Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

1/22/2019
02:30 PM
Ameesh Divatia
Ameesh Divatia
Commentary
Connect Directly
LinkedIn
RSS
E-Mail vvv
50%
50%

The Fact and Fiction of Homomorphic Encryption

The approach's promise continues to entice cryptographers and academics. But don't expect it to help in the real world anytime soon.

The history of homomorphic encryption stretches back to the late 1970s. Just a year after the RSA public-key scheme was developed, Ron Rivest, Len Adleman, and Michael Dertouzos published a report called "On Data Banks and Privacy Homomorphisms." The paper detailed how a loan company, for example, could use a cloud provider (then known as a commercial time-sharing service) to store and compute encrypted data. This influential paper led to the term "homomorphic encryption."

What Is Homomorphic Encryption?
Homomorphic encryption describes any encryption scheme in which a particular operation on two ciphertext values gives an encrypted result, which, when decrypted, maps to the result the operation would have been in plaintext. Because the keys are needed only during the initial encryption and final decryption, complete privacy of the inputs and outputs is maintained during the computation process.

The purpose of homomorphic encryption is to allow computation on encrypted data. The process describes the conversion of data into ciphertext that can be analyzed and worked with as if it were still in its original form.

Why It Works (At Least in Theory)
Homomorphic encryption can be a significant asset to your business compliance and data privacy efforts. We all know the regulatory landscape changed dramatically in 2018. The EU's General Data Protection Regulation (GDPR) came into force last May, the California Consumer Privacy Act (CCPA) is scheduled to be implemented on January 1, 2020, and as many as 40 other states are considering data privacy laws. GDPR was notable because of its penalty of 4% of global revenue for serious infractions, such as not having sufficient customer consent to process data. The CCPA is a "mini-GDPR" with unprecedented power for consumers to control the collection, use, and transfer of their own data.    

These new regulations came about as the result of significant breaches and abuses of data over the past few years. There is an undeniable data breach fatigue these days. But not every breach comes about as the result of outside attackers. There are other threat models to consider. Insider threats and privileged access account for about 35% to 60% of breaches, according to industry reports. Anthem and MyFitnessPal fell victim to this type of attack. Even using traditional encryption (encryption at rest and transparent data encryption, for example), database administrators have access to all of your data in the clear. They have access to the crown jewels.

Homomorphic encryption can also be a business enablement tool. It can allow cloud workload protection ("lift and shift" to cloud), cloud/aggregate analytics (or privacy preserving encryption), information supply chain consolidation (containing your data to mitigate breach risk), and automation and orchestration (operating and triggering off of encrypted data for machine-to-machine communication).

Where Homomorphic Encryption Falls Short
Homomorphic encryption originally slowed mathematical computations down to a crawl. The initial performance impact was 100 trillion times slower (not a typo). There has been significant performance improvement since then, but the latest figure is that about 50,000 end-to-end transactions can be performed in a certain range of time. That amount is still too small in today's fast-moving world.

Furthermore, homomorphic encryption requires application modifications. You need prior knowledge of what type of computation was being performed (additive, multiplication, etc.) Businesses with less predictable or more free-form operations will have to rewrite or modify applications to make homomorphic encryption viable. Again, that's not feasible for businesses at scale.

Finally, there are still questions about the overall encryption strength (encryption entropy). Homomorphic encryption exposes valuable properties in achieving this mechanism without decrypting this data, and without access to keys. There are still some open questions about the encryption strength using a scheme like this.

Putting It All Together
Homomorphic encryption is a long way off from real-world enterprise implementation, but there has been substantial progress in the areas of differential privacy and privacy preservation techniques. There are tools that can deliver homomorphic-like encryption without the inherent drawbacks that homomorphic encryption brings, so that businesses can mandate a higher security standard without actually breaking processes or application functionality.

Businesses should not have to sacrifice speed for security — it's not a zero-sum dynamic. When done properly, security can actually accelerate your business. Eliminating that friction between security and business leadership builds trust between departments and creates better security outcomes.

The promise of practical homomorphic encryption continues to entice cryptographers and academics. Although it is a rapidly developing area to watch, in practice, its poor performance to date makes homomorphic encryption impractical to implement in enterprise environments in the near future.

Related Content:

Ameesh Divatia is Co-Founder & CEO of Baffle, Inc., which provides encryption as a service. He has a proven track record of turning technologies that are difficult to build into successful businesses, selling three companies for more than $425 million combined in the service ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
DevSecOps: The Answer to the Cloud Security Skills Gap
Lamont Orange, Chief Information Security Officer at Netskope,  11/15/2019
Attackers' Costs Increasing as Businesses Focus on Security
Robert Lemos, Contributing Writer,  11/15/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-19037
PUBLISHED: 2019-11-21
ext4_empty_dir in fs/ext4/namei.c in the Linux kernel through 5.3.12 allows a NULL pointer dereference because ext4_read_dirblock(inode,0,DIRENT_HTREE) can be zero.
CVE-2019-19036
PUBLISHED: 2019-11-21
btrfs_root_node in fs/btrfs/ctree.c in the Linux kernel through 5.3.12 allows a NULL pointer dereference because rcu_dereference(root->node) can be zero.
CVE-2019-19039
PUBLISHED: 2019-11-21
__btrfs_free_extent in fs/btrfs/extent-tree.c in the Linux kernel through 5.3.12 calls btrfs_print_leaf in a certain ENOENT case, which allows local users to obtain potentially sensitive information about register values via the dmesg program.
CVE-2019-6852
PUBLISHED: 2019-11-20
A CWE-200: Information Exposure vulnerability exists in Modicon Controllers (M340 CPUs, M340 communication modules, Premium CPUs, Premium communication modules, Quantum CPUs, Quantum communication modules - see security notification for specific versions), which could cause the disclosure of FTP har...
CVE-2019-6853
PUBLISHED: 2019-11-20
A CWE-79: Failure to Preserve Web Page Structure vulnerability exists in Andover Continuum (models 9680, 5740 and 5720, bCX4040, bCX9640, 9900, 9940, 9924 and 9702) , which could enable a successful Cross-site Scripting (XSS attack) when using the products web server.