Data Security Encryption Vulnerability Unveiled

Photo illus. Anonymous by Pixabay

This post is also available in: עברית (Hebrew)

Homomorphic encryption is considered a next-generation data security technology, but researchers have identified a vulnerability that allows them to steal data even as it is being encrypted.

Homomorphic encryption is a way of encrypting data so that third parties cannot read it. However, homomorphic encryption still allows third parties and third-party technologies to conduct operations using the data. For example, a user could use homomorphic encryption to upload sensitive data to a cloud computing system in order to perform analyses of the data. Programs in the cloud could perform the analyses and send the resulting information back to the user, but those programs would never actually be able to read the sensitive data.

The researchers used side-channel attacks. “Basically, by monitoring power consumption in a device that is encoding data for homomorphic encryption, we are able to read the data as it is being encrypted. This demonstrates that even next-generation encryption technologies need protection against side-channel attacks,” says Aydin Aysu, senior author of a paper on the work and an assistant professor of computer engineering at North Carolina State University.

“Homomorphic encryption is appealing because it preserves data privacy, but allows users to make use of the data.” “While it has been theoretically possible for a while, homomorphic encryption requires a tremendous amount of computing power. As a result, we are still in the early stages of producing hardware and software to make homomorphic encryption practical.”

Microsoft has been a leader in homomorphic encryption, and created the SEAL Homomorphic Encryption Library to facilitate research and development on homomorphic encryption by the broader research community.

“What we’ve found is that there is a way to ‘crack’ homomorphic encryption that is done using that library via a side-channel attack,” Aysu says. “

The researchers were able to verify the vulnerability in the SEAL Homomorphic Encryption Library up through at least version 3.6.

Side-channel attacks are well understood, and there are already countermeasures that organizations can put into place to thwart them, according to