{"id":27210,"date":"2014-11-07T03:43:04","date_gmt":"2014-11-07T08:43:04","guid":{"rendered":"http:\/\/www.opensource.im\/?p=27210"},"modified":"2014-11-07T03:43:04","modified_gmt":"2014-11-07T08:43:04","slug":"shadowcrypt-research-project-shows-encryption-approach","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/shadowcrypt-research-project-shows-encryption-approach.php","title":{"rendered":"ShadowCrypt research project shows encryption approach"},"content":{"rendered":"<p><p>14 hours ago by Nancy Owano               <\/p>\n<p>    A team of researchers from UC Berkeley and University of    Maryland believe they have come up with a previously unexplored    design point, ShadowCrypt, that enables encrypted input\/output    without trusting any part of the web applications. That means    they are suggesting a tool that can bring simple encrypted    messaging to webmail and social networking sites. That means    you could send and receive encrypted text on Facebook and    Twitter. MIT Technology Review refers to it as a prototype    browser extension, where the site operator or anyone    intercepting the posting sees only a garbled string of letters    and numbers. The researchers, in their paper, \"ShadowCrypt:    Encrypted Web Applications for Everyone,\" prepared for    presentation at the ACM Conference on Computer and    Communications Security, discussed the chokepoint in their    design.  <\/p>\n<p>    \"This chokepoint encrypts data before the application code (including the client-side code)    can access it. The application can only view an encrypted    version of the data. This requires isolating the input and    output fields while still providing the application access to    the encrypted data. Choosing this chokepoint means that no    application code is in the TCB. This leads to a system secure    against attackers at the client-side as well as the    server-side. It also gives the user complete control over the    data. In contrast, previous proposals required trusting    application developers to handle data in a privacy-preserving    manner.\"  <\/p>\n<p>    They implemented ShadowCrypt as a Google Chrome browser    extension. The extension is available on the Chrome Store for    anyone to try out; ShadowCrypt also has its own web    site.  <\/p>\n<p>    When you install the extension, said the team, you have a few    keys set up by default. These are to see if everything is    working correctly. \"Encryption is great for small group    collaboration,\" said the site. \"You can share your encryption key to allow your collaborators to see    what you've written.\" ShadowCrypt is developed and maintained    by the WebBlaze team, called WebBlaze, from UC Berkeley and    collaborators from University of Maryland. They are Warren He,    Devdatta Akhawe, and Sumeet Jain, and Dawn Song from Berkeley,    and Elaine Shi from the University of Maryland. The source code    is on their GitHub repository.  <\/p>\n<p>    This video is not supported by your browser at this    time.  <\/p>\n<p>    To put ShadowCrypt to work, explained Tom Simonite in MIT    Technology Review, \"you install the extension and then create    encryption keys for each website you wish to use it with. A    small padlock icon at the corner of every text box is the only    indication that ShadowCrypt is hiding the garbled encrypted    version that will be submitted when you hit the 'send' or    'post' button.\"  <\/p>\n<p>    Discussing future work in their paper, the team said \"We are    currently working on supporting additional schemes that can    work transparently,\" such as Format Preserving Encryption and    Attribute-based Encryption. In the longer run, they said their    aim is to support encryption schemes that rely on modifications    to existing web applications to work, such as    Searchable Encryption or Fully Homomorphic Encryption.<\/p>\n<p>     Explore further:     MIT researchers develop Mylar  a platform for building secure    web applications  <\/p>\n<p>    More information:      <a href=\"http:\/\/www.technologyreview.com\/news\/\" rel=\"nofollow\">http:\/\/www.technologyreview.com\/news\/<\/a> ages-on-any-website\/  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Here is the original post:<br \/>\n<a target=\"_blank\" href=\"http:\/\/phys.org\/news334502292.html\/RK=0\/RS=8tALfWICi0eVMQndO.VTYWtldhg-\" title=\"ShadowCrypt research project shows encryption approach\">ShadowCrypt research project shows encryption approach<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> 14 hours ago by Nancy Owano A team of researchers from UC Berkeley and University of Maryland believe they have come up with a previously unexplored design point, ShadowCrypt, that enables encrypted input\/output without trusting any part of the web applications. That means they are suggesting a tool that can bring simple encrypted messaging to webmail and social networking sites. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-27210","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/27210"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=27210"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/27210\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=27210"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=27210"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=27210"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}