Encrypted Data In The Cloud – The Future (2/2)
More on the third and fourth wave: how public key cryptography and searchable encryption can keep your data safe.
The Third Wave - Public Key Cryptography
The idea of public key cryptography was first presented by Martin Hellman, Ralph Merkle, and Whitfield Diffie at Stanford University in 1976. They proposed a method in which the encryption and decryption keys were different, and in which the decryption key could not be determined using the encryption key. Using such a system, the encryption key could be given out publicly, as only the intended recipient would have the decryption key to make sense of it. A common use of this system is for a person to give out a public key to anyone who wishes to send them private information, keeping their private key to themselves. Of course, the encryption algorithm will also need to be public. There are 3 important requirements for a public key encryption method:
- When the decryption process is applied to the encrypted message, the result must be the same as the original message before it was encrypted.
- It must be exceedingly difficult (ideally impossible) to deduce the decryption (private) key from the encryption (public) key.
- The encryption must not be able to be broken by a plaintext attack. Since the encryption and decryption algorithms and the encryption key will be public, people attempting to break the encryption will be able to experiment with the algorithms to attempt to find any flaws in the system.
One popular method for public key encryption was discovered by a group at MIT in 1978, and was named after the initials of the three members of the group: Ron Rivest, Adi Shamir, and Leonard Adleman. Shortly before the details of RSA encryption were to be published, the US government reportedly “asked” the inventors to cancel the publication. However, copies of the article had already reached the public - A.K. Dewdney of Scientific American had a photocopy of the document explaining the algorithm, and more photocopies of this quickly spread. The RSA algorithm was patented by MIT, and then this patent was handed over to a company in California called Public Key Partners (PKP). PKP holds the exclusive commercial license to sell and sub-license the RSA public key cryptosystem. They also hold other patents which cover other public key cryptography algorithms. This gives them absolute control over who may legally use public key cryptography in the US and Canada (Menage, 1994). Since the RSA patent was not applied for until after publication of the algorithm, the patents are only valid inside the US and Canada.
There is a recognised method of breaking RSA encryption based on factoring numbers involved, although this can be safely ignored due to the huge amount of time required to factor large numbers. Unfortunately, RSA is too slow for encrypting large amounts of data, so it is often used for encrypting the key used in a private key method, such as IDEA. This key can then be transferred in public securely, resolving the key security problem for IDEA.
Public key cryptography is a cornerstone of security on the web. In many cases it allows us to transfer the second wave of cryptography, 'symmetric keys', across an untrusted medium. However, it is not sufficient for security, especially when it comes to data residing on third party servers in the cloud.
The Fourth Wave - Searchable Encryption
With a view to addressing the issue of protecting data on third party provider platforms, a number of approaches to operating on data whilst in encrypted form have been developed. The long-term solution to this problem is undoubtedly Fully Homomorphic Encryption (FHE), which allows for data to be operated on and modified whilst in encrypted form (without having to disclose the associated decryption key(s)). A number of FHE schemes have been developed to date, but none are considered efficient enough at this point that they could be utilised in a commercial product.
Other approaches such as Searchable Encryption (SE), which allows for an encrypted document collection to be searched and matching search results retrieved, all whilst in encrypted form, have proven to be much more efficient. Given the wide variety of search functionality supported by modern search engines along with the vast array of cryptographic primitives, a wide variety of Searchable Encryption schemes exist.
SE is a sub-domain of Homomorphic Encryption (HE). This has arisen as the prevalence of Cloud Computing has increased steadily to the point that it is now common practice to outsource storage of data to third party Cloud Service Providers (CSPs). Unfortunately, concerns surrounding the security and privacy of data in the cloud remain. Whilst CSPs support the use of encryption to protect data in-transit and at-rest, they still require access to customers’ decryption keys in order to process data. This is unacceptable to many and the research community has responded by developing encryption schemes that support computations on encrypted data. FHE, a type of encryption that supports arbitrary computation on encrypted data, already exists. However, it remains extremely inefficient.
Other forms of encryption that support specific forms of computation, such as SE, also exist and have been shown to be quite efficient. As an application of cryptography, SE schemes are designed to be secure against an adversarial model. SE schemes are typically designed with a technical environment in mind. Legacy-Compliant SE schemes are designed to be utilised with traditional Relational-Database Management Systems (RDBMS) that utilise Structured Query Language (SQL), whilst custom schemes discuss the operation of SE schemes in a manner that utilises abstract data structures. In the case of SE, this adversary is typically an “honest-but-curious” CSP looking to make deductions and inferences about encrypted documents based on users’ encrypted queries and encrypted search results. Ultimately it means that even if a cloud service is breached, the data is encrypted. Individuals (or companies) are the only ones who retain the private key to unlock the data.
Having data encrypted in the cloud, yet still searchable and updatable is one path to preventing future data breaches. This fourth wave has potential to become the holy grail of cloud security.
We all agree that everything should be encrypted prior to being placed on the cloud. PIE stands for Pre Internet Encryption, which basically refers to best practice in encrypting all information prior to uploading to a third party server. It is not a widely used term but understood by cybersecurity experts. Issue is: It is too simple. It basically means your documents are non-searchable, non-modifiable and non-shareable in a privacy preserving manner. We all agree that cryptography is a powerful tool, both for keeping important information private, and, when in the wrong hands, keeping illegal activities hidden from government agencies. As computers grow faster and methods for breaking encryption become more viable and sophisticated, encryption algorithms will need to be constantly strengthened to stop them becoming insecure. There is little that can be done about the usage of cryptography to keep illegal activities hidden, short of making all forms of strong encryption illegal, which would create an outrage in countries used to freedom in such matters, and would still not guarantee that usage of strong encryption would stop, with steganography allowing even the usage of encryption to be kept hidden.
Vaultree takes the holy grail, FHE, and makes it practical. We developed Enhanced Searchable Symmetric Encryption. With this, we have moved the "bar height" significantly. At this time and to the best of our knowledge, no one is closer in a pragmatic sense where the balance between efficiency and security is maintained at the highest level. Concerning the market, we all know the web is broken in regards to data breaches. Our approach is necessary and applicable to consumers and enterprises alike. No one wishes to have their data leaked, but of course enterprises of all sorts risk large fines and loss of customer confidence. Vaultree's vision is to create an encrypted tomorrow and provide everyone, not just the privileged few, with the most secure place for data, which synchronises with all your devices and third party platforms and tools in the most secure manner possible with today’s and tomorrow’s technology.
More from our blog
What are privacy-enhancing technologies and how do they work?
How innovative encryption technologies will gain traction to keep businesses safe from data leaks
The world’s first Fully Functional Data-In-Use Encryption solution is now generally available
How Vaultree makes CISOs' lives easier