Calculating encryption schemes’ theoretical security guarantees eases comparison, improvement

Oct 30, 2014 by Larry Hardesty Credit: Christine Daniloff/MIT

Most modern cryptographic schemes rely on computational complexity for their security. In principle, they can be cracked, but that would take a prohibitively long time, even with enormous computational resources.

There is, however, another notion of securityinformation-theoretic securitywhich means that even an adversary with unbounded computational power could extract no useful information from an encrypted message. Cryptographic schemes that promise information-theoretical security have been devised, but they're far too complicated to be practical.

In a series of papers presented at the Allerton Conference on Communication, Control, and Computing, researchers at MIT and Maynooth University in Ireland have shown that existing, practical cryptographic schemes come with their own information-theoretic guarantees: Some of the data they encode can't be extracted, even by a computationally unbounded adversary.

The researchers show how to calculate the minimum-security guarantees for any given encryption scheme, which could enable information managers to make more informed decisions about how to protect data.

"By investigating these limits and characterizing them, you can gain quite a bit of insight about the performance of these schemes and how you can leverage tools from other fields, like coding theory and so forth, for designing and understanding security systems," says Flavio du Pin Calmon, a graduate student in electrical engineering and computer science and first author on all three Allerton papers. His advisor, Muriel Mdard, the Cecil E. Green Professor of Electrical Engineering and Computer Science, is also on all three papers; they're joined by colleagues including Ken Duffy of Maynooth and Mayank Varia of MIT's Lincoln Laboratory.

The researchers' mathematical framework also applies to the problem of data privacy, or how much information can be gleaned from aggregatedand supposedly "anonymized"data about Internet users' online histories. If, for instance, Netflix releases data about users' movie preferences, is it also inadvertently releasing data about their political preferences? Calmon and his colleagues' technique could help data managers either modify aggregated data or structure its presentation in a way that minimizes the risk of privacy compromises.

Staying close

To get a sense of how the technique works, imagine an encryption scheme that takes only three possible inputs, or plaintexts"A," "B," and "C"and produces only three possible outputs, or ciphertexts. For each ciphertext, there is some probability that it encodes each of the three plaintexts.

The ciphertexts can be represented as points inside a triangle whose vertices represent the three possible plaintexts. The higher the probability that a given ciphertext encodes a particular plaintext, the closer it is to the corresponding vertex: Ciphertexts more likely to encode A than B or C are closer to vertex A than to vertices B and C. A secure encryption scheme is one in which the points describing the ciphertexts are clustered together, rather than spread out around the triangle. That means that no ciphertext gives an adversary any more information about the scheme than any other.

Go here to see the original:
Calculating encryption schemes' theoretical security guarantees eases comparison, improvement

Raising cryptography’s standards

PUBLIC RELEASE DATE:

31-Oct-2014

Contact: Abby Abazorius abbya@mit.edu 617-253-2709 Massachusetts Institute of Technology @MITnews

Most modern cryptographic schemes rely on computational complexity for their security. In principle, they can be cracked, but that would take a prohibitively long time, even with enormous computational resources.

There is, however, another notion of security information-theoretic security which means that even an adversary with unbounded computational power could extract no useful information from an encrypted message. Cryptographic schemes that promise information-theoretical security have been devised, but they're far too complicated to be practical.

In a series of papers presented at the Allerton Conference on Communication, Control, and Computing, researchers at MIT and Maynooth University in Ireland have shown that existing, practical cryptographic schemes come with their own information-theoretic guarantees: Some of the data they encode can't be extracted, even by a computationally unbounded adversary.

The researchers show how to calculate the minimum-security guarantees for any given encryption scheme, which could enable information managers to make more informed decisions about how to protect data.

"By investigating these limits and characterizing them, you can gain quite a bit of insight about the performance of these schemes and how you can leverage tools from other fields, like coding theory and so forth, for designing and understanding security systems," says Flavio du Pin Calmon, a graduate student in electrical engineering and computer science and first author on all three Allerton papers. His advisor, Muriel Mdard, the Cecil E. Green Professor of Electrical Engineering and Computer Science, is also on all three papers; they're joined by colleagues including Ken Duffy of Maynooth and Mayank Varia of MIT's Lincoln Laboratory.

The researchers' mathematical framework also applies to the problem of data privacy, or how much information can be gleaned from aggregated and supposedly "anonymized" data about Internet users' online histories. If, for instance, Netflix releases data about users' movie preferences, is it also inadvertently releasing data about their political preferences? Calmon and his colleagues' technique could help data managers either modify aggregated data or structure its presentation in a way that minimizes the risk of privacy compromises.

Staying close

Excerpt from:
Raising cryptography's standards

Gigamon says it can analyze attacker SSL traffic without hitting performance

Encrypting data traffic is mandatory for safeguarding information. But when attackers use encryption to mask their activity, it can be hard for enterprises to figure out what they're stealing.

Gigamon, based in Santa Clara, California, says it has developed a capability to deeply analyze all SSL/TLS (Secure Sockets Layer/Transport Layer Security) traffic.

SSL/TLS is the cornerstone of Web security, encrypting data between a client and a server. If the traffic is intercepted, it appears as gibberish unless the person has the corresponding private encryption key required to decrypt it.

Analyst Gartner predicts that attackers will increasingly use encryption in order to try to evade security products, from around 5 percent of network attacks using encryption today to 50 percent by 2017.

Many organizations now want to have visibility on the encrypted traffic, so are deploying SSL proxies, which are incorporated into a firewall or a load balancer, said Ananda Rajagopal, Gigamon's vice president for product management.

The proxy terminates the SSL session with a remote server and initiates a new one, which gives it an accessible private key, Rajagopal said. It means that all SSL traffic can now be analyzed for traits that might indicate an attack is underway.

Other security related vendors are using this method to look at the traffic and run checks, but it is done in-line or in-band, as the traffic is moving back and forth. Since that traffic is live, there is a limit on the amount of scans that can be done without impacting performance.

What Rajagopal said Gigamon has cracked is the ability to run many more security checks on the decrypted SSL traffic. Gigamon peels off SSL traffic and analyzes it without disrupting the flow of data by creating a copy of it and subjecting it to many more analyses.

"There is a limit in terms of how many tools can be deployed in band," Rajagopal said. "Your performance is as strong as the weakest link."

In-line products tend to only have a firewall, an anti-malware scan and intrusion protection system to maintain performance, Rajagopal said.

Read more from the original source:
Gigamon says it can analyze attacker SSL traffic without hitting performance

Google officially announces Android 5.0 ‘Lollipop’ with default encryption

Google officially announced the latest version of its popular Android mobile operating system (5.0, dubbed "Lollipop") in a blog post Tuesday, which includesa feature that will automatically encryptusers data by default. The updatewill begin rolling out in November.

The company has allowed users to encrypt information storedon some mobile devices running the Android operating system since 2011. But the feature was not widely adopted.

Soon, devices with the latest version of the Android software will be encrypted by default during the activation process -- preventing Google from unlocking the device, even at the request of law enforcement. The new default encryption works by creating a unique key for decryptingthe device that is stored on the phone and not accessible to Google.

Only someone who knows the device's password would be able to see the pictures, messages and videos stores on the device, although law enforcement could still gainaccess to information backed up in the cloud, as well as metadata from wireless carriers throughcourt orders.

Not all Android users are likely to receive the latest versionat the same time. Android devices are made by various manufacturers and supported by various wireless carriers -- each of whom tailors Android updates to consumers. So it may be months before this update makes its way into the hands of most or even some consumers.

The move to default encryption wasrevealedlast month, shortly after Apple announced a similar shift in its latest mobile operating system. It comes as major tech companies have rushed to add layers of security to their products and services in the wake of former contractor Edward Snowden's revelations about the pervasiveness of data collection by the National Security Agency.

Law enforcement figures have sharply criticized the companies for theencryption,arguing that it will limit the ability of investigators to pursue legitimate warrants. Earlier this month, FBI Director James Comey said he was "deeply concerned" about the companies' actions in a remarksataBrookings Institution event -- suggesting they had to potential to create a "black hole" that law enforcement count not penetrate.

Others, including The Washington Post's editorial board,have argued that techcompanies should maintain a "golden key" to be used only in the event of a court-approved search warrant. But security experts widely mockedsuchsuggestions, saying thatsuch a universal key amounted to the creation of a backdoor that would fundamentally weaken the mobile device's security and create an avenue that could be exploited bycybercriminals.

"Software systems are incredibly complex, and it is a challenge to protect them from attack even in the most ideal circumstances," saidTom Cross, director of security research at network visibility vendor Lancope, who has written about problems in systems designed to help law enforcement access data. "Deliberately introducing additional vulnerabilities for law enforcement access just makes matters worse we don't know how to design those backdoors reliably."

Andrea Peterson covers technology policy for The Washington Post, with an emphasis on cybersecurity, consumer privacy, transparency, surveillance and open government.

Read more from the original source:
Google officially announces Android 5.0 ‘Lollipop’ with default encryption

Encryption in demand for backup and replication: Veeam

Patrick Budmar | Oct. 28, 2014

When it comes to backup and replication, Veeam has found encryption is one of the most requested feature by businesses.

When it comes to backup and replication, Veeam has found encryption is one of the most requested feature by businesses.

Product strategy specialist, Rick Vanover, said that functionality became a priority for CloudConnect in Availability Suite v8.

"A lot things had to happen to make CloudConnect work, and adding our own encryption helped with that," he said.

Vanover said it was not enough simply to add encryption as a checkbox on the product to say it also encrypts data.

"We did it to help protect people against losing their password," he said.

If the password to the encrypted data is lost, that typically means that the data is already lost.

What Veeam has done is add a mechanism to CloudConnect that can recover the encrypted data even if the password is lost.

"It does not necessarily mean people need to stop managing passwords correctly, but it something goes wrong we have a way," Vanover said.

Read this article:
Encryption in demand for backup and replication: Veeam