Researchers Demonstrate New Side-Channel Attack on Homomorphic Encryption

silversurfer

Level 85
Thread author
Verified
Honorary Member
Top poster
Content Creator
Malware Hunter
Well-known
Aug 17, 2014
7,767
A group of academics from the North Carolina State University and Dokuz Eylul University have demonstrated what they say is the "first side-channel attack" on homomorphic encryption that could be exploited to leak data as the encryption process is underway.

"Basically, by monitoring power consumption in a device that is encoding data for homomorphic encryption, we are able to read the data as it is being encrypted," Aydin Aysu, one of the authors of the study, said. "This demonstrates that even next generation encryption technologies need protection against side-channel attacks."

Homomorphic Encryption is a form of encryption that allows certain types of computation to be performed directly on encrypted data without having to decrypt it in the first place.

It's also meant to be privacy-preserving in that it allows sharing of sensitive data with other third-party services, such as data analytics firms, for further processing while the underlying information remains encrypted, and by extension, inaccessible to the service provider.

Put differently, the goal of homomorphic encryption is to facilitate the development of end-to-end encrypted data storage and computation services where the data owner never needs to share their secret keys with third-party services.

The data leakage attack proposed by the researchers involves a vulnerability discovered in Microsoft SEAL, the tech giant's open-source implementation of the technology, which could be exploited in a manner that allows the recovery of a piece of plaintext message that's being homomorphically encrypted, effectively undoing the privacy protections.