Cost of Encryption | TechSNAP 122

Cost of Encryption | TechSNAP 122

We\’ll have a frank discussion about the encryption Arms race underway, the side channel attack against gpg research have found, headlines from Back Hat…

And then an epic batch of your questions, our answers!


— Show Notes —

Thanks to:

Use our code tech249 to score .COM for $2.49!

Get private registration FOR FREE with a .COM! code: free5

 

Visit dirwiz.com/unitysync use code tech for an extended trial and a year of maintenance.

 

Direct Download:

HD Video | Mobile Video | MP3 Audio | Ogg Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feeds | Torrent Feed

Researchers have found a side-channel attack which could possibly be used to steal your gnupg keys

  • Researchers Yuval Yarom and Katrina Falkner from The University of Adelaide presented their paper at Blackhat
  • The Flush+Reload attack is a cache side-channel attack that can extract up to 98% of the private key
  • The attack is based on the L3 cache, so it works across all cores, unlike previous attacks where the attacker had to be on the same CPU core as the victim
  • This attack works across VMs, so an attacker in one VM could extract the GnuPG from another VM, even if it is executing on a different CPU
  • Research Paper

More Encryption Is Not the Solution

  • Poul-Henning Kamp (PHK) wrote an article for ACM Queue about how Encryption is not the answer to the spying problems
  • Inconvenient Facts about Privacy
  • Politics Trumps Cryptography – Nation-states have police forces with guns. Cryptographers and the IETF (Internet Engineering Task Force) do not.
  • Not Everybody Has a Right to Privacy – Prisoners are allowed private communication only with their designated lawyers
  • Encryption Will Be Broken, If Need Be – Microsoft refactors Skype to allow wiretapping
  • Politics, Not Encryption, Is the Answer
  • “There will also always be a role for encryption, for human-rights activists, diplomats, spies, and other professionals. But for Mr. and Mrs. Smith, the solution can only come from politics that respect a basic human right to privacy—an encryption arms race will not work”
  • PHK postulates that a government could approach a cloud service as say “on all HTTPS connections out of the country, the symmetric key cannot be random; it must come from a dictionary of 100 million random-looking keys that I provide” and then hide it in the Cookie header

Interview with Brendan Gregg


Feedback:

Correction Section

Echos from the Hall of Shame

Round Up:

Question? Comments? Contact us here!