Category Archives: Encryption

Encryption and Key Management System Market to Show Incredible Growth and Forecast by 2029 | Thales Group, IBM – openPR

Encryption and Key Management System Market

Encryption and Key Management System market report presents an overview of the market on the basis of key parameters such as market size, revenue, sales analysis and key drivers. The market size of global Encryption and Key Management System market is anticipated to grow at large scale over the forecast period (2023-2029). The main purpose of the study report is to give users an extensive viewpoint of the market. The report exhibits both Encryption and Key Management System market quantitative as well as qualitative data with tables and figures displayed in the form of bar graphs, and pie charts. Key drivers as well as challenges of the market are discussed in the report. Also reports provides an in depth analysis of the Encryption and Key Management System market with current and future trends.

In addition, the market research industry delivers the detailed analysis of the global Encryption and Key Management System market for the estimated forecast period. The market research study delivers deep insights about the different market segments based on the end-use, types and geography. One of the most crucial feature of any report is its geographical segmentation of the market that consists of all the key regions. This section majorly focuses over several developments taking place in the region including substantial development and how are these developments affecting the market. Regional analysis provides a thorough knowledge about the opportunities in business, market status& forecast, possibility of generating revenue, regional market by different end users as well as types and future forecast of upcoming years.

Get a Sample PDF of the report @ https://www.themarketinsights.com/request-sample/373079

What`s New for 2023?

Special coverage on Russia-Ukraine war; global inflation; easing of zero-Covid policy in China and its `bumpy` reopening; supply chain disruptions, global trade tensions; and risk of recession.Global competitiveness and key competitor percentage market sharesMarket presence across multiple geographies - Strong/Active/Niche/TrivialOnline interactive peer-to-peer collaborative bespoke updatesAccess to digital archives and Research PlatformComplimentary updates for one year

Key Players in the Encryption and Key Management System market:

Thales Group, IBM, Egnyte, Google, Alibaba Cloud Computing, Box, Amazon, Ciphercloud, Unbound Tech, Keynexus

Cataloging the Competitive Terrain of the Encryption and Key Management System Market:

The report provides an overview of every manufacturers and the products developed by each manufacturer along with the application scope of every product.Data regarding the market share of every company, as well as sales figures concerning each firm, is stated in the report.Details regarding the profit margins and price patterns have been inculcated in the report.

Get a Discount on Research Report @ https://www.themarketinsights.com/check-discount/373079

Segmentation Analysis of the Market:

Global Encryption and Key Management System Market forecast report provides a holistic evaluation of the market. The report offers a comprehensive analysis of key segments, trends, drivers, restraints, competitive landscape, and factors that are playing a substantial role in the market. Global Encryption and Key Management System Market segments and Market Data Break Down are illuminated

By Product Type, the market is primarily segmented into:

Folders/Files, SaaS/Customer Apps

By Applications, the market is segmented into:

Enterprise, Personal

Encryption and Key Management System Market Regional Analysis:

Geographically,this report is segmented into several key regions, with sales, revenue, market share and growth Rate of Encryption and Key Management System in these regions, covering

North America(USA, Canada and Mexico)Europe(UK, Germany, France and the Rest of Europe)Asia Pacific(China, Japan, India, and the Rest of the Asia Pacific region)South America(Brazil, Argentina and the Rest of South America)Middle East and Africa(GCC and Rest of the Middle East and Africa)

** Note - This report sample includes:

Scope For 2024Brief Introduction to the research report.Table of Contents (Scope covered as a part of the study)Top players in the marketResearch framework (structure of the report)Research methodology adopted by The Market Insights

The Global Encryption and Key Management System Market Industry Report Covers The Following Data Points:

: This section covers the global Market overview, including the basic market introduction, market analysis by its applications, type, and regions. The major regions of the global Market industry include North America, Europe, Asia-Pacific, and the Middle-East and Africa. Encryption and Key Management System Market industry statistics and outlook are presented in this section. Market dynamics states the opportunities, key driving forces, market risk are studied.

: This section covers Market manufacturers profile based on their business overview, product type, and application. Also, the sales volume, market product price, gross margin analysis, and share of each player is profiled in this report.

: These sections present the market competition based on sales, profits, and market division of each manufacturer. It also covers the industry scenario based on regional conditions.

: These sections provide forecast information related to Encryption and Key Management System Market for each region. The sales channels include direct and indirect Marketing, traders, distributors, and development trends are presented in this report.

: In these sections, Industry key research conclusions and outcome, analysis methodology, and data sources are covered.

Request for Customization @ https://www.themarketinsights.com/request-customization/373079

The study analyzes numerous factors that are influencing the Encryption and Key Management System market from supply and demand side and further evaluates market dynamics that are impelling the market growth over the prediction period. In addition to this, the Encryption and Key Management System market report provides inclusive analysis of the SWOT and PEST tools for all the major regions. The report offers regional expansion of the industry with their product analysis, market share and brand specifications. Furthermore, the Encryption and Key Management System market study offers an extensive analysis of the political, economic and technological factors impelling the growth of the market across these economies.

In the final section of the report on Encryption and Key Management System Market, the dashboard view of the companies is provided, to compare the current industrial scenario and their contribution in total Encryption and Key Management System Market. Moreover, it is primarily designed to provide clients with an objective and detailed comparative assessment of key providers specific to a market segment. Report audiences can gain segment-specific manufacturer insights to identify and evaluate key competitors based on the in-depth assessment of their capabilities and success in the Encryption and Key Management System Marketplace.

What makes the information worth buying?

A comprehensive and in-depth overview of the global Encryption and Key Management Systemindustry in exchange, use, and geographical area sectors is provided.

This research looks at the industry rewards and constraints that influence industry growth.

Developing business strategies and aspects to aid in an emerging market.

Examining free markets and developing appropriate strategies.

Direct Contact:Jitendra Kotwal +1 (614) 602 2897 | +919926555007Email - sales@themarketinsights.comWebsite - https://www.themarketinsights.com

About us:

Delivering foresights along with statistical analysis of the operational business industry impacts has been our foremost priority. With the constant developments in the research & development industry, we have always challenged the conventional research methodologies and discovered new research tactics to evolve the growing B2B requirements.

This release was published on openPR.

Excerpt from:
Encryption and Key Management System Market to Show Incredible Growth and Forecast by 2029 | Thales Group, IBM - openPR

Dutch authorities helped crack hundreds of criminals’ encrypted … – NL Times

The Netherlands Forensic Institute (NFI) and authorities in seven other countries have succeeded in breaking into hundreds of criminals encrypted phones. Access to these highly secured smartphones has provided evidence in dozens of Dutch criminal cases, NOS reports.

These successes formed part of a European project in which investigative services and companies from eight countries worked together to find ways into encrypted phones of various models. The project started in 2020 and ends this month.

Cryptophones are ordinary smartphones with extra security and encryption software to communicate securely. Getting access to the data on such phones is often challenging, Erwin van Eijk of the NFI told NOS. These days, phones have multiple layers of encryption, and the phones are modified in the software, he said, describing getting to the data as breaking into a bank vault within a bank vault. And its an ever-changing process because, as investigators techniques improve, so does encryption.

In recent years, the police have gained access to and shut down seven providers of encrypted communication, including EncroChat, Sky ECC, and Exclu. The millions of messages confiscated at once resulted in a trove of evidence in hundreds of criminal cases.

The phones the NFI helped crack involve individual cryptophones seized during police arrests or raids. According to the Public Prosecution Service (OM), being able to break into an individual cryptophone is often crucial in criminal cases. It often concerns evidence that we could not collect in any other way, prosecutor Martijn Egberts told NOS. Experience shows that every cracked phone provides direct insight into criminal offenses, from drug transport to violence.

More here:
Dutch authorities helped crack hundreds of criminals' encrypted ... - NL Times

UK Government Slammed For Encryption Mistruths – Infosecurity Magazine

The technology secretary has drawn the ire of encryption experts by repeating false claims and half-truths about the Online Safety Bill.

The proposed legislation will effectively force private messaging companies that use end-to-end encryption toscan their users content for child abuse material. This would require users to download client-side scanning software to read messages on their devices before theyre encrypted.

Michelle Donelan told Radio 4s Today program: Technology is in development to enable you to have encryption as well as to be able to access this particular information.

This prompted a furious backlash from experts.

Matthew Hodgson, CEO of secure messaging app Element, branded the statement as factually incorrect.

No technology exists which allows encryption and access to this particular information. Detecting illegal content means all content must be scanned in the first place. By adding the ability to use scanning technology at all, you open the floodgates to those who would exploit and abuse it, he said.

You put the mechanism in place for mass surveillance on UK citizens by the good guys and the bad. It is utterly unacceptable to attempt to force tech companies to implement mass surveillance within their products.

Read more on the Online Safety Bill: Security Experts Raise Major Concerns With Online Safety Bill

Donelan added that the onus is on tech companies to invest in technology to solve this issue. Its an argument often repeated by lawmakers and law enforcers but roundly dismissed by technology experts as either disingenuous or ignorant.

Countless experts, from private companies to academics and civil society organizations have told you this technology is impossible to build, Hodgson responded. Is the government expecting every tech company to plough money into a never-ending R&D project that will never result in a workable product?

Matthew Lesh, director of public policy and communications at think tank the Institute of Economic Affairs, joined the criticism.

The governments claims on encryption are delusional. The Online Safety Bill empowers Ofcom to require scanning of private messages undermining encryption and potentially leading the likes of WhatsApp and Signal to leave the UK, he argued.

There is no magic technological solution in existence or development that can protect user privacy while scanning their messages. Its a contradiction in terms.

Privacy experts have also criticized client-side scanning in the past, saying the false positive rate for matches of child abuse material is too high to make it useful.

Continued here:
UK Government Slammed For Encryption Mistruths - Infosecurity Magazine

UK’s promise to protect encryption is ‘delusional,’ say critics – TNW

The British governments promise to protect encryption has been pilloried by security experts and libertarians.

The dispute stems from a section of the Online Safety Bill. Under the legislation, messaging apps would be forced to provide access to private communications when requested by the regulator Ofcom.

Proponents say the measures will combat child abuse, but critics are aghast about the threat to privacy. They fear the plans will facilitate mass surveillance and damage the UKs tech sector. Signal, Whatsapp, and five other messaging apps have all threatened to leave the country if the law is passed.

The British government has sought to allay their concerns. On Thursday,technology minister Michelle Donelansaid the government is not anti-encryption and will protect user privacy.

The <3 of EU tech

The latest rumblings from the EU tech scene, a story from our wise ol' founder Boris, and some questionable AI art. It's free, every week, in your inbox. Sign up now!

Technology is in development to enable you to have encryption as well as to be able to access this particular information, and the safety mechanism that we have is very explicit that this can only be used for child exploitation and abuse, Donelan told the BBC.

Her remarks were quickly lambasted by critics. Matthew Hodgson, CEO of secure messaging app Element which is used by the governments own Ministry of Defense described Donelans claims as factually incorrect.

No technology exists which allows encryption AND access to this particular information. Detecting illegal content means ALL content must be scanned in the first place, he said.

In response to these concerns, the governments cybersecurity chiefs argue they can protect both children and privacy. To do this, they propose using client-side scanning, which involves installing software that detects suspicious activity. Many experts, however, argue that this tech is impossible to build.

You cannot turn scanning on and off, Hodgson said. The government still does not understand how technology or encryption works, despite numerous experts explaining this to them.

Its own Safety Tech Challenge Fund failed to deliver an impossible solution to scan messages without breaking encryption. What more will it take for the government to finally accept how encryption works?

Tech firms are not alone in opposing the plans. Civil rights groups and libertarians have also denounced Donelans comments.

Matthew Lesh, director of public policy and communications at the IEA, a free-market think-tank, described the governments claims as delusional.

There is no magic technological solution in existence or development that can protect user privacy while scanning their messages, he said. Its a contradiction in terms.

These arguments, however, have struggled to convince the general public.

According to a recent YouGov survey, there is strong support for the governments plans. Almost three-quarters (73%) of respondents backed the requirement for tech that can identify child abuse in encrypted messages.

The NSPCC which commissioned the research said the critics are out of step with the public on the issue.

Defenders of encryption are running out of time to win more hearts and minds. The Online Safety Billis expected to become law later this autumn.

Follow this link:
UK's promise to protect encryption is 'delusional,' say critics - TNW

Government not anti-encryption, says Technology Secretary – The Independent

Sign up for the View from Westminster email for expert analysis straight to your inboxGet our free View from Westminster email

The Technology Secretary has defended the Online Safety Bill amid concerns the proposed legislation could undermine the use of encryption by big technology companies.

The long-awaited Bill has drawn industry criticism over plans to give regulator Ofcom greater powers to monitor private information that was previously encrypted.

End-to-end encryption is a security measure that protects data and communications by scrambling them, meaning only the sender and recipient are able to read the data.

It is widely used to safeguard sensitive information, with Signal and fellow messaging service WhatsApp among its high-profile users.

We are not talking about the Government or social media platforms combing through individuals' messages

Technology Secretary Michelle Donelan

However, ministers have insisted the measures contained in the Online Safety Bill are necessary.

I, like you, want my privacy because I dont want people reading my private messages. Theyd be very bored, but I dont want them to do it, Ms Donelan told the BBC.

However, we do know that on some of these platforms they are hotbeds sometimes for child abuse and sexual exploitation.

We have to be able access that information should that problem occur.

She added: Technology is in development to enable you to have encryption as well as to be able to access this particular information, and the safety mechanism that we have is very explicit that this can only be used for child exploitation and abuse.

The long-awaited legislation is due to come back before Parliament in September, with the Bill expected to become law in the autumn.

Ms Donelan stressed the Government did believe in encryption.

We are not talking about the Government or social media platforms combing through individuals messages, she said.

Richard Collard, the NSPCCs head of child safety online policy, called on technology companies to show leadership on the issue.

The Online Safety Bill sets out a balanced settlement that should encourage companies to mitigate the risks of child sexual abuse when designing and rolling out features like end-to-end encryption.

Our polling shows the UK public overwhelmingly support measures to tackle child abuse in end-to-end encrypted environments, and the specific requirements in the Bill.

Tech firms should be showing industry leadership by listening to the public and investing in technology that protects both the safety and privacy rights of all users, he said.

Originally posted here:
Government not anti-encryption, says Technology Secretary - The Independent

Encryption Flaws in Popular Chinese Language App Put Users’ Typed Data at Risk – The Hacker News

Aug 10, 2023THNPrivacy / Encryption

A widely used Chinese language input app for Windows and Android has been found vulnerable to serious security flaws that could allow a malicious interloper to decipher the text typed by users.

The findings from the University of Toronto's Citizen Lab, which carried out an analysis of the encryption mechanism used in Tencent's Sogou Input Method, an app that has over 455 million monthly active users across Windows, Android, and iOS.

The vulnerabilities are rooted in EncryptWall, the service's custom encryption system, allowing network eavesdroppers to extract the textual content and access sensitive data.

"The Windows and Android versions of Sogou Input Method contain vulnerabilities in this encryption system, including a vulnerability to a CBC padding oracle attack, which allow network eavesdroppers to recover the plaintext of encrypted network transmissions, revealing sensitive information including what users have typed," the researchers said.

CBC, short for cipher block chaining, is a mode of cryptographic operation in which each block of plaintext is XORed with the previous ciphertext block before being encrypted.

Given that a block cipher works on fixed size plaintext blocks, a padding oracle attack could be used to leak data about whether the received ciphertext, when decrypted, has a valid padding. In doing so, a threat actor could decrypt a message without actually knowing the encryption key.

Interestingly, the iOS version of Sogou Input Method was found to be secure against network eavesdropping, although it "would have been the most vulnerable" due to a second defect in the EncryptWall implementation wherein the first half of the encryption key could be trivially recovered.

It's worth noting that the scope of the issues are not limited to Chinese writers in China. Statistics from SimilarWeb show that visits to the app's website shurufa.sogou[.]com also come from the U.S., Taiwan, Hong Kong, and Japan.

Following responsible disclosure in May and June 2023, the problem has been addressed by Tencent in version 13.7 (Windows), 11.26 (Android), and 11.25 (iOS) as of late last month.

"This vulnerability could have been easily avoided by, instead of using 'homebrew' cryptography, adopting TLS, a common and mature cryptographic protocol with ubiquitous availability and up-to-date support," researchers Jeffrey Knockel, Zo Reichert, and Mona Wang said.

"While no cryptographic protocol is perfect, TLS implementations had already ameliorated vulnerability to CBC padding oracle attacks in 2003."

The development coincides with the disclosure of two zero-day flaws, CVE-2023-33241 and CVE-2023-33242 (aka BitForge), in the implementation of cryptographic multi-party computation (MPC) protocols such as GG18, GG20, and Lindell17 2PC used in popular cryptocurrency wallets that, if exploited, could allow "attackers and malicious insiders to drain funds" without their knowledge.

See more here:
Encryption Flaws in Popular Chinese Language App Put Users' Typed Data at Risk - The Hacker News

Downfall bug affects years of Intel CPUs, can leak encryption keys and more – Ars Technica

Enlarge / An 8th-generation Intel Core desktop CPU, one of several CPU generations affected by the Downfall bug.

Mark Walton

It's a big week for CPU security vulnerabilities. Yesterday, different security researchers published details on two different vulnerabilities, one affecting multiple generations of Intel processors and another affecting the newest AMD CPUs. "Downfall" and "Inception" (respectively) are different bugs, but both involve modern processors' extensive use of speculative execution (a la the original Meltdown and Spectre bugs), both are described as being of "medium" severity, and both can be patched either with OS-level microcode updates or firmware updates with fixes incorporated.

AMD and Intel have both already released OS-level microcode software updates to address both issues. Both companies have also said that they're not aware of any active in-the-wild exploits of either vulnerability. Consumer, workstation, and server CPUs are all affected, making patching particularly important for server administrators.

It will be up to your PC, server, or motherboard manufacturer to release firmware updates with the fixes after Intel and AMD make them available.

A DALL-E 2-generated logo for the "Downfall" CPU vulnerability.

Daniel Moghimi/DALL-E 2

We'll cover the Downfall bug first, since it affects a wider swath of processors.

Also known as CVE-2022-40982, the Downfall bug exploits a flaw in the "Gather" instruction that affected Intel CPUs use to grab information from multiple places in a system's memory. According to Google security researcher Daniel Moghimi, the bug causes the CPU to "unintentionally reveal internal hardware registers to software," which "allows untrusted software to access data stored by other programs." Moghimi's proof-of-concept shows Downfall being used to steal encryption keys from other users on a given server, as well as other kinds of data.

For systems that use Intel's Software Guard Extensions (SGX) memory encryption, Intel's microcode fix must be loaded via firmware; for systems without SGX, the new microcode fix can be loaded via firmware or at the OS level.

Moghimi has publisheda white paper (PDF) along with the Downfall website (and its DALL-E 2-generated logo). He says he disclosed the bug to Intel about a year ago and describes Downfall as a "successor" to previous speculative-execution bugs like Meltdown and Fallout.

According to Intel's support pagesone here for the Downfall bug, one here that lays out the status of multiple CVEs across Intel's CPU lineupDownfall affects all processors based on the Skylake, Kaby Lake, Whiskey Lake, Ice Lake, Comet Lake, Coffee Lake, Rocket Lake, and Tiger Lake architectures, along with a handful of others.

For those of you who can't keep your lakes straight, that means most CPUs in Intel's 6th through 11th-generation Core lineups for consumer PCs, sold starting in 2015 and still available in some new systems today. Downfall also affects Xeon server and workstation processors and any Pentium and Celeron processors based on those same architectures.

Not affected are Intel's newer 12th- and 13th-generation CPU architectures (aka Alder Lake and Raptor Lake), low-end CPUs in the Atom, Pentium, and Celeron families (Apollo Lake, Jasper Lake, Gemini Lake, and others), or older CPU architectures like Haswell and Broadwell (currently only officially supported in servers, but also used in 4th- and 5th-generation Core CPUs for consumer PCs).

Intel says that mitigations for downfall can reduce performance for workloads that rely on the Gather instruction by up to 50 percent. There is "an opt-out mechanism" that can disable the fix to restore full speeds, though Moghimi doesn't recommend using it.

If Downfall is a descendant of Meltdown, then Inception, also known as CVE-2023-20569, is a side-channel vulnerability descended from the Spectre bug. It's actually a combination of attacks, one that makes the CPU think that it performed a misprediction, and a second that uses the "phantom speculation" trigger to "manipulate future mispredictions." More detail is available in the white paper (PDF).

The end result, according to security researchers in ETH Zrich's COMSEC group, is a vulnerability that "leaks arbitrary data" on affected Ryzen, Threadripper, and EPYC CPUs. The group published a proof-of-concept video in which they cause a CPU using AMD's latest Zen 4 architecture to leak a system's root password.

Mitigating the risk somewhat, AMD "believes this vulnerability is only potentially exploitable locally, such as via downloaded malware."

COMSEC says that the bug affects "all AMD Zen CPUs," but AMD itself says that Inception fixes are only necessary for processors using Zen 3 or Zen 4-based CPU cores. This includes Ryzen 5000- and 7000-series desktop CPUs, some Ryzen 5000 and 7000-series laptop CPUs, all Ryzen 6000-series laptop GPUs, Threadripper Pro 5000WX workstation CPUs, and 3rd- and 4th-gen EPYC server CPUs. Some AGESA firmware updates for these chips are available now, and others should be available sometime between now and December of 2023, and OS-level microcode updates are available in the meantime.

If you do have an older AMD processor, Zen 2-based Ryzen chips did get their own speculative execution exploit just last month, in the form of "Zenbleed." This bug can also be used to obtain encryption keys and other user information under specific circumstances. As with Inception, OS-level microcode fixes are already available, but AMD may likewise take a few months to release new firmware versions with the fixes incorporated.

See the article here:
Downfall bug affects years of Intel CPUs, can leak encryption keys and more - Ars Technica

Please do not make it public: Vulnerabilities in Sogou Keyboard encryption expose keypresses to network … – Citizen Lab

We urge Sogou Input Method users to immediately update to the most recent version of the app (at least Windows version 13.7, Android version 11.26, or iOS version 11.25).

Compared to typing alphabetic languages whose small number of letters can be represented uniquely by keys, typing logographic languages such as Chinese is more difficult. Chinese has tens of thousands of characters used in varying frequencies, far too many to fit on a single keyboard. There is no standard method of typing Chinese characters, but with the advent of modern technology a number of complementary approaches have emerged. The most popular is the pinyin method, based on the pinyin romanization of Chinese characters. Zhuyin is another popular phonetic input method, and shape or stroke-based input methods like Cangjie or Wubi are also commonly used. Modern input methods also support inputting characters via handwriting, voice recognition, and photograph or OCR (see Figure 1 for illustrations).

While alphabetic keyboards typically provide autocomplete features for more expedient typing, predictive features in Chinese input methods are more crucial when using input methods such as pinyin where hundreds of characters might match an inputted pinyin syllable. For longer strings of syllables, an IME will commonly reach out over the network to a cloud-based service for suggestions if suitable suggestions are not available in the input methods local database.

In this report, we analyze Tencents Sogou Input Method, the most popular Chinese input method with over 455 million monthly active users and versions of the app for multiple platforms, including Windows, Android, and iOS. Sogou Input Method accounts for 70% of Chinese input method users, with products by iFlytek and Baidu taking second and third place, respectively. McAfees 2015 analysis previously observed that the Windows version of the app transmitted device identifiers in the clear without any encryption, but it did not analyze the safety of data transmitted by the apps encryption system.

We analyzed Sogou Input Method on three operating system platforms, finding that the app has troubling vulnerabilities in its custom-designed encryption system which render sensitive data such as the keystrokes that users type decipherable to network eavesdroppers. The vulnerabilities which we discovered are not limited to Chinese writers in China, as market research estimates concerning visitation to the apps website put United States users as comprising over 3.3% of visits, Taiwan as nearly 1.8%, and Japan as over 1.5%.

The remainder of this report is structured as follows. In the Methodology section, we outline the reverse engineering tools and techniques we used to analyze Sogou Input Method. In Findings, we describe how Sogous custom-designed encryption system works, the vulnerabilities which we discovered in it, as well as examples of impacted data transmissions. In Mitigation and Coordinated disclosure, we discuss how Sogou can fix the vulnerabilities that we reported to them and how we reported the vulnerabilities to them. Finally, in Discussion we reflect on how these vulnerabilities speak to systemic issues in the larger Chinese app ecosystem.

We analyzed the Windows, Android, and iOS versions of Sogou Input Method. To procure the versions we analyzed, in May 2023, we downloaded the latest versions of the Windows and Android versions from the product website (the Android version of Sogou Input Method, while available as recently as June 3, 2021, is presently not available in the Google Play Store). We procured the iOS version from Apples App Store (see Table 1 for a breakdown of versions analyzed).

Table 1: Breakdown of versions of Sogou Input Method analyzed and the environments in which they were analyzed.

We analyzed these versions of Sogou Input Method using both static and dynamic analysis methods. We used jadx to statically analyze and decompile Dalvik bytecode and IDA Pro to statically analyze and decompile native machine code. We used frida to dynamically analyze the Android and iOS versions and IDA Pro to dynamically analyze the Windows version. Finally, we used Wireshark and mitmproxy to perform network traffic capture and analysis.

We found that each version of Sogou Input Method encrypts sensitive data using an encryption system that is internally referred to as the EncryptWall encryption system. We found that the Windows and Android versions of Sogou Input Method contain vulnerabilities in this encryption system, including a vulnerability to a CBC padding oracle attack, which allow network eavesdroppers to recover the plaintext of encrypted network transmissions, revealing sensitive information including what users have typed (see Table 2 for a breakdown of versions affected). In the case of the Android version, we are also able to recover the second halves of the symmetric encryption keys used to encrypt traffic. We also found vulnerabilities affecting the encryption implemented in the iOS version, but we are not presently aware of methods to exploit these vulnerabilities in the version which we analyzed.

Table 2: Summary of versions of Sogou Input Method affected.

In the remainder of this section we detail our attacks on Sogous EncryptWall encryption system. We begin by giving background on the encryption system, then detailing our attack on it, and finally we break down how, or whether, the attack applies to the three platforms which we analyzed, adapting our attack for deviations in the implementation of the EncryptWall system across platforms.

The attacks which we discuss in this report concern vulnerabilities that we found in Sogous EncryptWall encryption system, which appears intended for securely tunneling sensitive traffic to unencrypted Sogou HTTP API endpoints via encrypted fields in plain HTTP POST requests. In this report we call the outer, plain HTTP request the EncryptWall request and the single tunneled HTTP request each EncryptWall request encapsulates the tunneled request. Although there were differences in the implementation across the three platforms that we analyzed, we found that the system generally works as follows:

(data) = base64_encode(AES_cbc_encrypt(zlib_compress(data, wbits=-15), k, v))

The three form fields we consistently observed encrypted in this manner are as follows:

Depending on the platform analyzed and the type of request being made, the EncryptWall request may be sent over encrypted HTTPS or plain HTTP. In cases where EncryptWall requests were made over HTTPS, we believe that the requests are secure against network eavesdropping, despite any defects which might exist in the underlying cryptography of the EncryptWall request on account of the HTTPSs TLS cryptography additionally protecting it. Thus, our findings in the remainder of this section only concern EncryptWall requests which we observed being made over plain HTTP which do not benefit from the additional protection of HTTPS.

We found that the EncryptWall system is vulnerable to a CBC padding oracle attack, a type of chosen ciphertext attack originally published in 2002 impacting block ciphers using cipher block chaining (CBC) block cipher mode and PKCS#7 padding. In such an attack, the plaintext of a message can be recovered one byte at a time, using at most 256 messages per byte. While we do not intend to fully reiterate how this attack works here, the attack relies on the existence of a certain kind of side channel called a padding oracle that reveals unambiguously whether the received ciphertext, when decrypted, is correctly padded. We identified such an oracle in the EncryptWall system: we found that a ciphertext sent in the U form field returns an HTTP 400 status code when it contains incorrect padding, whereas, when correctly padded, it returns either a 200 status or 500 status code depending on whether the decrypted URL is a valid URL or not, respectively. By performing a CBC padding oracle attack, this padding oracle allows us to not only reveal the entire plaintext of U but also G and P, since they use the same key and initialization vectors. Thus, by using this padding oracle we can decrypt the contents of the entire EncryptWall request.

In the remainder of this section, we adapt this attack for all deviations in the implementation of the EncryptWall system on the Windows and Android platforms. Although they do not presently appear exploitable, we also detail defects in the EncryptWall system on iOS.

The EncryptWall system implemented in the Windows version that we analyzed deviated from the basic implementation described above in one detail, namely that the IV v, instead of being public, was encrypted in the same manner as the AES key k. Due to this discrepancy, v is not immediately known, which is potentially problematic for our attack for two reasons: first, in the CBC padding oracle attack, the IV must be known in order to decrypt the first block of plaintext. Second, since the data tunneled in the EncryptWall requests is compressed before being encrypted, the first block of plaintext is important for decompressing the remaining blocks.

However, we developed a method to recover v that exploits the fact that v is reused to encrypt multiple plaintexts. Specifically, since the URL U is easily predictable and is ever only one of a small number of possible endpoints, we are able to recover v by performing a CBC padding oracle attack on the first ciphertext block of U, assuming an all zero IV. The result of this attack will be the first plaintext block of the URL XORed with v. We then XOR this result with our prediction for the first plaintext block of the URL, yielding v alone. With v recovered, we can perform the CBC padding oracle attack on G and P as usual.

As one example of the kind of transmitted data vulnerable to this attack, we found that for EncryptWall requests sent to http://get.sogou.com/q, when U was http://master-proxy.shouji.sogou.com/swc.php, G contained version information pertaining to Sogous software, and P was a protobuf buffer containing the keystrokes that had been recently typed in (see Figure 2 for an example). We believe that these transmissions are related to a cloud-based implementation of an autocompletion service. Since these transmissions are vulnerable to our attack, the keystrokes of Sogou Input Method users can be decrypted by a network eavesdropper, informing the eavesdropper of what users are typing as they type.

The Android version which we analyzed adopts the basic implementation of EncryptWall but with the inclusion of four additional form fields: R, S, E, and F. The field R transmits another 32-byte key r. Notably, however, each byte of r is randomly chosen from the 36-character set of ASCII uppercase letters and numbers. Therefore, instead of 25632 = 2256 bits of entropy, the key only has 3632

SEF(data) = base64Encode(k AES_cbc_encrypt(data, r, EscowDorisCarlos))

Note that unlike the typical () function, SEF() features a hard-coded IV EscowDorisCarlos and no zlib compression. Additionally, although SEF() uses r instead of k as an AES key, k is additionally XORed with the result of the AES encryption. Each of the fields S, E, and F are individually encrypted and encoded according to the SEF() function.

Despite the use of this modified cryptography, we were still able to successfully attack the encryption of these fields. We were able to apply the CBC padding oracle attack, using Sogous processing of the E form field instead of the U form field that we typically would use, with the exception of the following two accommodations:

First, since the key k is 32 bytes but AES blocks are 16 bytes, when the output of the AES block cipher is XORed with k, we can think of the output being XORed with two keys k1 and k2, where k1 is XORed with odd-numbered blocks (1, 3, ) and k2 is XORed with even-numbered blocks (2, 4, ) (see Figure 3 for an illustration). Thus, when performing the CBC padding oracle attack, we had to ensure that the block that we were attacking was in an even-numbered position if it was originally even-numbered or in an odd-numbered position if it was originally odd-numbered. In other words, we had to preserve the parity of the blocks position.

Second, since the IV is hard-coded, we cannot modify it and thus, similar to the Windows version, the CBC padding oracle attack cannot recover the first block of plaintext p1 without an adaptation. Namely, we found that p1 was still recoverable for form fields S, E, and F via the following procedure:

Additionally, we can now also recover the second half of r, r2, which is beneficial to an attacker in that our knowledge of r2 can be used to more easily recover k2 in subsequent requests. Recall that the form field R encodes k r. Thus, after recovering k2 we can recover r2 by XORing the second half of the R fields encoded contents with k2. Once r2 is recovered, since r, unlike k, is generated once per application lifetime, we can more easily recover k2 in future requests by simply XORing the second half of R with r2, making the attack even easier to perform in the future. Furthermore, this reduces the entropy of r, and thus, also k, to 3616

As one example of the kind of transmitted data vulnerable to this attack, we observed that for EncryptWall requests sent to http://v2.get.sogou.com/q, when U was http://swc.pinyin.sogou.com/swc.php, P was a protobuf buffer containing all of the text currently present in the input field in which the user is currently typing as well as the package name of the app in which the text was being typed (see Figure 4 for an illustration). These transmissions occurred when pressing the magnifying glass icon, and we believe that these transmissions are related to an image search feature in which typed text is searched against a database of animations and memes which can be inserted into the typed message. Since these transmissions are vulnerable to our attack, the keystrokes of Sogou Input Method users are an example of what a network eavesdropper could decrypt, informing the eavesdropper of what these users are typing as they are typing.

As one other example of the kind of transmitted data vulnerable to this attack, we observed that for EncryptWall requests sent to http://v2.get.sogou.com/q, when U was http://update.ping.android.shouji.sogou.com/update.gif, P was a query string containing a list of every app installed on the Android device. We are unaware of what feature this data transmission is intended to implement. While one can imagine knowing which app a user is presently using may be useful for providing better typing suggestions in that app, it is difficult to imagine how knowing every app that a user has installed can provide better typing suggestions, even apps which users do not intend to use with Sogou Input Method.

The iOS version which we analyzed had no major deviations from the basic EncryptWall implementation. However, unlike on some platforms where we saw some EncryptWall requests sent over encrypted HTTPS and others over plain HTTP, all EncryptWall requests that we observed transmitted by the iOS version which we analyzed were transmitted over HTTPS and thus we believe them to be secure against network eavesdropping. However, we note that without the additional protection of HTTPS, the iOS version would have been the most vulnerable due to the existence of an additional defect in the implementation of EncryptWall. Namely, we found that the iOS version randomly chooses the key k and IV v according to the following code in Figure 5:

Note that before randomly generating the key and again before randomly generating the IV the random number generator is seeded with the current time as seconds since the Unix epoch, rounded down to a whole second. There are two consequences to this behavior: first, the only information needed to derive the AES key k is the time which the request was sent, which any network eavesdropper would be able to easily record. Second, since the random number generator is re-seeded before generating the IV v with what will almost always be the same time in seconds after rounding, v is almost always the first 128 bits of k. Since v is public, all EncryptWall messages reveal the first half of k in v, despite the fact that k is encrypted with a public RSA key.

However, we note again that this defect is not currently exploitable since EncryptWall requests on iOS appear to always be additionally wrapped in HTTPS. However, due to the severity of the defect, we are nevertheless compelled to mention it on account of the fact that previous versions of the iOS version may be impacted and because this code may be reused in other apps which may be vulnerable.

In order to address the reported issues, Sogou Input Method should secure all transmissions using a popular, up-to-date implementation of HTTPS or, more generally, TLS instead of relying on custom-designed cryptography to secure the transmission of sensitive user data. Moreover, Sogou Input Method should not transmit data unnecessary for the functionality of the program.

On May 31, 2023, we disclosed our findings to Tencent in a letter attached here, following our security disclosure vulnerability policy. Below in Table 3 is our disclosure timeline:

Thank you for your interest in Tencent security. There is no low or low security risk for this issue. We look forward to your next more exciting report.

Sorry, my previous reply was wrong, we are dealing with this vulnerability, please do not make it public, thank you very much for your report.

Tencents initial rejection of our disclosure and subsequent about-face served as inspiration for the title of this report.

Thank you for the update. We will publicly disclose the vulnerability after July 31, 2023.

Thank you very much for your report, repair plan and repair time, which have been replied to disclosure@citizenlab.ca by email.

We have not received such an email at that address. However, it has come to our attention that our domain (citizenlab.ca) may not be accessible from China, and therefore emails from China may not be deliverable to it. Could you send a copy of the email you sent to disclosure@citizenlab.ca to another email address of mine, [redacted]@utoronto.ca ? I believe that there should be no issue delivering emails from China to this utoronto.ca address. Thank you.

The email we sent is security@tencent.com, the subject line is: Reply Sogou Pinyin Method vulnerabilities,which may have been classified as junk mail?

Unfortunately we have not received such an email at that address, not even in our spam folder. Would you be able to try sending a copy of the email to another email address of mine, [redacted]@utoronto.ca ? Thank you.

Can you use disclosure@citizenlab.ca to send an unsolicited email to security@tencent.com? Then Ill send the fix details to [redacted]@utoronto.ca.

Yes, we have now sent such an email and are awaiting your response.

Hello again. In the email you sent us you indicated that version 11.25 of the Android app would be upgraded to send EncryptWall requests using HTTPS. We analyzed version 11.25 (SogouInput_11.25_android_sweb.apk) and found that it still does not use HTTPS to transmit all EncryptWall requests, including the ones that we identified in our disclosure. Is version 11.25 still the version of the Android app that should contain these fixes, or will it be in a future release?

The vulnerability has been repaired, please review and check if it still exists. If it has been repaired, please click Repaired; if it has not been repaired, please click Unrepaired.

We clicked Repaired.

Thank you for your feedback. Well look into it internally.

Thank you very much for your feedback, our latest repaired version is 11.26 (SogouInput_11.26_android_sweb.apk, you can download it from our official website: https://shurufa.sogou.com/). If you have any other questions, please let us know.thanks.

We can confirm that you have fixed the vulnerabilities that we reported. We will not publicly disclose the vulnerabilities until after July 31, 2023. We will publish details regarding the security vulnerabilities in a report that will be available on our website: https://citizenlab.ca/ .

Table 3: Vulnerability disclosure timeline.

On July 4, 2023, we evaluated the partial mitigation which the Sogou Input Method developers stated they applied on June 30, 2023, in which, in the case of error, Sogou servers always return the same HTTP status code 400 instead of 400 or 500 depending on whether there is a padding error or some higher level application layer, respectively. While this mitigated our attack on the Windows version of Sogou Input Method as well as our attack on the U, G, and P fields on the Android version, our attack on Androids S, E, and F fields still worked since it relied on distinguishing between HTTP status codes 400 and 200, 200 being a success code and not an error code, and the mitigation only modified the servers to unconditionally return status code 400 in the case of an error.

Table 4: Fixed versions of Sogou Input Method.

In the Sogou Input Method developers July 4 correspondence, they stated that version 13.7 of the Windows version of the app and version 11.25 of the Android and iOS versions of the app would address the issues that we reported. On July 18, 2023, we found that these versions of the app had been released. Note that these updates were released ahead of the July 31 deadline which we imposed. Analyzing the updated Windows version, we found that all EncryptWall traffic was encrypted using the TLS implementation provided by the operating systems WinHTTP service, satisfyingly fixing the vulnerabilities we reported in the Windows version. Recall that we were unaware of any way to exploit the issue which we discovered in the iOS version of the app. Nevertheless, we found via static analysis that the updated version of the iOS version addressed the issue that we reported. Despite version 11.25 being originally identified by the Tencent developers as resolving the vulnerabilities we reported, we found that on July 20, 2023, the Sogou Input Method developers released version 11.26 of the Android app and that this version used TLS to encrypt all EncryptWall traffic, satisfyingly fixing the vulnerabilities we reported in the Android version. Thus, by July 20, 2023, all issues that we reported were fixed (see Table 4 for a summary of fixed versions).

Our difficulties receiving Tencents email response to our disclosure highlight unexpected challenges in disclosing vulnerabilities to companies in certain jurisdictions. After disclosing the vulnerabilities to Tencent, we measured that our email domain (citizenlab.ca) is blocked in China. Specifically, we found that Chinas national firewall injected anomalous DNS replies in response to queries for this domain, including MX record lookups. The injected DNS replies contain an A record with a seemingly arbitrary IP address, even when the lookup was for an MX record, not an A record. When a client making an A record lookup receives one of these injected responses, it will erroneously use the bogus IP address in the injected response. However, for MX records, these injected responses are likely to be interpreted as errors by DNS clients due to receiving an A record in response to an MX lookup, and a DNS clients MX lookup for an injected domain is likely to simply fail rather than erroneously using a bogus record as in the case of A lookups. While this injection behavior may have been intended to block Chinese users from accessing our website, it also hampers the ability for users in China to email us, even if such an email has been solicited.

We cannot be certain that Chinas blocking of our domain is why Tencents email was not delivered to an email server on our domain, but we received some late evidence that further strengthened this hypothesis. The July 27 email that we received at [redacted]@utoronto.ca was also addressed to disclosure@citizenlab.ca. The disclosure@citizenlab.ca address ultimately received the email on July 28, just over 24 hours later. By inspecting the emails headers, we found that the delivery of the email stalled between one of Tencents mail servers and Googles MX servers. As Google is our mail provider in the citizenlab.ca MX records, this finding strengthens the hypothesis that Tencents mail servers were struggling to look up our domains MX records. The email may have eventually been delivered over 24 hours later due to an intermittent failure in Chinas firewall or due to packet loss dropping the firewalls injected DNS responses, allowing the MX lookup on our domain to finally succeed. Therefore, we have chosen to communicate all future disclosures from a different domain that, to our best knowledge, is not blocked in any country, to ensure that we do not fail to receive crucial communication during a coordinated disclosure. Simultaneously, we ask firewall operators to consider how blocking domains may have unintended consequences such as contributing to continued vulnerabilities in the software developed by those behind their firewalls who may be hampered in participating in important dialog during coordinated disclosures.

In this report we detail vulnerabilities in Sogous EncryptWall encryption system as used in Sogou Input Method. However, in this work we did not perform a full audit of Sogou Input Method or make any attempt to exhaustively find every security vulnerability in the software. Our report concerns a single set of related vulnerabilities that we discovered, and the absence of our reporting of other vulnerabilities should not be considered evidence of their absence.

Over the last eight years we have dedicated immense effort analyzing, documenting, and responsibly disclosing vulnerabilities concerning the insecure transmission of sensitive data in Chinese-developed apps. While we have had some success in coordinating with developers to resolve these issues, the ecosystem remains problematic, as here we are, again, reporting on how an unimaginably popular Chinese-developed app fails to adopt even simple best practices to secure the sensitive data which it transmits. In the present case, Sogou Input Method, an app with over 450 million users, failed to properly secure the transmission of sensitive data, including the very keypresses which its users were typing, allowing such data to be recovered by any network eavesdropper. This vulnerability could have been easily avoided by, instead of using homebrew cryptography, adopting TLS, a common and mature cryptographic protocol with ubiquitous availability and up-to-date support. While no cryptographic protocol is perfect, TLS implementations had already ameliorated vulnerability to CBC padding oracle attacks in 2003, two decades prior to the time of this writing. We have come to believe that coordinated security disclosures are sorely inadequate to protect the data of users transmitted by Chinese apps. We believe that holistic change in the software development ecosystem is required to resolve these systemic issues.

Even with the reported vulnerabilities now resolved, the Sogou app relies on transmitting typed content to Sogous servers as part of its ordinary functionality. Keystrokes coming from users anywhere in the world are transmitted to servers in mainland China, which are operating under the legal jurisdiction of the Chinese government. High risk users of Sogou should be cautious, as typed material could include sensitive or personal information. The attacks outlined in this report demonstrate how network eavesdroppers can decipher such data in transit. However, even with the vulnerabilities resolved, such data will still be accessible by Sogous operators and by anyone with whom they share the data.

We would like to thank Jakub Dalek, Pellaeon Lin, Adam Senft, and Mari Zhou for valuable editing and peer review. Research for this project was supervised by Ron Deibert.

Read more:
Please do not make it public: Vulnerabilities in Sogou Keyboard encryption expose keypresses to network ... - Citizen Lab

Navigating the Complex World of Data Encryption: Key Strategies for … – Fagen wasanni

Understanding and Implementing Data Encryption: Essential Tactics for International Businesses

In the digital age, data encryption has become a critical component of business operations, particularly for global businesses that handle sensitive data. As cyber threats continue to evolve, understanding and implementing data encryption is no longer an option but a necessity. This article aims to provide key strategies for navigating the complex world of data encryption.

Data encryption is a method of converting data into a code to prevent unauthorized access. It is a vital tool for protecting sensitive information, such as financial transactions, personal data, and corporate information. With the rise of cybercrime, businesses worldwide are increasingly recognizing the importance of data encryption in safeguarding their data assets.

The first step in implementing data encryption is understanding the different types of encryption algorithms. Symmetric encryption, for instance, uses the same key for encryption and decryption, making it faster but less secure. On the other hand, asymmetric encryption uses different keys for encryption and decryption, offering more security but at the cost of speed. Businesses must carefully consider their specific needs and the nature of their data to choose the most suitable encryption method.

Next, businesses must consider where to apply encryption. Data can be encrypted at rest, in transit, or in use. Encrypting data at rest protects it from physical theft or unauthorized access on storage devices. Encrypting data in transit safeguards it from interception during transmission over networks. Encrypting data in use protects it while being processed or accessed. Each approach has its advantages and challenges, and businesses must evaluate their risk profile and operational requirements to determine the best approach.

Another crucial aspect of data encryption is key management. Encryption keys are what lock and unlock encrypted data. If these keys are lost or fall into the wrong hands, the encrypted data can be compromised. Therefore, businesses must have robust key management policies and procedures in place. This includes regular key rotation, secure key storage, and immediate key revocation in case of a security breach.

Moreover, businesses must stay abreast of the latest developments in encryption technology and regulations. Encryption standards and best practices are continually evolving in response to emerging threats and technological advancements. Similarly, data protection regulations vary across countries and regions, and businesses must ensure their encryption practices comply with these laws to avoid hefty fines and reputational damage.

Lastly, businesses should consider seeking expert advice or outsourcing their encryption needs to a trusted third-party provider. Data encryption is a complex field that requires specialized knowledge and skills. By partnering with experts or reputable service providers, businesses can ensure their data encryption strategy is robust, compliant, and up-to-date.

In conclusion, navigating the complex world of data encryption requires a comprehensive understanding of encryption methods, careful consideration of where to apply encryption, robust key management, staying updated with the latest trends and regulations, and seeking expert advice when needed. By adopting these strategies, global businesses can effectively protect their sensitive data, maintain trust with their customers, and stay ahead in the ever-evolving digital landscape.

Link:
Navigating the Complex World of Data Encryption: Key Strategies for ... - Fagen wasanni

Intel ‘Downfall’ Bug Steals Encryption Keys, Data From Years of CPUs (Update) – Tom’s Hardware

A new security vulnerability, called Downfall, was revealed today by Intel and the researcher who discovered it, Daniel Moghimi. The new attack uses Gather Data Sampling to steal data and other sensitive information from other users on a computer with Intel processors from 2015 through 2019 ranging from sixth gen Skylake through eleventh gen Rocket Lake and Tiger Lake.

Intel has posted about the vulnerability in a security advisory, INTEL-SA-00828, and has reserved CVE-2022-40982.

Moghami, a senior research scientist at Google (and formerly of the University of California San Diego posted details on downfall.page.

"The vulnerability is caused by memory optimization features in Intel processors that unintentionally reveal internal hardware registers to software," Moghami wrote. "This allows untrusted software to access data stored by other programs, which should not be normally be accessible. I discovered that the Gather instruction, meant to speed up accessing scattered data in memory, leaks the content of the internal vector register file during speculative execution."

On the page, Moghami shows demos stealing 128-bit and 256-bit AES keys from other users, as well as spying on typed characters and taking data from the Linux kernel. He suggests that even if you don't own an Intel powered-device, Intel's dominance in the server market means that everyone on the internet is affected, and that "in cloud computing environments, a malicious customer could exploit the Downfall vulnerability to steal data and credentials from other customers who share the same cloud computer."

Intel is releasing microcode for its affected chips. The company "recommends that users of affected Intel Processors update to the latest version firmware provided by the system manufacturer that addresses these issues." If you're not using Intel SGX, a hardware-based memory encryption technology from Intel, you can load it from the operating system.

In a statement to Tom's Hardware, Intel wrote: "The security researcher, working within the controlled conditions of a research environment, demonstrated the GDS issue which relies on software using Gather instructions. While this attack would be very complex to pull off outside of such controlled conditions, affected platforms have an available mitigation via a microcode update. Recent Intel processors, including Alder Lake, Raptor Lake and Sapphire Rapids, are not affected. Many customers, after reviewing Intel's risk assessment guidance, may determine to disable the mitigation via switches made available through Windows and Linux operating systems as well as VMMs. In public cloud environments, customers should check with their provider on the feasibility of these switches.

The overhead, per Moghami and Intel, could be as high as 50% depending on if a workload uses Gather. Notably, Intel will have an "opt-out mechanism" in the microcode that allows the mitigation for Downfall to be disabled in order to "avoid the performance impact on certain vectorization-heavy workloads."

The researcher recommends against opting out: "This is a bad idea. Even if your workload does not use vector instructions, modern CPUs rely on vector registers to optimize common operations, such as copying memory and switching register content, which leaks data to untrusted code exploiting Gather."

Moghami will present Downfall at the BlackHat USA conference on August 9 and USENIX Security Symposium on August 11. His technical paper can be found here.

Newer Intel chips, like 12th Gen Alder Lake, 13th Gen Raptor Lake, and Sapphire Rapids server chips aren't affected.

Updated August 9 with comment from Intel.

Original post:
Intel 'Downfall' Bug Steals Encryption Keys, Data From Years of CPUs (Update) - Tom's Hardware