New Method Proposed for Secure Government Access to Encrypted Data

  /     /     /  
Publicated : 22/11/2024   Category : security


New Method Proposed for Secure Government Access to Encrypted Data


Crumple Zones in crypto mechanisms can make it possible — but astronomically expensive — to access encrypted data, say researchers from Boston University and Portland State University.



Security experts long have maintained that providing any kind of backdoor access to encrypted data as governments everywhere have been demanding is not possible without seriously undermining the overall security provided by encryption mechanisms.
Now a pair of researchers from Boston University and Portland State University has developed a first-of-its kind cryptographic technique that they say provides something of a middle ground.
At its core is the notion of a sort of crumple zone in cryptographic mechanisms that make it possible - but extremely expensive - for someone to recover keys for decrypting targeted communications, the two researchers said in a paper to be presented at an IEEE symposium next month.
The idea is that, like a crumple zone in automotive engineering, in an emergency situation the construction should break a little bit in order to protect the integrity of the system as a whole, said Charles Wright, assistant professor of computer science at Portland State and Mayank Varia, a research scientist at Boston University.
Far from compromising security, the technique works best when used with the strongest encryption mechanisms.
And in contrast to previous work on this topic, such as key escrow, the crumple zone approach places the responsibility for achieving exceptional access to encrypted data solely on those who want that access.
Software developers and other entities will have to do very little to accommodate the new technique, which can be retrofitted quite easily into existing applications and protocols, the two researchers said.
In essence, the idea proposed by Wright and Varia is to embed two moderately hard-to-solve puzzles into each of the so-called ephemeral keys that are used by applications to encrypt messages.
One of the puzzles, which the researchers have dubbed the crumpling puzzle, is chosen independently for each ephemeral key, and solving the puzzle results in message recovery. The other puzzle, dubbed the abrasion puzzle, is much harder to solve and serves as a gatekeeper to the crumpling puzzle. Only by solving the second puzzle can someone can get to the first puzzle.
An ephemeral key is one that only lasts for an instant, says Wright. It is generated, then its used to encrypt/decrypt one — or maybe a few — messages message typically using a symmetric cipher like AES, and then its discarded.
A new key is generated for each message that needs to be encrypted.
With crumpling, each ephemeral key is carefully weakened, thereby making it recoverable, but only through expensive brute-force techniques. The original key that the application would normally use as the encryption key is itself used to generate a weaker crumpled key, which is then used to perform the actual encryption.
In practice, using crumpling by itself would be dangerous because it allows anybody to recover the key for a message, as long as theyre willing to pay the price for just that one brute-force search, Wright says.
But by integrating the much more expensive to solve abrasion puzzle into the crumpling algorithm, recovering the crumpled key is only possible for someone that has solved the bigger puzzle. In a nutshell, crumpling is a way to make each ephemeral key breakable. Abrasion is a way to limit who can break the crumpled keys, Wright says.
According to Wright and Varia, the crumpled zone approach enables targeted access to encrypted data while ensuring that large-scale surveillance is prohibitively expensive—at least for the moment. It does not impose any new burdens on encryption providers, and introduces very little by way of new system complexity. The method also only enables passive breaches of confidentiality, meaning an attacker wouldnt be able to manipulate anything or change any encrypted data.
Importantly, it shifts the entire onus for gaining targeted access directly to the government.
Special Hardware
Any entity that wants access to data encrypted via the crumpling method would need two kinds of specialized processing hardware - amounting in total to probably several thousand devices, Wright says.
First, they would need specialized processors for accelerating the processing of algorithms for solving the big gatekeeper puzzle.
There is some cost for designing and fabricating the hardware, and also for powering the computation itself, Wright says. Based on previous research, Wright says the cost of building out the infrastructure for cracking the gatekeeper puzzle could easily go up to between $150 million to $2 billion.
They would also need special processors for doing the brute-force search to recover each crumpled key. We purposefully designed the crumpling algorithm so that these processors would be a lot like todays Bitcoin miners, he says. The cost, in terms of power, needed to recover a single key could theoretically be astronomical.
More realistically, we think useful values are probably in the range from $1K up to $1M, which correspond roughly to effective key lengths of 60-70 bits, Wright notes.
To ensure that the costs to recover keys remains high as computation grows cheaper, the security parameters of crumpled keys will need to be updated at regular intervals, he says.
Encrypted messages that are prohibitively expensive to decrypt right now could become a lot less expensive to crack as computing costs get lower.
Assuming that Moores Law holds up over time, then the cost to recover a crumpled key should decay by 1/2 about every 18 months or so, he says. So a message that costs $1 million to decrypt today will cost just $1,000 in 15 years.
If you have information that you need to keep secret for a long time, then you need to use a much stronger key today, Wright says.
For example, by setting the price of cracking the gatekeeper puzzle at $2 billion today, in 15 years it should still cost about $2 million. Thats within the range of what a corporation or a smaller government could afford, but its still a substantial price to pay for access to 15-year-old messages, he notes.  
Wright and Varia have not sought feedback on their proposed cryptographic technique from government or law enforcement agencies as yet. The focus for the moment is on getting feedback from the scientific and tech community.
And it may take several years before the community can design a scheme that is safe for real-world use, Wright says.
This is partly why were not recommending that anyone deploy our constructions as-is in the immediate future, unless its the only way to avoid an even riskier outcome like a total ban on encryption, Wright noted.
Related Content:
Beyond Back Doors: Recalibrating The Encryption Policy Debate
Encryption: A Backdoor For One Is A Backdoor For All
7 Critical Criteria for Data Encryption In The Cloud
 
Join Dark Reading LIVE for two cybersecurity summits at Interop ITX. Learn from the industry’s most knowledgeable IT security experts. Check out the
security track here
.

Last News

▸ ArcSight prepares for future at user conference post HP acquisition. ◂
Discovered: 07/01/2025
Category: security

▸ Samsung Epic 4G: First To Use Media Hub ◂
Discovered: 07/01/2025
Category: security

▸ Many third-party software fails security tests ◂
Discovered: 07/01/2025
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
New Method Proposed for Secure Government Access to Encrypted Data