is very powerful and is significantly less vulnerable. We expect it to improve personal data security by orders of magnitude.”

The Tide Protocol

Splintering is the element of the overarching Tide Protocol that enables a ubiquitous authentication mechanism (i.e. username / password). Beyond splintering, Tide has developed a stack of additional ground-breaking technology to form the backbone of a new “personal data economy.” 

“The Tide Protocol is intended to be a global standard to power a sustainable personal data ecosystem. It will help organizations maintain privacy compliance, mitigate risks posed from data breaches and improve their trust with consumers to do better business. It enables data seekers to access permissioned, highly-relevant and motivated audiences. Most importantly, it puts consumers in control of their data, who has access to it and why, and–if they agree to trade it–share in its monetization,” Dominique Valladolid, Co-founder, Tide.org, said. “We believe personal data is everyone’s business and that we can ultimately make privacy profitable.”

About Tide Foundation

Tide is a not-for-profit, community-driven foundation creating a new global personal data economy. Its open source framework operates on a decentralized distributed network. As part of the backbone for this personal data economy, Tide has created a suite of technology designed to protect sensitive consumer data. With a goal of developing a significant shift in the power and ownership of personal data, Tide’s advisory board and board of directors is made up of leaders from global media companies, the banking industry, the political sphere and world-renowned scholars in cryptography, along with a founding team of experienced entrepreneurs. For more, visit tide.org.

Leave a Reply

featured blogs
Nov 14, 2019
In addition to playing retro games, THEC64 allows you to write your own programs in C64 or VIC 20 BASIC....
Nov 14, 2019
The Cadence Academic Network hosted an Academic Speaker Series event, in collaboration with the Shanghai Site Technical Talk series, in Cadence Shanghai Office. The talk attracted more than 150... [[ Click on the title to access the full blog on the Cadence Community site. ]...
Nov 14, 2019
Scientists, researchers, and data analysts from academia, industry and government agencies will be center stage at SC19 next week in Denver. SC19 is the International Conference for High Performance Computing, Networking, Storage, and Analysis. Next-generation high-performanc...
Nov 13, 2019
By Elven Huang – Mentor, A Siemens Business SRAM debugging at advanced nodes is challenging. With pattern matching and similarity checking, Calibre tools enable designers to more quickly and precisely locate SRAM modification errors and determine the correct fix. Static...
Nov 8, 2019
[From the last episode: we looked at the differences between computing at the edge and in the cloud.] We'€™ve looked at the differences between MCUs and SoCs, but the one major thing that they have in common is that they have a CPU. Now'€¦ anyone can define their own CPU ...