Long-term Security Vulnerabilities of Encrypted Data
نویسندگان
چکیده
Large amounts of digital data continuously move across the Internet, much of it traveling under a wide variety of encryption and security protections. Such schemes are intended to secure this data against information theft as it traverses the various nodes along the path to its intended destination. While such methods, when properly utilized, may be considered secure in the short-term, many widely employed encryption schemes may not meet consumer expectations over longer periods of time. Historically, such protection schemes tend toward failure; they are broken over time. Given a specific security protocol, increases in computing power and availability, along with advances in hacking methods, tend to produce reduced levels of information content protection. In the long term, even encryption methods considered highly secure today are likely to be far less secure in the future. Therefore, we highlight a little-noted vulnerability that exists for certain classes of information that require longer-term security. Encrypted information, captured and stored today, may be decrypted at some point in the future as more powerful computers and more sophisticated methods become available. This paper provides a first description and analysis of this gap in data security practices. A practical method for auditing and addressing data security vulnerabilities of this type is presented, along with a brief demonstration of its use.
منابع مشابه
Private Key based query on encrypted data
Nowadays, users of information systems have inclination to use a central server to decrease data transferring and maintenance costs. Since such a system is not so trustworthy, users' data usually upkeeps encrypted. However, encryption is not a nostrum for security problems and cannot guarantee the data security. In other words, there are some techniques that can endanger security of encrypted d...
متن کاملFrom Ephemerizer to Timed-Ephemerizer: Achieve Assured Lifecycle Enforcement for Sensitive Data
The concept of Ephemerizer, proposed by Perlman, is a cryptographic primitive for assured data deletion. With an Ephemerizer protocol, data in persistent storage devices will always be encrypted simultaneously using an ephemeral public key of the Ephemerizer (an entity which will publish a set of ephemeral public keys and periodically delete the expired ones) and the long-term public key of a u...
متن کاملClassification of encrypted traffic for applications based on statistical features
Traffic classification plays an important role in many aspects of network management such as identifying type of the transferred data, detection of malware applications, applying policies to restrict network accesses and so on. Basic methods in this field were using some obvious traffic features like port number and protocol type to classify the traffic type. However, recent changes in applicat...
متن کاملDetecting Bot Networks Based On HTTP And TLS Traffic Analysis
Abstract— Bot networks are a serious threat to cyber security, whose destructive behavior affects network performance directly. Detecting of infected HTTP communications is a big challenge because infected HTTP connections are clearly merged with other types of HTTP traffic. Cybercriminals prefer to use the web as a communication environment to launch application layer attacks and secretly enga...
متن کاملSeparating indexes from data: a distributed scheme for secure database outsourcing
Database outsourcing is an idea to eliminate the burden of database management from organizations. Since data is a critical asset of organizations, preserving its privacy from outside adversary and untrusted server should be warranted. In this paper, we present a distributed scheme based on storing shares of data on different servers and separating indexes from data on a distinct server. Shamir...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007