Category Archives: Encryption
Google Messages Getting Cross-Platform End-to-End Encryption with MLS Protocol – The Hacker News
Jul 24, 2023THNMobile Security / Privacy
Google has announced that it intends to add support for Message Layer Security (MLS) to its Messages service for Android and open source implementation of the specification.
"Most modern consumer messaging platforms (including Google Messages) support end-to-end encryption, but users today are limited to communicating with contacts who use the same platform," Giles Hogben, privacy engineering director at Google, said. "This is why Google is strongly supportive of regulatory efforts that require interoperability for large end-to-end messaging platforms."
The development comes as the Internet Engineering Task Force (IETF) released the core specification of the Messaging Layer Security (MLS) protocol as a Request for Comments (RFC 9420).
Some of the other major companies that have thrown their weight behind the protocol are Amazon Web Services (AWS) Wickr, Cisco, Cloudflare, The Matrix.org Foundation, Mozilla, Phoenix R&D, and Wire. Notably missing from the list is Apple, which offers iMessage.
MLS, as the name implies, is a security layer for end-to-end encryption that facilitates interoperability across messaging services and platforms. It was approved for publication as a standard by IETF in March 2023.
"MLS builds on the best lessons of the current generation of security protocols," IETF noted at the time. "Like the widely used Double Ratchet protocol, MLS allows for asynchronous operation and provides advanced security features such as post-compromise security. And, like TLS 1.3, MLS provides robust authentication."
Central to MLS is an approach known as Continuous Group Key Agreement (CGKA) that allows multiple messaging clients to agree on a shared key that caters to groups in size ranging from two to thousands in a manner that offers forward secrecy guarantees regardless of the individuals who join and leave the group conversation.
"The core functionality of MLS is continuous group authenticated key exchange (AKE)," the standard document reads. "As with other authenticated key exchange protocols (such as TLS), the participants in the protocol agree on a common secret value, and each participant can verify the identity of the other participants."
"That secret can then be used to protect messages sent from one participant in the group to the other participants using the MLS framing layer or can be exported for use with other protocols. MLS provides group AKE in the sense that there can be more than two participants in the protocol, and continuous group AKE in the sense that the set of participants in the protocol can change over time."
This evolving membership is realized by means of a data structure called an asynchronous ratcheting tree, which is used to derive shared secrets among a group of clients. The goal is to be able to efficiently remove any member, achieving post-compromise security by preventing group messages from being intercepted even if one member was breached at some point in the past.
On the other hand, forward secrecy, which enables messages sent at a certain point in time to be secured in the face of later compromise of a group member, is provided by deleting private keys from past versions of the ratchet tree, thereby averting old group secrets from being re-derived.
Mozilla, which is hoping to see a standardization of a Web API to leverage the protocol directly via web browsers, said MLS is designed such that "the legitimacy of new members entering a group is checked by everyone: there is nowhere to hide."
See more here:
Google Messages Getting Cross-Platform End-to-End Encryption with MLS Protocol - The Hacker News
Hacking police radios: 30-year-old crypto flaws in the spotlight – Naked Security
If youd been quietly chasing down cryptographic bugs in a proprietary police radio system since 2021, but youd had to wait until the second half of 2023 to go public with your research, how would you deal with the reveal?
Youd probably do what researchers at boutique Dutch cybersecurity consultancy Midnight Blue did: line up a world tour of conference appearances in the US, Germany and Denmark (Black Hat, Usenix, DEF CON, CCC and ISC), and turn your findings into a BWAIN.
The word BWAIN, if you havent seen it before, is our very own jocular acronym thats short for Bug With An Impressive Name, typically with its own logo, PR-friendly website and custom domain name.
(One notorious BWAIN, named after a legendary musical instrument, Orpheuss Lyre, even had a theme tune, albeit played on a ukulele.)
This research is dubbed TETRA:BURST, with the letter A stylised to look like a shattered radio transmission mast.
TETRA, if youve never heard of it before, is short for Terrestrial Trunked Radio, originally Trans-European Trunked Radio, and is widely used (outside North America, at least) by law enforcement, emergency services and some commercial organisations.
TETRA has featured on Naked Security before, when a Slovenian student received a criminal conviction for hacking the TETRA network in his own country after deciding that his vulnerability reports hadnt been taken seriously enough:
Trunked radio needs fewer base stations and has a longer range than mobile phone networks, which helps in remote areas, and it supports both point-to-point and broadcast communications, desirable when co-ordinating law enforcement or rescue efforts.
The TETRA system, indeed, was standardised back in 1995, when the cryptographic world was very different.
Back then, cryptographic tools including the DES and RC4 ciphers, and the MD5 message digest algorithm, were still in widespread use, though all of them are now considered dangerously unsafe.
DES was superseded at the start of the 2000s because it uses encryption keys just 56 bits long.
Modern computers are sufficiently fast and cheap that determined cryptocrackers can fairly easily try out all possible 256 different keys (whats known as a brute-force attack, for obvious reasons) against intercepted messages.
RC4, which is supposed to turn input data with recognisable patterns (even a text string of the same character repeated over and over) into random digital shredded cabbage, was found to have signficant imperfections.
These could be used to used to winkle out plaintext input by performing statistical analysis of ciphertext output.
MD5, which is supposed to produce a pseudorandom 16-byte message digest from any input file, thus generating unforgeable fingerprints for files of any size, turned out to be flawed, too.
Attackers can easily trick the algorithm into churning out the same fingerprint for two different files, annihilating its value as a tamper-detection tool.
End-to-end encryption for individual online transactions, which we now take for granted on the web thanks to secure HTTP (HTTPS, based on TLS, short for transport layer security), was both new and unusual back in 1995.
Transaction-based protection relied on the brand-new-at-the-time network-leve protocol known as SSL (secure sockets layer), now considered sufficiently insecure that youll struggle to find it in use anywhere online.
Unlike DES, RC4, MD5, SSL and friends, TETRAs 1995-era encryption remains in widespread use to this day, but hasnt received much research attention, apparently for two main reasons.
Firstly, even though its used around the world, its not an everyday service that pops up in all our lives in the way that mobile telephones and web commerce do.
Secondly, the underlying encryption algorithms are proprietary, guarded as trade secrets under strict non-disclosure agreements (NDAs), so it simply hasnt had the levels of public mathematical scrutiny as unpatented, open-source encryption algorithms.
In contrast, cryptosystems such as AES (which replaced DES), SHA-256 (which replaced MD5), ChaCha20 (which replaced RC4), and various iterations of TLS (which replaced SSL) have all been analysed, dissected, discussed, hacked, attacked and critiqued in public for years, following whats known in the trade as Kerckhoffs Principle.
Auguste Kerckhoff was a Dutch-born linguist who ended up as a professor of the German language in Paris.
He published a pair of seminal papers in the 1880s under the title Military Cryptography, in which he proposed that no cryptographic system should ever rely on what we now refer to as security through obscurity.
Simply put, if you need to keep the algorithm secret, as well as the decryption key for each message, youre in deep trouble..
Your enemies will ultimately, and inevitably, get hold of that algorithm
and, unlike decryption keys, which can be changed at will, youre stuck with the algorithm that uses those keys.
Commercial NDAs are peculiarly purposeless for keeping cryptographic secrets, especially for successful products that end up with ever more partners signed up under NDA.
There are four obvious problems here, namely:
The Dutch researchers in this story took the last approach, legally acquiring a bunch of compliant TETRA devices and figuring out how they worked without using any information covered by NDA.
Apparently, they discovered five vulnerabilities that ended up with CVE numbers, dating back to 2022 because of the time involved in liaising with TETRA vendors on how to fix the issues: CVE-2022-24400 to CVE-2022-24404 inclusive.
Obviously, theyre now holding out on full details for maximum PR effect, with their first public paper scheduled for 2023-08-09 at the Black Hat 2023 conference in Las Vegas, USA.
Advance information provided by the researchers is enough to remind us of three cryptographic must-follow rules right away:
Fortunately, it looks as though CVE-2022-24401 has already been quashed with firmware updates (assuming users have applied them).
As for the rest of the vulnerabilities
well have to wait until the TETRA:BURST tour kicks off for fuill details and mitigations.
Read the original:
Hacking police radios: 30-year-old crypto flaws in the spotlight - Naked Security
Nubevas Ransomware Key Interception and Decryption Technology Validated in Third-Party Lab – SecurityWeek
NuRR is a product that claims to intercept and capture the encryption keys at the start of a ransomwares encryption process. With the keys caught, any successful encryption can be rapidly decrypted without paying a ransom.
These claims were tested at MISIs DreamPort facility in Columbia, MD. MISI is a non-profit organization purposed with driving discovery, education, collaboration, and innovation in cybersecurity. The DreamPort facility was created in partnership with US Cyber Command (USCYBERCOM) but is neither owned nor operated by the government. One of the key pillars of MiSis operation is to provide independent validation of product claims for government.
NuRR (Nubeva Ransomware Reversal) was developed by San Jose, California-based Nubeva. The technology involves a small agent operating in the background on each endpoint. It is automatically activated by the first signs of anomalous or mass encryption. It listens to the process and captures and extracts the encryption keys. These keys can be used to decrypt any files successfully encrypted by the ransomware.
It is worth noting that NuRR is not a ransomware prevention system. Companies still require ransomware prevention; but NuRR can be considered a fail-safe solution for when prevention fails.
The claims were tested at DreamPort over a four week period. Popular ransomware variants were detonated on Windows endpoints with NuRR installed (99% of ransomware is performed on a Windows OS). Nubeva had no relationship or connection with MiSi during this process.
The primary purpose of the testing was to analyze NuRRs ability to capture ransomware cryptographic keys, and to test whether Nubevas decryptors could then restore the encrypted data. The ransomware variants used in this testing included Lockbit 3, Blackcat/ALPHV, CL0P, PLAY, Black Basta, Ragnar Locker, Conti, REvil, and others amounting to a high percentage of real attacks over the last year.
The results of the testing were made available in July 2023 (summary). NuRR succeeded in all 17 of MISIs tests, with zero failures. It demonstrated 100% success in capturing keys. MISI also noted that the product is simple and secure: it is trivial to implement and use for a junior engineer, and did not introduce observed system instabilities during test. NURR does not open network ports or introduce vulnerabilities into an endpoint as measured by Nmap and BitDefender Total Security.
The MISI report concludes, MISI is excited about this product and believes it shows real promise. Decryption is arguably one of the fastest and lowest data-loss means to recover data from a ransomware attack and, as such, represents a new potential layer of defense. Given these testing results and the simplicity of the NuRR decryption solution, we feel NuRR represents a very real potential safety-net for organizations to consider.
We knew obtaining third-party validation was crucial to prove the viability of our technology for the broader audience. With this validation, we have proof to support our claims, Steve Perkins, CMO and head of product at Nubeva told SecurityWeek. We can help organizations. We can help people. We can decrypt ransomware.
Related: Can Encryption Key Intercepts Solve The Ransomware Epidemic?
Related: New Ransomware With RAT Capabilities Impersonating Sophos
Related: Recycling Giant Tomra Takes Systems Offline Following Cyberattack
See the original post:
Nubevas Ransomware Key Interception and Decryption Technology Validated in Third-Party Lab - SecurityWeek
Almost 50 Years Into the Crypto Wars, Encryption’s Opponents Are … – WIRED
When I contemplate the return of the crypto warsattempts to block citizens use of encryption by officials who want unfettered spying powersI look back with dread on the late Middle Ages. I wasnt alive back then, but one feature of those times lingers in my consciousness. Starting around 1337 and all the way until 1453, England and France fought a series of bloody battles. The conflict went on so long it was immortalized by its centenarian length: We know it as the Hundred Years War.
The crypto wars havent yet reached that mark. (In this column I will be reclaiming the term crypto from its more recent and debased usage by blockchain enthusiasts, too many of whom havent read my 2001 book called, um, Crypto.) Dating from the publication of the groundbreaking 1976 paper that introduced public key cryptographya means of widening access to encryption that was developed just in time for the internetthe skirmish between encryption advocates and their foes in officialdom is only just approaching 50 years.
From the start, government efforts to constrain or outlaw secure encrypted communications were vigorous and persistent. But by the turn of the millennium it appeared the fight was over. Encryption was so obviously critical to the internet that it was built into every browser and increasingly included in messaging systems. Government snooping didnt endcheck out Edward Snowdens revelationsbut certain government elements around the world never got comfortable with the idea that citizens, including the most rotten among us, could share secrets safe from the eyes of surveillants. Every few years, theres a flareup with proposed new regulations, accompanied by scary scenarios from the likes of FBI directors about going dark.
The arguments of the anti-crypto faction are always the same. If we allow encryption to flourish, they plead, were protecting terrorists, child pornographers, and drug dealers. But the more compelling counterarguments havent changed, either. If we dont have encryption, no one can communicate securely. Everyone becomes vulnerable to blackmail, theft, and corporate espionage. And the last vestiges of privacy are gone. Building a back door to allow authorities to peek into our secrets will only make those secrets more accessible to dark-side hackers, thieves, and government agencies operating off the books. And even if you try to outlaw encryption, nefarious people will use it anyway, since the technology is well known. Crypto is toothpaste that cant go back in the tube.
The good news is that so far encryption is winning. After a long period where crypto was too hard for most of us to use, some extremely popular services and tools have end-to-end encryption built in as a default. Apple is the most notable adopter, but theres also Metas WhatsApp and the well-respected standalone system Signal.
Still, the foes of encryption keep fighting. In 2023, new battlefronts have emerged. The UK is proposing to amend its Investigatory Powers Act with a provision demanding that companies provide government with plaintext versions of communications on demand. Thats impossible without disabling end-to-end encryption. Apple has already threatened to pull iMessage and FaceTime out of the UK if the regulation passes, and other end-to-end providers may well follow, or find an alternative means to keep going. Im never going to willingly abandon the people in the UK who deserve privacy, says Signal president Meredith Whittaker. If the government blocks Signal, then we will set up proxy servers, like we did in Iran.
Originally posted here:
Almost 50 Years Into the Crypto Wars, Encryption's Opponents Are ... - WIRED
Apple Threatens to Pull iMessage and FaceTime from U.K. Amid Surveillance Demands – The Hacker News
Jul 22, 2023THNEncryption / Privacy
Apple has warned that it would rather stop offering iMessage and FaceTime services in the U.K. than bowing down to government pressure in response to new proposals that seek to expand digital surveillance powers available to state intelligence agencies.
The development, first reported by BBC News, makes the iPhone maker the latest to join the chorus of voices protesting against forthcoming legislative changes to the Investigatory Powers Act (IPA) 2016 in a manner that would effectively render encryption protections ineffective.
Specifically, the Online Safety Bill requires companies to install technology to scan for child sex exploitation and abuse (CSEA) material and terrorism content in encrypted messaging apps and other services. It also mandates that messaging services clear security features with the Home Office before releasing them and take immediate action to disable them if required without informing the public.
While the fact does not explicitly call out for the removal of end-to-end encryption, it would de facto amount to weakening it as the companies offering the services would have to scan all messages to flag and take them down. This has been viewed as a disproportionate step that allows the government to enforce bulk interception and surveillance.
Apple told the British broadcaster that such a provision would "constitute a serious and direct threat to data security and information privacy."
Earlier this April, a number of messaging apps that currently offer encrypted chats, such as Element, Signal, Threema, Viber, Meta-owned WhatsApp, and Wire, published an open letter, urging the U.K. government to rethink its approach and "encourage companies to offer more privacy and security to its residents."
"The Bill provides no explicit protection for encryption, and if implemented as written, could empower OFCOM to try to force the proactive scanning of private messages on end-to-end encrypted communication services nullifying the purpose of end-to-end encryption as a result and compromising the privacy of all users," the letter read.
Apple, which previously announced its own plans to flag potentially problematic and abusive content in iCloud Photos, abandoned it last year after receiving pushback from digital rights groups over worries that the capability could be abused to undermine users' privacy and security.
Shield Against Insider Threats: Master SaaS Security Posture Management
Worried about insider threats? We've got you covered! Join this webinar to explore practical strategies and the secrets of proactive security with SaaS Security Posture Management.
This is not the first time the tussle between end-to-end encryption vis--vis the need to tackle serious crimes online has cropped up.
In May 2021, WhatsApp sued the Indian government to block internet regulations that would compel the messaging app to break encryption by incorporating a traceability mechanism to identify the "first originator of information" or risk facing criminal penalties. The case is still pending.
Apple's refusal to play ball is in line with its public stance on privacy, one that allows it to position itself as a "privacy hero" among other companies that thrive on collecting user data to serve targeted ads.
But it also rings hollow when considering the fact that every message sent to or received from a non-Apple device is unencrypted SMS does not support end-to-end encryption and could potentially open the door for government surveillance.
Read the original here:
Apple Threatens to Pull iMessage and FaceTime from U.K. Amid Surveillance Demands - The Hacker News
Teams Enhances End-to-End Encryption to Bolster Security – UC Today
Microsoft is launching Collaboration Security for Microsoft Teams, a solution whose features include an enhancement of full end-to-end encryption.
The solution is among several Defender for Office 365 tools and applications being introduced to Teams as Microsoft, and its other features include enhanced visibility into attacks through end-user reporting and the new capability for IT admins and SecOps to auto-purge malicious messages and attachments after their delivery.
Initially announced in March 2023, Collaboration Security for Microsoft Teams is rolling out now, with full, email-style end-to-end encryption arguably its highlight addition.
Sehrish Khan, Product Marketing Manager at Microsoft, wrote in a blog post in March:
With 71 percent of companies admitting that sensitive and business-critical data is regularly shared via collaboration tools like Microsoft Teams, organizations are increasingly realizing the need to make collaboration security an integral part of their overall SOC strategy. Thats why we are bringing the full feature set that customers use to protect their email environments across prevention, detection, and response to Microsoft Teams.
Microsoft state that Collaboration Security for Microsoft Teams was catalysed by the growth of hybrid and remote working, with the risks to data protection, privacy and security inherent to working over UC and collaboration platforms.
Attacks like phishing and ransomware that for decades have primarily used email as an entry point are now also targeting users on collaboration tools with growing frequency, Khan added.
Customers of Microsoft E5, Microsoft E5 Security, or Microsoft Defender for Office 365 can now leverage this update to improve their Teams security.
As well as introducing full end-to-end encryption in Teams, Microsoft also adds capabilities to improve cybersecurity awareness and resilience for business users.
All collaboration security functions will be integrated with the unified security operations (SecOps) experience of Microsoft 365 Defender, Microsofts Extended Detection and Response (XDR). As a result, all signals and alerts will be compiled across other domains, including endpoints, identities, email, DLP, and SaaS apps.
Microsoft now enables users to report suspicious messages directly in Teams, similar to how users can report suspicious emails in Outlook. The security team will be alerted whenever users report suspicious messages and can note them in the 365 Defender portal. This is an update of Microsofts Safe Links feature, initially launched in 2021, which scanned URLs shared in Teams conversations, chats, or channels for possibly malicious content at time-of-click to prevent users from accessing malicious websites.
All user submissions will be compiled into an auto-generated investigation of suspicious URL clicks. This will streamline the experience of reviewing suspicious messages for SOC teams, allowing them to respond more quickly.
The automatic purging of potentially malicious messages and attachments is an intriguing capability. For a faster response and automatic action, we are bringing zero auto purge (ZAP) to Teams, which protects end-users by analysing messages post-delivery and automatically quarantines messages that contain malicious content to stop the actor from compromising the account, Khan wrote.
Once a malicious message or attachment has been identified, the entire Teams ecosystem will be automatically scanned for the same sign of compromise before quarantining all other relevant messages at scale for better protection.
The default configuration for ZAP is to transfer all malicious messages into quarantine, where SOC teams can assess them further before deciding on the next steps, but the policy can also be customised to suit each businesss needs.
Other Collaboration Security features include providing SecOps with proactive tools for the advanced hunting of threats, which comprises a query-based threat-hunting tool that lets admins and SecOps examine up to 30 days of raw data. Microsoft is also adding attack simulation and training tools to bolster education, awareness, and risk assessment to support Teams user resilience against security threats.
Microsoft announced a series of new Copilot capabilities for Teams Phone and Chat. Copilot will be adding generative AI to phone calls for Teams Phone. With this new function, users can make and receive calls from their Teams app on any device and get real-time summarization and insights.
For Teams chat, users can quickly synthesise important information from their chat threads, allowing them to ask specific questions to catch up on the conversation so far, manage key discussion points, and summarise data relevant to their workflows.
Other new Teams features announced at Inspire included the Teams chat window being able to transfer to the Edge browser when opening webpage link from Teams chat, a keyboard shortcut to search chats and channels, collaborative notes in Teams meetings, and enhanced external collaboration requests.
Microsoft launched Bing Chat Enterprise, bringing Bing Chats generative AI features into the business world.
While Bing Chat Enterprises capabilities could be seismic for businesses around the world, Microsoft went to great lengths during the solutions announcement to emphasise how secure and safe its offering will be for companies with anxiety around data protection.
Microsoft emphasised the strength of Bing Chat Enterprises security because the most widely available generative AI solutions have come under close scrutiny in recent weeks and months for their handling of privacy and protection of business data.
The central issue is that OpenAIs ChatGPT, the most generally used generative AI service, leverages user prompts to develop and improve its model unless users deliberately opt out. This has galvanised worries that employees might inadvertently include proprietary or confidential data or information in their prompts, which ChatGPT utilises to answer future queries.
However, when business users utilise Bing Chat Enterprise, their chat data is not saved and, therefore, not extracted to train AI models. No one else can view the users prompts and data.
In this context, Collaboration Security for Microsoft Teams maintains MicrosMicrosoftstment in strengthening its security offerings across its suite.
See the article here:
Teams Enhances End-to-End Encryption to Bolster Security - UC Today
The U.S. Is Falling Behind on Encryption Standards – And That’s a … – eSecurity Planet
eSecurityPlanet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.
The U.S. National Institute of Standards and Technology (NIST) is charged with setting cybersecurity standards and certifying products, yet is woefully behind on both. As new threats emerge were looking at you, quantum computing continued delays could become a crisis.
Two areas that are particularly concerning are delays in FIPS 140-3 certifications and the development of post-quantum cryptography.
FIPS 140-3 sets encryption and protection standards for everything from software, SSDs and HDDs to network switches and new quantum encryption standards, yet product certifications have been running far behind historical norms. As quantum computing technology continues to develop, this problem will become a crisis if it cant be resolved now.
The FIPS 140 standard started in January 1994 with FIPS 140-1, developed by a government and industry working group composed of vendors and users of cryptographic equipment. FIPS 140-2 was issued in May 2001 and FIPS 140-1 was sunsetted a year later.
FIPS-140 became the main input to the international standard ISO/IEC 19790:2006, Security requirements for cryptographic modules, issued in March 2006, so NIST was leading the standards process for much of the world. Hundreds, if not thousands, of products were certified under FIPS 140-2. The vendor community knew how to develop and maintain those products for almost two decades, and historically, certification took from six months to at most 12 months, unless something egregious was found, which did not happen very often because the process was well known and vendors knew what to do and how to do it.
FIPS 140-3 was issued in March 2019 and certification submissions began in September 2020. The FIPS 140-3 standard did not change encryption algorithms or key size. What did change in FIPS 140-3 is that the standard now evaluates security requirements at all stages of cryptographic module creation, including design, implementation and final operational deployment. FIPS 140-3 also requires different authorization levels and users for management activities, similar to what SELinux requires with a SecAdmin user (security admin) and an AuditAdmin (the administrator of the audit files). So the vendor community had some changes to make, but hardware vendors most likely did not have to create a new ASIC with new algorithms and merely had to modify firmware.
Today we are almost three years into FIPS 140-3 submissions, and while we had a Covid shutdown during some of that time, it doesnt explain why there have only been seven FIPS 140-3 certifications as of last week, the last one nearly six months ago (chart below), and another 189 (and growing) in the certification process. I doubt the vendor community is so incompetent that they couldnt comply with the minor changes required to get products certified. Add to this that both hardware and software FIPS 140-2 products are likely gone, as the last submission to FIPS 140-2 was March 2022 and those products likely reached end-of-life some time ago.
FIPS 140-3 certified products as of July 18, 2023
The lack of FIPS 140-3 products is seriously hurting our security posture, and there are no public statements from NIST on when or if the certification process will catch up.
See theTop Enterprise Encryption Products
Those delays are coming at the same time the agency is overseeing a process to evaluate and standardize quantum-resistant public-key cryptographic algorithms.
The facts are pretty simple:
This process has been going on since 2016, and since that time there has been a huge increase in quantum technology and an equally large increase in quantum understanding and interest. Yet seven years later, we have only four algorithms, and one of those, SIKE, was cracked with a single core and one hour of CPU time. This does not give me warm fuzzies that the other NIST algorithms are solid, but I suppose since the others have not yet been publicly shamed, there is hope.
Related content: Confidential Computing Use Cases & Vendors
The delay in developing quantum-resistant algorithms is especially troubling given the time it will take to get those products to market.
It generally takes four to six years with a new standard for a vendor to develop an ASIC to implement the standard, and it then takes time for the vendor to get the product certified, which seems to be taking a troubling amount of time.
I am not sure that NIST is up to the dual challenge of getting the algorithms out and products certified so that vendors can have products that are available before quantum computers can break current technology. There is a race between quantum technology and NIST vetting algorithms, and at the moment the outcome is looking worrisome.
Since NIST is both the standards and certification body for standards for our nation and much of the world, I find the situation both disheartening and pretty scary. Not a week goes by without some new quantum announcement from vendors, and not a day goes by without another major cybersecurity incident.
We deserve and need standards that provide the nation a modicum of security, and we need a standards body that is looking ahead to the future and ensuring that we will be protected. At the moment we have neither, and can only hope that the Biden Administrations Cybersecurity Strategy can fix this.
Read next: Top Full Disk Encryption Software
Read the original post:
The U.S. Is Falling Behind on Encryption Standards - And That's a ... - eSecurity Planet
Asymmetric Encryption Algorithms: What Are They And How Are … – Dataconomy
The need for robust cybersecurity measures has never been more critical than in 2023. Asymmetric encryption algorithms are the guardians of digital security ensuring that sensitive information remains protected and digital interactions stay authenticated.
There are many dangers out there that can harm our sensitive information and disrupt important services. These dangers keep evolving and becoming more advanced, making it harder to stay safe online.
From hackers trying to steal our money to cyber attacks sponsored by governments, the threats are diverse and relentless. They exploit weaknesses in our devices, and software, and even trick us into giving away our information.
To protect ourselves and our data, we need to be aware of these dangers and take measures to stay safe. By understanding the risks and implementing strong security measures, we can better defend against cyber threats and keep our digital lives secure.
Asymmetric encryption algorithms, also known as public-key cryptography, are powerful cryptographic techniques that play a pivotal role in modern cybersecurity. Unlike symmetric encryption, which relies on a single shared secret key for both encryption and decryption, asymmetric encryption algorithms utilize a pair of mathematically related keys a public key and a private key.
The concept behind asymmetric encryption is elegant and innovative. The public key is openly shared with the world, and accessible to anyone who wishes to engage in secure communication with the keys owner. On the other hand, the private key remains a closely guarded secret, known only to the individual or entity to whom it belongs. The ingenious aspect lies in the mathematical relationship between these keys data encrypted with the public key can only be decrypted with the corresponding private key and vice versa.
One of the most significant applications of asymmetric encryption algorithms is secure data transmission. By leveraging the public and private keys, these algorithms ensure that data exchanged between parties remains confidential during transmission, even if intercepted by unauthorized entities. The encryption process transforms the plaintext into an unintelligible ciphertext, and only the intended recipient possessing the corresponding private key can decipher and access the original data.
Asymmetric encryption algorithms are also instrumental in providing digital signatures, which verify the authenticity and integrity of digital messages or documents. Digital signatures are generated using the senders private key and appended to the data. The recipient can then use the senders public key to validate the signature, providing assurance that the message indeed originated from the claimed sender and has not been tampered with during transmission.
Beyond secure communication and digital signatures, asymmetric encryption algorithms find extensive use in file encryption. This application offers a robust solution for protecting sensitive data stored on electronic devices or transmitted across networks. By encrypting files with the intended recipients public key, the data becomes accessible only to the recipient possessing the corresponding private key, ensuring the datas confidentiality.
The concept of confidentiality is central to asymmetric encryption, as it guarantees that only the intended recipients with the appropriate private key can access and decrypt the encrypted data. This safeguard is essential for protecting intellectual property, personal information, financial records, and other sensitive data from unauthorized access and potential data breaches.
Additionally, asymmetric encryption enables the verification of the senders authenticity through digital signatures. Digital signatures provide recipients with a means to ascertain the legitimacy of the sender, reducing the risk of falling victim to phishing attacks or other forms of impersonation.
Moreover, asymmetric encryption enables non-repudiation, a crucial concept in cybersecurity. Non-repudiation ensures that a sender cannot later deny sending a specific message or initiating a particular transaction. The senders private key signs the message or transaction, providing cryptographic proof of the senders involvement and precluding any attempts to disavow the event.
Asymmetric encryption algorithms also play a pivotal role in facilitating secure key exchange techniques. These algorithms enable parties to establish a shared secret key for subsequent symmetric encryption without the need for prior communication or a secure channel. This key-agreement mechanism is essential for establishing secure and confidential communication between parties without the risk of exposing the shared key.
Beyond encryption and digital signatures, asymmetric encryption algorithms contribute to the creation of cryptographic hash functions, which play a critical role in ensuring data integrity. Cryptographic hash functions produce unique fixed-size hash values for input data, making it possible to detect any changes or tampering with the data, no matter how minor.
Finally, in the context of the internet and secure communication, asymmetric encryption plays a crucial role in creating digital certificates. These certificates are integral to establishing the authenticity and identity of entities on the internet, including websites and servers. By relying on asymmetric encryption, digital certificates ensure secure communication and encrypted connections with trusted entities, enhancing the overall security of online interactions.
In asymmetric encryption algorithms, users generate a key pair consisting of a public key and a private key. The public key can be openly shared, while the private key is kept confidential.
To send a secure message to the intended recipient, the sender uses the recipients public key to encrypt the data. Once encrypted, only the recipients corresponding private key can decrypt the information.
Upon receiving the encrypted data, the recipient uses their private key to decrypt it. As the private key is known only to the recipient, the confidentiality of the message remains intact.
In contrast to symmetric encryption, which uses a single key for both encryption and decryption, asymmetric encryption relies on a pair of keys.
Symmetric encryption is faster and more suitable for bulk data encryption, while asymmetric encryption excels in secure key exchange and digital signatures.
Here is a table that provides an overview of these two widely used encryption algorithms:
Both symmetric and asymmetric encryption have their strengths and weaknesses, making them suitable for different use cases. Symmetric encryption excels in speed and efficiency, making it ideal for bulk data encryption.
On the other hand, asymmetric encryption offers secure key exchange and digital signatures, enhancing security in communication and authentication.
The choice between the two encryption methods depends on the specific requirements of the application and the desired level of security.
Several asymmetric encryption algorithms are widely employed in the field of cybersecurity due to their unique features and varying levels of security.
Here are some of the most popular ones:
Triple DES (Data Encryption Standard) is an asymmetric-key block cipher based on the original DES algorithm. It provides enhanced security by applying the DES algorithm three times sequentially, using three different keys.
Each block of data undergoes a series of three transformations, significantly boosting security compared to the original DES. However, Triple DES has become less popular with the rise of more efficient and secure algorithms like AES.
Advanced Encryption Standard (AES) is one of the most widely used symmetric-key encryption algorithms. It replaced the aging Data Encryption Standard and operates on fixed-size data blocks with key lengths of 128, 192, or 256 bits.
AES employs a substitution-permutation network, making it highly secure and efficient for various applications.
RSA Security (Rivest-Shamir-Adleman) is a widely used asymmetric encryption algorithm based on the mathematical properties of large prime numbers.
It involves a key pair a public key for encryption and a private key for decryption. RSA is commonly used for secure key exchange, digital signatures, and secure communication.
Blowfish is an asymmetric-key block cipher known for its simplicity, efficiency, and resistance to attacks.
It operates on 64-bit blocks and supports key lengths ranging from 32 to 448 bits. Blowfish is used in secure data storage and transmission, password hashing, and other cryptographic applications.
Twofish is another asymmetric-key block cipher designed as a candidate for the AES competition. Although not selected as the standard, Twofish remains a respected and secure encryption algorithm.
It operates on fixed-size blocks and supports key sizes of 128, 192, or 256 bits.
Cryptographic hash functions, while not exactly one of the asymmetric encryption algorithms, they are vital in cybersecurity. They generate a fixed-size hash value for an input message, ensuring data integrity and enabling digital signatures and password hashing.
Popular hash functions include SHA-1, SHA-256, SHA-3, and MD5 (though MD5 is considered insecure).
Hash-Based Message Authentication Code (HMAC) is a construction that combines a cryptographic hash function with a secret key to provide message authentication and integrity.
Stateful Hash-Based Signature Scheme (SPHINCS) is a post-quantum secure digital signature scheme designed to resist quantum attacks.
Cracking the code: How database encryption keeps your data safe?
CAST (Carlisle Adams and Stafford Tavares) is a family of asymmetric-key block ciphers designed for secure encryption and decryption.
CAST-128 and CAST-256 are popular variants with varying block and key sizes.
Asymmetric encryption is a fundamental pillar of cybersecurity, providing robust mechanisms for secure data transmission, authentication, and digital signatures.
One of the primary applications of asymmetric encryption algorithms is to establish secure communication channels over untrusted networks, such as the Internet. When two parties wish to communicate securely, they exchange their public keys. Each party keeps their private key confidential.
By using the other partys public key to encrypt messages, they ensure that only the intended recipient with the corresponding private key can decrypt and access the information. This mechanism safeguards data confidentiality during transmission and protects against eavesdropping or unauthorized access.
Suppose Alice wants to send a confidential email to Bob. Before sending the message, Alice obtains Bobs public key. She then uses Bobs public key to encrypt the email, ensuring that only Bob, possessing the private key, can read the contents of the email.
Asymmetric encryption algorithms also enables the creation of digital signatures, a critical component for authenticating digital messages or documents. Digital signatures provide a way to verify the origin and integrity of data. The sender uses their private key to generate a digital signature, which is appended to the message.
Recipients can then use the senders public key to verify the signature, ensuring that the message indeed came from the claimed sender and has not been altered during transmission.
For example, a CEO can digitally sign an important company document using their private key. When employees receive the document, they can verify the signature using the CEOs public key to ensure that the document is authentic and has not been tampered with by unauthorized parties.
Asymmetric encryption is also employed for secure file encryption, adding an extra layer of protection to sensitive data stored on devices or transmitted over networks. Instead of using a symmetric key to encrypt the entire file, asymmetric encryption algorithms can be used to encrypt the symmetric key, which is then used for bulk encryption.
Imagine an organization that wants to share confidential files with a partner company. The organization encrypts the files using a randomly generated symmetric key. To securely share the symmetric key, they use asymmetric encryption algorithms. The partner companys public key is used to encrypt the symmetric key before sending it. Upon receiving the encrypted symmetric key, the partner company uses its private key to decrypt it and then uses the symmetric key to decrypt the files.
Asymmetric encryption algorithms areinstrumental in authentication mechanisms such as digital certificates, which are used to establish the authenticity of websites, servers, and individuals on the internet. Digital certificates contain the entitys public key, and a trusted certificate authority signs them, verifying the certificates authenticity.
When a user connects to a secure website (HTTPS), the website presents its SSL/TLS certificate. The users browser can verify the certificates authenticity by checking the signature from a trusted certificate authority. The certificates public key is then used to establish a secure connection and encrypt data during the browsing session.
Asymmetric encryption algorithms ensure non-repudiation, meaning the sender cannot deny sending a particular message or initiating a transaction. The use of the senders private key to sign the message provides cryptographic proof of their involvement.
Parties can use asymmetric encryption to sign contracts digitally. When one party signs a contract using their private key, it proves their agreement to the terms and prevents them from later denying their involvement in the contract.
As you can see, asymmetric encryption algorithms are one of the most important weapons you can use to ensure your and your companys cybersecurity.
Remember, your data is something you should guard as carefully as your ID in your pocket and you should always turn to its guardian angels.
Featured image credit: Freepik.
Read the rest here:
Asymmetric Encryption Algorithms: What Are They And How Are ... - Dataconomy
The Role of Optical Encryption in Safeguarding Internet Privacy – Fagen wasanni
Exploring the Role of Optical Encryption in Safeguarding Internet Privacy
In the digital age, where data is the new gold, safeguarding internet privacy has become a paramount concern. As we increasingly rely on the internet for everything from banking to communication, the need for robust security measures is more pressing than ever. One such measure that is gaining traction is optical encryption, a technology that promises to revolutionize the way we protect our online privacy.
Optical encryption is a method of securing data by converting it into light waves, which are then transmitted over fiber-optic cables. This technology leverages the unique properties of light to create a secure communication channel that is virtually impossible to intercept or decode without the correct decryption key.
The beauty of optical encryption lies in its simplicity and effectiveness. Unlike traditional encryption methods, which rely on complex mathematical algorithms to scramble data, optical encryption uses the physical properties of light to secure information. This makes it incredibly difficult for hackers to intercept or manipulate the data, as they would need to physically tamper with the light waves, a feat that is currently beyond the reach of modern technology.
Moreover, optical encryption offers a level of security that is simply unmatched by other encryption methods. Because it uses light waves to transmit data, it is immune to the electromagnetic interference that can compromise other forms of digital communication. This makes it an ideal solution for securing sensitive information, such as financial transactions or personal communications.
But perhaps the most compelling advantage of optical encryption is its potential to safeguard our internet privacy. In an era where data breaches and cyber-attacks are becoming increasingly common, the need for robust security measures is more urgent than ever. Optical encryption offers a promising solution to this problem, providing a secure communication channel that is virtually impervious to hacking.
However, like any technology, optical encryption is not without its challenges. One of the main hurdles is the need for specialized hardware to transmit and receive the light waves. This can make it expensive and difficult to implement on a large scale. Additionally, while optical encryption is incredibly secure, it is not completely foolproof. If a hacker were able to gain physical access to the fiber-optic cables, they could potentially intercept the light waves and decode the data.
Despite these challenges, the potential of optical encryption to safeguard our internet privacy cannot be overstated. As we continue to rely on the internet for an ever-growing range of activities, the need for robust security measures will only increase. Optical encryption offers a promising solution to this problem, providing a level of security that is unmatched by other encryption methods.
In conclusion, optical encryption represents a significant advancement in the field of data security. Its unique ability to convert data into light waves offers a level of protection that is virtually impervious to hacking, making it an ideal solution for safeguarding our internet privacy. While there are still challenges to overcome, the potential of this technology is undeniable. As we continue to navigate the digital age, optical encryption will undoubtedly play a crucial role in protecting our online privacy.
Excerpt from:
The Role of Optical Encryption in Safeguarding Internet Privacy - Fagen wasanni
Online Safety Bill: Where is encryption now? – DIGIT.FYI
The Online Safety Bill is currently in the House of Lords, where members have adopted a new amendment concerning the regulation of encrypted content.
According to the new amendment, Ofcom, the telecommunications regulator, will have to add an extra reporting stage before it can require technology companies to scanend-to-end encrypted content and messages for child sex abuse material and other illegal content.
The measure for extra scrutiny is meant to give further protections to privacy that is typically secured by end-to-end encryption.
A report by a skilled person will have to be commissioned by Ofcom before the regulator gives notices to technology companies to scan encrypted messages.
The skilled person will be an independent expert, according to Lord Parkinson of Whitely Bay, who spoke at the House of Lords on Wednesday.
Ofcom would need to consider how the scanning of encrypted messages in each circumstance would impact privacy and freedom of expression prior to requiring a company to introduce the technology necessary to read encrypted messages. Further, the regulator would be bound by human rights laws.
But it still remains unclear how end-to-end encryption scanning technology will be rolled out, and how the regulator will balance privacy concerns amid an alarming rise in child sexual abuse content in the UK.
Two other amendments which attempted to impose stricter parameters to Ofcoms encryption scanning notices were dropped in the House of Lords in favour of the newly adopted one.
The first, introduced by conservative Lord Moylan, would have put an outright ban on Ofcom imposing any requirements on weakening or removing of encryption, a move which has been called for by many tech companies like WhatsApp and Signal.
Labour Peer Lord Stevensen of Balmacaras amendment was also dropped, which would have required an independent judicial commissioner to review if an encryption scanning notice would be proportionate prior to its issue by Ofcom.
There still remains a lack of consensus in government on what this bill would mean for privacy and encryption.
The bill excludes text messages, Zoom, and email from the encryption measures, as well as messages sent by law enforcement, the public sector, and emergency responders.
The exclusion of the public sector and law enforcement from scans, especially amid reports of rampant sexual abuse by law enforcement in the UK has pulled into question the effectiveness of this part of the online safety bill, as well as where it is pointed.
Lord Parkinson, however, has assured that scanning encrypted messages would be a last resort if companies were found to not properly manage their risks if child sexual abuse material is continually found on a platform, Ofcom will be able to direct the company to use accredited technology to remove the content.
Even with the extra step, civil groups are saying the protections do not go far enough to ensure privacy and freedom of expression.
Related
See the rest here:
Online Safety Bill: Where is encryption now? - DIGIT.FYI