Reducing Metadata Leakage from Encrypted Files and Communication with PURBs

06/08/2018
by   Kirill Nikitin, et al.
0

Most encrypted data formats, such as PGP, leak substantial metadata in their plaintext headers, such as format version, encryption schemes used, the number of recipients who can decrypt the data, and even the identities of those recipients. This leakage can pose security and privacy risks, e.g., by revealing the full membership of a group of collaborators from a single encrypted E-mail between two of them, or enabling an eavesdropper to fingerprint the precise encryption software version and configuration the sender used and to facilitate targeted attacks against specific endpoint software weaknesses. We propose to improve security and privacy hygiene by designing future encrypted data formats such that no one without a relevant decryption key learns anything at all from a ciphertext apart from its length - and learns as little as possible even from that. To achieve this goal we present Padded Uniform Random Blobs or PURBs, an encrypted format functionally similar to PGP but strongly minimizing a ciphertext's leakage via metadata or length. A PURB is indistinguishable from a uniform random bit-string to an observer without a decryption key. Legitimate recipients can efficiently decrypt the PURB even when it is encrypted for any number of recipients' public keys and/or passwords, and when those public keys are of different cryptographic schemes. PURBs use a novel padding scheme to reduce potential information leakage via the ciphertext's length L to the asymptotic minimum of O(log_2(log_2(L))) bits, comparable to padding to a power of two, but with much lower padding overhead of at most 12% which decreases further with large payloads.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
09/29/2022

Data Querying with Ciphertext Policy Attribute Based Encryption

Data encryption limits the power and efficiency of queries. Direct proce...
research
06/29/2023

SWAT: A System-Wide Approach to Tunable Leakage Mitigation in Encrypted Data Stores

Numerous studies have underscored the significant privacy risks associat...
research
08/31/2020

ArchiveSafe: Mass-Leakage-Resistant Storage from Proof-of-Work

Data breaches-mass leakage of stored information-are a major security co...
research
09/05/2018

Multi-Client Order-Revealing Encryption

Order-revealing encryption is a useful cryptographic primitive that prov...
research
09/29/2022

Hidden in Plain Sight: Exploring Encrypted Channels in Android apps

As privacy features in Android operating system improve, privacy-invasiv...
research
02/04/2020

Bicycle Attacks Considered Harmful: Quantifying the Damage of Widespread Password Length Leakage

We examine the issue of password length leakage via encrypted traffic i....
research
07/20/2023

Threshold Encrypted Mempools: Limitations and Considerations

Encrypted mempools are a class of solutions aimed at preventing or reduc...

Please sign up or login with your details

Forgot password? Click here to reset