Category Archives: Encryption

5 Common Encryption Algorithms and the Unbreakables of the …

Mchten Sie diesen Beitrag in Deutsch zu lesen? Lesen Sie die Deutsch-Version hier.

While security is an afterthought for many PC users, its a major priority for businesses of any size. It has to be when the Ponemon Institute tells us that security breaches are costing companies millions every year.

Even if you dont have millions to lose, protecting what you do have should be a high priority.

There are several forms of security technology available, but encryption is one that everyday computer users should know about.

Encryption is an interesting piece of technology that works by scrambling data so it is unreadable by unintended parties. Lets take a look at how it works with the email-friendly software PGP (or GPG for you open source people).

Say I want to send you a private message, so I encrypt it using either one of these programs. Heres the message:

wUwDPglyJu9LOnkBAf4vxSpQgQZltcz7LWwEquhdm5kSQIkQlZtfxtSTsmaw q6gVH8SimlC3W6TDOhhL2FdgvdIC7sDv7G1Z7pCNzFLp0lgB9ACm8r5RZOBi N5ske9cBVjlVfgmQ9VpFzSwzLLODhCU7/2THg2iDrW3NGQZfz3SSWviwCe7G mNIvp5jEkGPCGcla4Fgdp/xuyewPk6NDlBewftLtHJVf =PAb3

Once encrypted, the message literally becomes a jumbled mess of random characters. But, equipped with the secret passcode I text you, you can decrypt it and find the original message.

Come on over for hot dogs and soda!

Whether its in transit like our hot dog party email or resting on your hard drive, encryption works to keep prying eyes out of your business even if they happen to somehow gain access to your network or system.If you want to learn more about how encryption helps protect business data,you can read our article on how encryption aids cloud security.

The technology comes in many forms, with key size and strength generally being the biggest differences in one variety from the next.

Triple DES was designed to replace the original Data Encryption Standard (DES) algorithm, which hackers eventually learned to defeat with relative ease. At one time, Triple DES was the recommended standard and the most widely used symmetric algorithm in the industry.

Triple DES uses three individual keys with 56 bits each. The total key length adds up to 168 bits, but experts would argue that 112-bits in key strength is more like it.

Despite slowly being phased out, Triple DES still manages to make a dependable hardware encryption solution for financial services and other industries.

RSA is a public-key encryption algorithm and the standard for encrypting data sent over the internet. It also happens to be one of the methods used in our PGP and GPG programs.

Unlike Triple DES, RSA is considered an asymmetric algorithm due to its use of a pair of keys. Youve got your public key, which is what we use to encrypt our message, and a private key to decrypt it. The result of RSA encryption is a huge batch of mumbo jumbo that takes attackers quite a bit of time and processing power to break.

Blowfish is yet another algorithm designed to replace DES. This symmetric cipher splits messages into blocks of 64 bits and encrypts them individually.

Blowfish is known for both its tremendous speed and overall effectiveness as many claim that it has never been defeated. Meanwhile, vendors have taken full advantage of its free availability in the public domain.

Blowfish can be found in software categories ranging from e-commerce platforms for securing payments to password management tools, where it used to protect passwords. Its definitely one of the more flexible encryption methods available.

Computer security expert Bruce Schneier is the mastermind behind Blowfish and its successor Twofish. Keys used in this algorithm may be up to 256 bits in length and as a symmetric technique, only one key is needed.

Twofish is regarded as one of the fastest of its kind, and ideal for use in both hardware and software environments. Like Blowfish, Twofish is freely available to anyone who wants to use it. As a result, youll find it bundled in encryption programs such as PhotoEncrypt, GPG, and the popular open source software TrueCrypt.

The Advanced Encryption Standard (AES) is the algorithm trusted as the standard by the U.S. Government and numerous organizations.

Although it is extremely efficient in 128-bit form, AES also uses keys of 192 and 256 bits for heavy duty encryption purposes.

AES is largely considered impervious to all attacks, with the exception of brute force, which attempts to decipher messages using all possible combinations in the 128, 192, or 256-bit cipher. Still, security experts believe that AES will eventually be hailed the de facto standard for encrypting data in the private sector.

Cyber attacks are constantly evolving, so security specialists must stay busy in the lab concocting new schemes to keep them at bay. Expert observers are hopeful that a new method called Honey Encryption will deter hackers by serving up fake data for every incorrect guess of the key code. This unique approach not only slows attackers down, but potentially buries the correct key in a haystack of false hopes. Then there are emerging methods like quantum key distribution, which shares keys embedded in photons over fiber optic, that might have viability now and many years into the future as well.

Whether its protecting your email communications or stored data, some type of encryption should be included in your lineup of security tools. Successful attacks on victims like Target show that its not 100 percent bulletproof, but without it, youre offering up convenient access to your data. Find some tools that give you a piece of mind and stick with em!

View post:
5 Common Encryption Algorithms and the Unbreakables of the ...

SSH Configuration on Nexpose Servers Allowed Weak Encryption Algorithms – Threatpost

Rapid7 encouraged owners of its Nexpose appliancesthis week to apply an update to their systems to tweak how SSH is configured by default.

The company warned on Wednesday the devices were shipped with an SSH configuration that could have let some obsolete KEX, encryption and MAC algorithms be used for key exchange.

Nexpose devices are preconfigured servers, deployed in server racks, designed to help users gauge vulnerabilities, manage vulnerability data, and limit threat exposure. All physical Nexpose appliances are affected per a disclosure by Samuel Huckins, a program manager with the company, published on Wednesday.

Disclosure on CVE-2017-5243: Nexpose hardware appliance SSH enabled obsolete algorithms https://t.co/DHI7uLJ5yj (Thanks to @LiamMSomerville)

Rapid7 (@rapid7) May 31, 2017

Liam Somerville, a researcher based in Scotland, discovered the vulnerability (CVE-2017-5243) and reported it to the company three weeks ago.

Nothing needs to be downloaded to resolve the issue, but a file does need to edited, Rapid7 said. According to Huckins, to fix the vulnerability a user with root access has to edit /etc/ssh/sshd_config in the appliance to ensure only modern ciphers, key exchange, and MAC algorithms are accepted. This should lessen the likelihoodof any attacks involving authentication.

Prior to the fix, weak and out of date encryption algorithms such asAES192-CBC, Blowfish-CBC, and 3DES-CBC, and KEX algorithms such asdiffie-hellman-group-exchange-sha1, could have been enabled.

This change should not impact connections from Nexpose instances to the physical appliance. The main impact is shoring up access by SSH clients such that they cannot connect to the appliance using obsolete algorithms, Huckins wrote.

According to Tod Beardsley, Research Director at Rapid7, the vulnerability could have let an attacker in a privileges position on the network force an algorithm downgrade between an SSH client and Nexpose during authentication.

The privileged position is crucial to making the attack a success, since its a man-in-the-middle (MitM) attack first, the attacker needs to be able to insert himself between the client and server, which usually means the attacker is on the same network as either endpoint, or has compromised an ISP along the way (in which case you have bigger problems), Beardsley told Threatpost late Friday, Once there, the attacker can pose as both sides of the initial SSH handshake, and rewrite the handshake to request one of these older, obsolete algorithms. Once thats done, the attacker then records the session, and then can decrypt the session offline.

Beardsley says that removing server-side support for the algorithms makes the aforementioned kind of attack impractical and that overall, the actual risk of exploitation is fairly low.

These appliances dont tend to be exposed on public networks, so attackers need to be on the inside to begin with, Beardsley said, The whole point of SSH is to be resistant to this kind of session meddling, even in the face of an attacker whos in the right place and has the right expertise and resources to mount this sort attack. By strengthening whats available on the server, we can help keep that promise of confidentiality.

*This article was updated at 4:30 p.m. EST to include comments from Tod Beardsley of Rapid7.

Continued here:
SSH Configuration on Nexpose Servers Allowed Weak Encryption Algorithms - Threatpost

OneLogin data breach may have compromised encrypted information – We Live Security (blog)

OneLogin has admitted that it cannot guarantee the security of encrypted data compromised by a cybercriminal on Wednesday (May 31st).

The firm has confirmed that a review is currently underway to investigate the data breach, which affected its US data region.

Unauthorized access has since been blocked and the incident has been reported to the authorities, with independent security firms also on board to help identify the extent of the incident.

OneLogin found that the cybercriminal had obtained access to a set of AWS keys, and had used them to access the AWS API from an intermediate host with another, smaller service provider in the US.

Affected customers have already been informed, with the company claiming that the attacker was able to access database tables containing various pieces of sensitive information about users, apps and various types of keys.

While insisting that much of its most sensitive data was encrypted, the company admitted that it cnn not guarantee that the cybercriminal has not managed to find a way to decrypt that data.

As a result, it has asked customers to remain vigilant, making several recommendations for action.

According to Bill Buchanan of Edinburgh Napier University, the incident has highlighted the risk of depending on cloud-based systems.

He told the BBC: Increasingly they [companies] need to encrypt sensitive information before they put it within cloud systems, and watch that their encryption keys are not distributed to malicious agents.

It is almost impossible to decrypt data that uses strong encryption, unless the encryption key has been generated from a simple password.

The case once again highlights the importance of properly implementing an encryption solution, particularly for UK companies, which are still likely to remember the 150,000 fine dished out to insurance company Alliance and Leicester at the beginning of the year.

Whether OneLogin could have done more to protect their encrypted data is likely to become clearer in the next few weeks.

Author Editor, ESET

Original post:
OneLogin data breach may have compromised encrypted information - We Live Security (blog)

Enterprise Encryption Solutions – Data at Rest and Data in …

To reduce therisk posed byhackers, insider threats, and other malicious attacks, your organization must utilize encryption to protect sensitive data wherever it is found across your on-premises, virtual, public cloud, and hybrid environments. This includes data at rest in application and web servers, file servers, databases, and network attached storage, as well as data in motion across your network.

As your corporate data assets grow, data-at-rest encryption is a critical last line of defense. Encryption applies security and access controls directly to your sensitive structured and unstructured data - wherever it resides.

In addition to protecting data at rest, enterprises must also address threats to sensitive data as it traverses networks. Data-in-motion encryption ensures your data, video, voice and even metadata is protected from eavesdropping, surveillance, and overt and covert interception. With Gemalto's comprehensive portfolio of SafeNet data-at-rest and data-in-motion encryption solutions, you can secure all types of sensitive data across today's distributed enterprise.

Gemalto's portfolio of data-at-rest encryption solutions delivers transparent, efficient, and unmatched data protection at all levels of the enterprise data stack, including the application, database (column or file), file system, full disk (virtual machine), and network attached storage levels. In addition to working across on-premises, virtual, and cloud environments, these solutions are deployed with the SafeNet KeySecure enterprise key manager for centralized key and policy management .

Learn More About Data-at-Rest Encryption

A powerful safeguard for data in motion, SafeNet High Speed Encryptors deliver proven and certified Layer 2 encryption capabilities that meet secure network performance demands for real time, low latency and near zero overhead to provide security without compromise .

Learn More About SafeNet High Speed Encryptors

Without a comprehensive data protection platform that includes strong encryption to secure and control access to your high-value information, and centralized enterprise key management to secure, manage, and prove ownership of your keys, your sensitive data is at risk. Gemalto's encryption solutions enable your organization to meet your immediate data protection and business needs now, while investing in a platform that provides robust security, a growing ecosystem, and the scalability you need to build a trusted framework for the future.

With Gemalto's encryption solutions, you can meet a wide variety of use cases, including:

Read the original:
Enterprise Encryption Solutions - Data at Rest and Data in ...

Jokowi Officiates Cyber and Encryption Agency – Tempo.co

TEMPO.CO, Jakarta - President Joko Widodo, or Jokowi, ratified a presidential decree on the establishment ofthe Cyber and National Encryption Agency (BSSN). The government is currently focusing on preparing the entire transitional process of the newly built state agency.

Its been ratified. Were now focusing on a quick transition, said Communication and Informatics Minister Rudiantara on Thursday, June 1.

The BSSN will be led by a head leader, main secretary, and several deputies. It will also have an inspectorate as the internal supervisor for the creation of technical regulations, auditory, and work evaluations.

The Head of BSSN will later have toreport to the Political, Legal, and Security Affairs Minister, Wiranto. The representatives from the State Cipher Agency from the Communication and Informatics Ministryand other related state agencieswill also join in the institution.

The plans to establish BSSN had been predicted following the recent global scale WannaCry malware attack. According to Rudiantara, the formation had been planned since 2015.

BSSN will monitor social media activities, suppress the spread of anti-State ideologies, which includes hoax and fake news spreaders.

ARKHELAUS W

Read the original:
Jokowi Officiates Cyber and Encryption Agency - Tempo.co

How to Search on Securely Encrypted Database Fields – SitePoint

This post was originally published on the ParagonIE blog and reposted here with their permission.

We [ParagonIE] get asked the same question a lot (or some remix of it).

This question shows up from time to time in open source encryption libraries bug trackers. This was one of the weird problems covered in my talk at B-Sides Orlando (titled Building Defensible Solutions to Weird Problems), and weve previously dedicated a small section to it in one of our white papers.

You know how to search database fields, but the question is, How do we securely encrypt database fields but still use these fields in search queries?

Our secure solution is rather straightforward, but the path between most teams asking that question and discovering our straightforward solution is fraught with peril: bad designs, academic research projects, misleading marketing, and poor threat modeling.

If youre in a hurry, feel free to skip ahead to the solution.

Lets start with a simple scenario (which might be particularly relevant for a lot of local government or health care applications):

Lets first explore the flaws with the obvious answers to this problem.

The most obvious answer to most teams (particularly teams that dont have security or cryptography experts) would be to do something like this:

In the above snippet, the same plaintext always produces the same ciphertext when encrypted with the same key. But more concerning with ECB mode is that every 16-byte chunk is encrypted separately, which can have some extremely unfortunate consequences.

Formally, these constructions are not semantically secure: If you encrypt a large message, you will see blocks repeat in the ciphertext.

In order to be secure, encryption must be indistinguishable from random noise to anyone that does not hold the decryption key. Insecure modes include ECB mode and CBC mode with a static (or empty) IV.

You want non-deterministic encryption, which means each message uses a unique nonce or initialization vector that never repeats for a given key.

There is a lot of academic research going into such topics as homomorphic, order-revealing, and order-preserving encryption techniques.

As interesting as this work is, the current designs are nowhere near secure enough to use in a production environment.

For example, order-revealing encryption leaks enough data to infer the plaintext.

Homomorphic encryption schemes are often repackaging vulnerabilities (practical chosen-ciphertext attacks) as features.

As weve covered in a previous blog post, when it comes to real-world cryptography, confidentiality without integrity is the same as no confidentiality. What happens if an attacker gains access to the database, alters ciphertexts, and studies the behavior of the application upon decryption?

Theres potential for ongoing cryptography research to one day produce an innovative encryption design that doesnt undo decades of research into safe cryptography primitives and cryptographic protocol designs. However, were not there yet, and you dont need to invest into a needlessly complicated research prototype to solve the problem.

I dont expect most engineers to arrive at this solution without a trace of sarcasm. The bad idea here is, because you need secure encryption (see below), your only recourse is to query every ciphertext in the database and then iterate through them, decrypting them one-by-one and performing your search operation in the application code.

If you go down this route, you will open your application to denial of service attacks. It will be slow for your legitimate users. This is a cynics answer, and you can do much better than that, as well demonstrate below.

Lets start by avoiding all the problems outlined in the insecure/ill-advised section in one fell swoop: All ciphertexts will be the result of an authenticated encryption scheme, preferably with large nonces (generated from a secure random number generator).

With an authenticated encryption scheme, ciphertexts are non-deterministic (same message and key, but different nonce, yields a different ciphertext) and protected by an authentication tag. Some suitable options include: XSalsa20-Poly1305, XChacha20-Poly1305, and (assuming its not broken before CAESAR concludes) NORX64-4-1. If youre using NaCl or libsodium, you can just use crypto_secretbox here.

Consequently, our ciphertexts are indistinguishable from random noise, and protected against chosen-ciphertext attacks. Thats how secure, boring encryption ought to be.

However, this presents an immediate challenge: We cant just encrypt arbitrary messages and query the database for matching ciphertexts. Fortunately, there is a clever workaround.

Before you begin, make sure that encryption is actually making your data safer. It is important to emphasize that encrypted storage isnt the solution to securing a CRUD app thats vulnerable to SQL injection. Solving the actual problem (i.e. preventing the SQL injection) is the only way to go.

If encryption is a suitable security control to implement, this implies that the cryptographic keys used to encrypt/decrypt data are not accessible to the database software. In most cases, it makes sense to keep the application server and database server on separate hardware.

Possible use-case: Storing social security numbers, but still being able to query them.

In order to store encrypted information and still use the plaintext in SELECT queries, were going to follow a strategy we call blind indexing. The general idea is to store a keyed hash (e.g. HMAC) of the plaintext in a separate column. It is important that the blind index key be distinct from the encryption key and unknown to the database server.

For very sensitive information, instead of a simple HMAC, you will want to use a key-stretching algorithm (PBKDF2-SHA256, scrypt, Argon2) with the key acting as a static salt, to slow down attempts at enumeration. We arent worried about offline brute-force attacks in either case, unless an attacker can obtain the key (which must not stored in the database).

So if your table schema looks like this (in PostgreSQL flavor):

You would store the encrypted value in humans.ssn. A blind index of the plaintext SSN would go into humans.ssn_bidx. A naive implementation might look like this:

A more comprehensive proof-of-concept is included in the supplemental material for my B-Sides Orlando 2017 talk. Its released under the Creative Commons CC0 license, which for most people means the same thing as public domain.

Depending on your exact threat model, this solution leaves two questions that must be answered before it can be adopted:

Given our example above, assuming your encryption key and your blind index key are separate, both keys are stored in the webserver, and the database server doesnt have any way of obtaining these keys, then any attacker that only compromises the database server (but not the web server) will only be able to learn if several rows share a social security number, but not what the shared SSN is. This duplicate entry leak is necessary in order for indexing to be possible, which in turn allows fast SELECT queries from a user-provided value.

Furthermore, if an attacker is capable of both observing/changing plaintexts as a normal user of the application while observing the blind indices stored in the database, they can leverage this into a chosen-plaintext attack, where they iterate every possible value as a user and then correlate with the resultant blind index value. This is more practical in the HMAC scenario than in the e.g. Argon2 scenario. For high-entropy or low-sensitivity values (not SSNs), the physics of brute force can be on our side.

A much more practical attack for such a criminal would be to substitute values from one row to another then access the application normally, which will reveal the plaintext unless a distinct per-row key was employed (e.g. hash_hmac('sha256', $rowID, $masterKey, true) could even be an effective mitigation here, although others would be preferable). The best defense here is to use an AEAD mode (passing the primary key as additional associated data) so that the ciphertexts are tied to a particular database row. (This will not prevent attackers from deleting data, which is a much bigger challenge.)

Compared to the amount of information leaked by other solutions, most applications threat models should find this to be an acceptable trade-off. As long as youre using authenticated encryption for encryption, and either HMAC (for blind indexing non-sensitive data) or a password hashing algorithm (for blind indexing sensitive data), its easy to reason about the security of your application.

However, it does have one very serious limitation: It only works for exact matches. If two strings differ in a meaningless way but will always produce a different cryptographic hash, then searching for one will never yield the other. If you need to do more advanced queries, but still want to keep your decryption keys and plaintext values out of the hands of the database server, were going to have to get creative.

It is also worth noting that, while HMAC/Argon2 can prevent attackers that do not possess the key from learning the plaintext values of what is stored in the database, it might reveal metadata (e.g. two seemingly-unrelated people share a street address) about the real world.

Possible use-case: Encrypting peoples legal names, and being able to search with only partial matches.

Lets build on the previous section, where we built a blind index that allows you to query the database for exact matches.

This time, instead of adding columns to the existing table, were going to store extra index values into a join table.

The reason for this change is to normalize our data structures. You can get by with just adding columns to the existing table, but its likely to get messy.

The next change is that were going to store a separate, distinct blind index per column for every different kind of query we need (each with its own key). For example:

Every index needs to have a distinct key, and great pains should be taken to prevent blind indices of subsets of the plaintext from leaking real plaintext values to a criminal with a knack for crossword puzzles. Only create indexes for serious business needs, and log access to these parts of your application aggressively.

Thus far, all of the design propositions have been in favor of allowing developers to write carefully considered SELECT queries, while minimizing the number of times the decryption subroutine is invoked. Generally, that is where the train stops and most peoples goals have been met.

However, there are situations where a mild performance hit in search queries is acceptable if it means saving a lot of disk space.

The trick here is simple: Truncate your blind indexes to e.g. 16, 32, or 64 bits, and treat them as a Bloom filter:

It may also be worth converting these values from a string to an integer, if your database server will end up storing it more efficiently.

I hope Ive adequately demonstrated that it is not only possible to build a system that uses secure encryption while allowing fast queries (with minimal information leakage against very privileged attackers), but that its possible to build such a system simply, out of the components provided by modern cryptography libraries with very little glue.

If youre interested in implementing encrypted database storage into your software, wed love to provide you and your company with our consulting services. Contact ParagonIE if youre interested.

Go here to see the original:
How to Search on Securely Encrypted Database Fields - SitePoint

Keybase adds end-to-end encryption to messages on the web – Naked Security

Is Keybase the public key encryption platform that security mavens have been waiting for?

Its been kicking around in slow-burning development for three years, during which time it has released a website, desktop app (Windows, Mac, Linux), mobile (Android, iOS) and chat apps. Last week came an extension to embed Keybase in the Chrome browser.

If this sounds like a standard messaging app mashup, what underpins Keybase is actually far more daring and, potentially, important which is why were writing about it.

Keybase can be described as a system for users to generate a public encryption key (or upload their own existing ones) to verify their online identity with a high degree of certainty.

If this sounds a bit arcane, identity is the fundamental problem that lies at the root of many of securitys woes: nobody has any way of knowing someone is who they say they are and so must proceed based on risky assumptions.

Public key cryptography has tried to solve this by using either a hierarchy of trust (ie, certificates verified by an authority) or a web of trust (ie a network of users who vouch for each other), the latter a concept made famous PGP, Phil Zimmermanns encryption software.

Web of trust sounds intriguing but turned out to be complex, which is why Keybase wants to reprise the idea minus the hard corners.

Users verify their public key in Keybase through Twitter, Facebook, GitHub, Reddit, or Hacker News, each one boosting verification, the more the merrier. A hacker wanting to impersonate someone using a fake key would come up against a wall. In a sense, Keybase is a database of these proofs that verify a public identity.

Keybase wants to build security applications on top of this. With the new Chrome extension loaded, a blue button appears on the profiles of each registered service (such as Twitter) that allows Keybase users to DM each another with end-to-end security.

It also functions as a sort of social network that tells people how to communicate with someone using public keys, including initiating secure file exchanges. Users can follow one another and use keys to communicate securely.

For now, Keybase remains a work in progress. Marketing and documentation isnt great for a company that had a $10.8m funding round in 2015, perhaps because it doesnt want an influx at this stage.

Keybase might simply be trying to build a set of security capabilities that popularise public key encryption, or it might be trying to create a bigger platform that could be used in a number of ways by third parties. Its not yet clear.

The biggest challenge will be to get users engaged in a world where some of what Keybase does is already covered, albeit imperfectly, by apps such as WhatsApp. Verification, identify and public-private keys are all very well but most users dont understand their significance or dont care. Two decades ago, PGP struggled to break out for similar reasons. Security cant afford history to repeat itself.

Read the original post:
Keybase adds end-to-end encryption to messages on the web - Naked Security

Windows 10 tip: Use BitLocker to encrypt your system drive – ZDNet

BitLocker requires a TPM version 1.2 or later for a standard configuration.

Most modern business-class PCs that were designed for Windows 10 support BitLocker Drive Encryption. With BitLocker encryption turned on for the system drive, an attacker who steals your device but doesn't have your sign-in credentials is completely locked out of your data.

The requirements for BitLocker Drive Encryption are fairly simple. Your hardware must include a Trusted Platform Module (TPM) chip, version 1.2 or later, and you must be running a business edition of Windows 10: Pro, Enterprise, or Education. (It's possible to enable BitLocker without a TPM, using a USB flash drive to store the encryption key, but I don't recommend it.)

To see whether your PC has a TPM chip (and, if so, which version), follow these steps:

If that seems like too much work, just run the BitLocker Encryption Wizard, which includes its own compatibility checker.

Open File Explorer, click This PC, right-click the icon for your system drive (usually drive C), and then click Turn on BitLocker. If your system doesn't meet the specifications, you'll get an error message. If everything's clear, you can follow the wizard's prompts to save your recovery key and begin the encryption process.

Previous tip: Create direct shortcuts to shared network folders

Next week: Another Windows 10 tip from Ed Bott

Read the original here:
Windows 10 tip: Use BitLocker to encrypt your system drive - ZDNet

Green Party amends impending misconception of ending end-to-end encryption – The indy100

On the Andrew Marr show this morning, Green Party leader Caroline Lucas said she wanted to end end-to-end encryption.

This subsequently trended with lots of people on Twitter expressing their shock at the claims, not toeing the line withGreen Party policy.

The question, asked by Andrew Marr was:

You say in your manifesto, you think the internet should be 'free of state and corporate surveillance with our rights and freedoms protected.'

In these circumstances, and knowing that jihadi groups and extremist groups use encrypted messaging on the internet and also use the internet to provide their hate-filled messages.

Do you really think that's a sensible policy?

Lucas responded by saying Green Party policy is about opposing the large scale at which people are on the domestic extremist list. She acknowledged that she herself is onthis list.

He then asked:

Do you think that ending end-to-end encryption is wrong?

Lucas replied:

Do I think that ending end-to-end encryption is wrong? No.

Then Marr, somewhat confusingly asked:

So you would like to see an end to it, this end-to-end encryption, very very controversial, I'll be talking to the Home Secretary about it later on.

You would like to see that ended?

She replied that the bottom line for the Green Party is taking advice from security services about what keeps us safe.

Lucas later clarified the remarks that the Green Party do not want to see an end-to-end encryption, and that she was confused by the wording of the question.

She also asserted that she knew what it was despite a lot of speculation on Twitter.

In particular, the light has been shone on Home Secretary Amber Rudd, who critics accuse of not understanding it.

Encryption, by the way, is a service that ensure messages between two devices or users are only readable between those communicating.

Popular messaging services WhatsApp uses end-to-end encryption.

If you decrypt the service that keeps messages private, it essentially renders every message on the service readable. You can't selectively decrypt.

So when Marr asked if Lucas wanted to end end-to-end encryption, he was asking if she wanted to make it illegal to have a messaging service that's unable to be read by the government.

More: Amber Rudd talked about WhatsApp encryption and everyone is correcting her

Go here to read the rest:
Green Party amends impending misconception of ending end-to-end encryption - The indy100

EU GDPR compliance puts focus on data tracking, encryption – TechTarget

The EU's General Data Protection Regulation officially goes into effect in less than a year, but enterprises will need to know more than the impending deadline and potential monetary penalties to navigate the complexities of GDPR compliance.

The EU GDPR will be enforced starting on May 25, 2018, and noncompliance for protecting personal information of EU residents could result in financial penalties as high as 4% of a company's annual revenue or 20 million euros -- whichever is greater. According to some experts, the most important thing to remember about becoming EU GDPR-compliant is the data being protected under the new regulation represents personal information about actual human beings.

"All too often, people view personal data as just another piece of information that they are working with -- a commodity," said Elizabeth Maxwell, mainframe technical director at Compuware Corp., a mainframe software company headquartered in Detroit. "However, this data represents a real person and should therefore be respected. They need to look at data and develop some empathy for the person to whom it belongs. How would they feel if their data was misused, leading to distress, fraud or reputational damage?"

Patrick McGrath, director of solutions marketing at Commvault, a data protection company headquartered in Tinton Falls, N.J., agreed, saying companies need to protect personal data regardless of whether it's in their data center or a third-party cloud service.

"Even if breached data was not stored on premises under your direct control, it is still your responsibility to determine whether or not personal information could have been compromised, and if so, to enact notification procedures," McGrath said. "They are your customers, prospects, donors and employees."

Jason Rose, senior vice president of marketing at Gigya Inc., a customer identity and access management company headquartered in Mountain View, Calif., suggested EU GDPR may foster relationships both inside and outside the organization.

"GDPR compliance isn't possible when teams are working in silos. Security professionals need to link arms with marketing, IT and legal because GDPR's requirement for 'privacy by design' demands new approaches to customer relationships," Rose said. "This includes giving customers complete control over their data, along with clear and concise terms of service that explain how customer data will be used."

Complying with a new set of data privacy regulations -- especially when a company already faces existing privacy regulations, such as HIPAA, Sarbanes-Oxley or the Payment Card Industry Data Security Standard -- may seem like a huge burden, but Lacy Gruen, director at RES Software, a digital workspace company headquartered in Radnor, Pa., said it should be considered an opportunity.

"Complying with the regulation is in fact a high-ROI opportunity," Gruen said. "Once businesses get their data protection strategy in order, they'll see that GDPR compliance is a piece of investment that can change the way their organization stores and handles user data for the better. When an organization knows precisely where their data is located, why it's there and who has access to it, that will not only improve analytics-driven decision-making, but will also strengthen defense against data breaches and other cyber-risks."

Noting that companies facing GDPR compliance are allocating big budgets for security, Gruen said it's "a great time to streamline processes and policies for improved efficiency, so IT resources can be redirected to more strategic functions and projects. Regulations change and new legislation continues to pop up, but if an organization takes the right data protection measures now and gets the right tools in place, the benefits will extend well beyond just compliance with GDPR."

Not all experts were as optimistic about the effects of the EU GDPR, though.

Richard Stiennon, chief strategy officer at Blancco Technology Group, a data security company headquartered in Alpharetta, Ga., worried about the possibility that GDPR compliance could prove to be an obstacle for entering or remaining in European markets for some companies.

"Will the compliance requirements be so onerous that companies, especially technology vendors, ban EU data subjects from their services?" Stiennon said. "Imagine the latest and greatest new thing, like a Skype or Angry Birds app, being developed by a couple of engineers in their garage. They may grow to millions of users in a short time frame while not being in a position to employ a data protection officer, let alone fulfill all the other requirements. So, they may block downloads or activations in the EU, thus restricting access to the latest and greatest thing. Even well-established tech companies could decide that doing business in the EU is not worth the hassle and expense."

According to several experts, encryption will be an overlooked but key part of preparing for and complying with GDPR.

"Encryption can be your 'get out of jail free' card," said Nigel Hawthorn, EMEA marketing director at Skyhigh Networks, a cloud security company headquartered in Campbell, Calif., both because "it is a clear investment in a technology to aim to reduce the data loss risk (and any fines are based on the investment in risk reduction)," but also because it eases the requirement to inform data subjects -- people -- whose data has been compromised if that data has been encrypted.

Because GDPR requires that companies incorporate data protection by design and by default, Hawthorn said "internal software engineering teams need to ensure new applications and systems are designed with data protection in mind from the outset. Even though development teams are always looking to deliver fast, data protection cannot be ignored."

Ameesh Divatia, CEO of Baffle Inc., a cloud-centric encryption company based in Santa Clara, Calif., said the first step for enterprises is to find ways to encrypt data that is "in use" at the application layer; the second step is to "minimize or eliminate access to sensitive data and encryption keys by DBAs [database administrators] and network and storage administrators by allowing all database queries to be executed on encrypted data without increased complexity or significant impacts to performance."

McGrath advised organizations to avoid exposing themselves to GDPR penalties by taking care to avoid keeping more personal data than is necessary for their business and legal needs.

"As a best practice, we encourage organizations to use archiving policies that identify instances of personal data, delete, encrypt and/or move data to more secure locations that are fully tracked," McGrath said. "While education is helpful, automation is key. With the rapid adoption of cloud and SaaS [software-as-a-service] application partners, data is becoming further distributed and it demands proper data protection coverage."

With GDPR, businesses will be focusing on securing a specific set of data -- EU personal information. While this is a great start, the danger is that they are focusing on this small set of data when they have problems across their environment. Brian Veccitechnical evangelist at Varonis

Data traceability will also be critical for EU GDPR compliance.

"Security professionals should enforce in their organization true data traceability across data workflows," said Florian Douetteau, CEO of Dataiku, a data science software company headquartered in New York. "When manipulating derived customer data, each column should contain some sensitivity tagging, and each company should evaluate the risk associated to a piece of data whether it is raw, anonymized or aggregated. In order to achieve this, each pipeline transforming the data must transfer and maintain the metadata associated to those risks."

Brian Vecci, technical evangelist at insider threat protection vendor Varonis, based in New York, suggested companies should look beyond the bare minimum requirements for protecting data under EU GDPR and consider the bigger picture.

"With GDPR, businesses will be focusing on securing a specific set of data -- EU personal information. While this is a great start, the danger is that they are focusing on this small set of data when they have problems across their environment," Vecci said. "We saw with the recent WannaCry outbreak that it's not just sensitive files that can do a large amount of damage if attacked or exposed, it's all files. GDPR legislates a lot of common sense data security, but personal data creeps into all sorts of files, and even non-GDPR forms of data need just as much protection."

Drew Nielsen, chief trust officer at cloud data protection provider Druva, based in Sunnyvale, Calif., agreed about the need to track down all the data.

"The most overlooked aspect of GDPR that no one is focusing on is to understand an organization's data attack surface," Nielsen said. "Since GDPR is all about the data, if an organization does not have a solid handle on all the places that structured and unstructured information is stored -- which includes endpoints, servers, SaaS-based cloud applications and databases -- there is almost zero chance of complying with GDPR."

Read about dealing with data under GDPR

Learn more tips for GDPR compliance

Browse the essential guide to GDPR for more about compliance

More here:
EU GDPR compliance puts focus on data tracking, encryption - TechTarget