Less than total security?
Researchers Can Steal Data During Homomorphic Encryption
By NC State University News, March 4, 2022
Researchers at North Carolina State University (NC State) and Turkey's Dokuz Eylul University have cracked next-generation homomorphic encryption via side-channel attacks.
Homomorphic encryption renders data unreadable to third parties, while still permitting third parties and third-party technologies to perform operations using the data.
NC State's Aydin Aysu said the process consumes much computing power, and the researchers were able to read data during encryption by monitoring power consumption in the data encoder using Microsoft's SEAL Homomorphic Encryption Library.
"We were able to do this with a single power measurement," Aysu noted, and the team confirmed the flaw in the library up through least version 3.6. .... '
“What we’ve found is that there is a way to ‘crack’ homomorphic encryption that is done using that library via a side-channel attack,” said NC State's Aydin Aysu. “We were able to do this with a single power measurement ...
From NC State University News
No comments:
Post a Comment