Marios Adam Sirgiannis, C. Manifavas, I. Papaefstathiou
{"title":"使公民系统更安全:实用的加密绕过和对策","authors":"Marios Adam Sirgiannis, C. Manifavas, I. Papaefstathiou","doi":"10.1109/ISCC55528.2022.9912814","DOIUrl":null,"url":null,"abstract":"Cryptography is used to protect the confidentiality, integrity, and authenticity of information by preventing unauthorized users from accessing or modifying them. Encryption techniques are used to protect personal or company data. This work demonstrates practical scenarios where, under certain conditions, encryption may be bypassed. Bypassing encryption, either by recovering the encryption key, a password used to generate the encryption key, or a plaintext copy of the encrypted data, allows for accessing data which appear to be inaccessible in the first place. There are six categories for bypassing encryption: find the key, guess the key, compel the key, exploit a flaw in the encryption scheme, access unencrypted message when the device is in use and locate an unencrypted copy of the message. In this study we utilize publicly available software to demonstrate real-world scenarios that fall into most of the aforementioned categories and show how, in those specific cases, encryption may be successfully bypassed. Moreover, we underline that bypassing encryption is possible only when certain conditions are met (e.g., software misconfiguration, physical access to the target device, etc.) and we highlight each one of them so as to effectively suggest countermeasures to the demonstrated techniques for encryption bypassing. The main aim of this paper is to highlight how encryption can be bypassed and thus make citizens set up their system in such a way that it would be more difficult to be hacked. This is especially important for citizens that may have limited knowledge/exposure to technology as they can be, for example. people from certain diversity groups such as elderly and/or people of very low income.","PeriodicalId":309606,"journal":{"name":"2022 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Making Citizens' systems more Secure: Practical Encryption Bypassing and Countermeasures\",\"authors\":\"Marios Adam Sirgiannis, C. Manifavas, I. Papaefstathiou\",\"doi\":\"10.1109/ISCC55528.2022.9912814\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cryptography is used to protect the confidentiality, integrity, and authenticity of information by preventing unauthorized users from accessing or modifying them. Encryption techniques are used to protect personal or company data. This work demonstrates practical scenarios where, under certain conditions, encryption may be bypassed. Bypassing encryption, either by recovering the encryption key, a password used to generate the encryption key, or a plaintext copy of the encrypted data, allows for accessing data which appear to be inaccessible in the first place. There are six categories for bypassing encryption: find the key, guess the key, compel the key, exploit a flaw in the encryption scheme, access unencrypted message when the device is in use and locate an unencrypted copy of the message. In this study we utilize publicly available software to demonstrate real-world scenarios that fall into most of the aforementioned categories and show how, in those specific cases, encryption may be successfully bypassed. Moreover, we underline that bypassing encryption is possible only when certain conditions are met (e.g., software misconfiguration, physical access to the target device, etc.) and we highlight each one of them so as to effectively suggest countermeasures to the demonstrated techniques for encryption bypassing. The main aim of this paper is to highlight how encryption can be bypassed and thus make citizens set up their system in such a way that it would be more difficult to be hacked. This is especially important for citizens that may have limited knowledge/exposure to technology as they can be, for example. people from certain diversity groups such as elderly and/or people of very low income.\",\"PeriodicalId\":309606,\"journal\":{\"name\":\"2022 IEEE Symposium on Computers and Communications (ISCC)\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-06-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 IEEE Symposium on Computers and Communications (ISCC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISCC55528.2022.9912814\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE Symposium on Computers and Communications (ISCC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISCC55528.2022.9912814","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Making Citizens' systems more Secure: Practical Encryption Bypassing and Countermeasures
Cryptography is used to protect the confidentiality, integrity, and authenticity of information by preventing unauthorized users from accessing or modifying them. Encryption techniques are used to protect personal or company data. This work demonstrates practical scenarios where, under certain conditions, encryption may be bypassed. Bypassing encryption, either by recovering the encryption key, a password used to generate the encryption key, or a plaintext copy of the encrypted data, allows for accessing data which appear to be inaccessible in the first place. There are six categories for bypassing encryption: find the key, guess the key, compel the key, exploit a flaw in the encryption scheme, access unencrypted message when the device is in use and locate an unencrypted copy of the message. In this study we utilize publicly available software to demonstrate real-world scenarios that fall into most of the aforementioned categories and show how, in those specific cases, encryption may be successfully bypassed. Moreover, we underline that bypassing encryption is possible only when certain conditions are met (e.g., software misconfiguration, physical access to the target device, etc.) and we highlight each one of them so as to effectively suggest countermeasures to the demonstrated techniques for encryption bypassing. The main aim of this paper is to highlight how encryption can be bypassed and thus make citizens set up their system in such a way that it would be more difficult to be hacked. This is especially important for citizens that may have limited knowledge/exposure to technology as they can be, for example. people from certain diversity groups such as elderly and/or people of very low income.