SlideShare a Scribd company logo
SESSION	ID:SESSION	ID:
#RSAC
Mohamed	Nabeel
Client	side	encryption	without	knowing	
its	limits	is	a	ticking	time	bomb!
PDAC-W03
Research	Scientist
Cyber	Security,	QCRI	– Qatar	Computing	Research	Institute
@nabeelxy
#RSAC
Encryption	is	USELESS
Unless	You	know	how	and	where	it	”lives”!
#RSAC
Broken	disk	encryption
DROWN	SSL	attack
Apple	“goto”	TLS
ScreenOS	backdoors
Broken	file	encryption
Heartbleed
#RSAC
Cause Vulnerability
Weak	PBKDF
Weak	RNG
Key	in	the	memory
Implementation flaw
Design	flaw
Insecure configuration
Backdoors
…
…
…
…
…
…
…
#RSAC
Encryption	Algorithms	are	NOT
Broken
Attackers	exploit	weak	links	to	grab	the	keys!
#RSAC
Right	Encryption	is	better	than	
USEFUL,	it	keeps	us	SAFE!
What	is	right	Encryption?
#RSAC
iPaaS
Sensitive	Data
*	Photo	Credit:	SnapLogic
#RSAC
Sensitive	Data	Exposure	is	a	key	
CONCERN	for	organizations
Where	does	sensitive	data	reside?	How	to	protect	them?
#RSAC
Cloud	Security	Alliance	– The	Notorious	Seven
9
1.	Abuse	of	Cloud
2.	Insecure	APIs
3.	Malicious	Insider
4.	Shared	Tech.	Vul.
5.	Data	Breaches
6.	Data	Loss
7.	Account	Hijacking
1.	Data	Breaches
2.	Data	Loss
3.	Account	Hijacking
4.	Insecure	APIs
5.	Denial	of	Service
6.	Malicious	Insider
7.	Abuse	of	Cloud
1.	Data	Breaches
2.	Weak	IAM
3.	Insecure	APIs
4.	Sys./App.	Vul.
5.	Account	Hijacking
6.	Malicious	Insider
7.	APTs
2010 2013 2016
#RSAC
Server
Data
API
API
#RSAC
API
API
Server
Data
#RSAC
Right	Encryption	Can	HELP
What	is	the	right	encryption	for	this	deployment	model?
#RSAC
Server
Data
API
API
plaintext
plaintext
Data-at-Rest	Encryption
HTTPS
Data-in-Motion	Encryption
#RSAC
Client	Side	Encryption
May	the	keys	be	with	you!
#RSAC
Server
Data
You	can’t	see	my	data!
#RSAC
Server
Data
Broken	Functionality
#RSAC
Two	competing	requirements!
#RSAC
Computing	over Encrypted	Data
Can	we	process	ciphertext without	decrypting?
#RSAC
Homomorphic	Encryption
19
Non-deterministic	
encryption
Additive	
homomorphic
Multiplicative	
homomorphic
Fully	homomorphic
No	operations
One	type	of
operations
Any	operations
AES,	RSA,	etc.
Paillier (‘99) ElGamal (‘84)
Gentry	(‘09)
#RSAC
Property	Preserving	Encryption	
to	the	Rescue
Can	we	perform	business	operations	on	encrypted	data?
#RSAC
Property	Preserving	Encryption	(PPE)	Schemes
21
Deterministic	
Encryption	
(DE)
E(bob)
E(bob)
#@x*9
Searchable	
Encryption	
(SE)
Enc.	Search	Word
E(keyword1)
E(keyword2)
E(keyword1)
E(keyword3)
E(keyword4)
Order	
Preserving	
Encryption	
(OPE)
20
22
101
1921
2191
2642
#RSAC
Systems	built	on	top	of	PPE	Technologies	(SoPETs)
22
DBMask
CryptDB
BigQuery
Deterministic	Encryption	(DE)
DBMask
CryptDB
Mylar
ShadowCrypt
Searchable	Encryption	(SE)
BigQuery
DBMask
CryptDB
Cipherbase
Order	Preserving	Encryption	(OPE)
#RSAC
SoPET Products	in	the	Market
23
Salesforce
Workday
Office	365
Enterprise	Users
CASB
Cloud	Access	Security	Brokers
Google	Drive
Dropbox
S3
Users
CEG
Cloud	Encryption	Gateway
Enterprise	Users
Proxy
Encrypted	Databases
ZeroDB
MSSQL
#RSAC
What	Security	Guarantees	
SoPETs Provide?
A	time	ticking	bomb!
#RSAC
Threat	Models
25
Drive	Through
Snapshot	passive	adversary
“Grab	and	go”
Dine	In
Persistent	passive	adversary
“Sit	and	enjoy”
Cook	Yourself
Active	adversary
“Change	and	enjoy”
#RSAC
Encrypted	Databases:	MS	SQL	Always	Encrypted
26
Name SSN Title Department
Alice *&x@#12# &*xr^t+!# IT
Bob 9(4$$^*1 ^#x@0!1* HR
Eve &&@41*) &*xr^t+!# IT
.Net client	lib
SELECT	name,	SSN	FROM	emp
WHERE	title	=	“manager”;
SELECT	name,	SSN	FROM	emp
WHERE	title	=	“&*xr^t+!#”;
Name SSN
Alice *&x@#12#
Eve &&@41*)
Name SSN
Alice 330-61-
8769
Eve 321-90-
3217
1 2
34
#RSAC
Encrypted	Databases:	BigQuery
27
[
{
“name”: Alice,
”SSN”: *&x@#12#,
“age”: 2345
},
{
“name”: Bob,
”SSN”: 9(4$$^*1,
”age”: 3212
},
{
“name”: Eve,
”SSN”: &&@41*),
”age”: 2110
}
…
]
Proxy
SELECT	name,	age	FROM	emp
WHERE	age	>	20;	
1 2
34
SELECT	name,	age	FROM	emp
WHERE	age	>	2531;	
[ {
“name”: Bob,
“age”: 3212
}]
BigQuery
[ {
“name”: Bob,
“age”: 24
}]
Any	Value
OPE
RND
*	CryptDB:	Protecting	Confidentiality	with	Encrypted	Query	Processing,	Popa et.	al,	SOSP	2011
*	Onions
#RSAC
Encrypted	Web	Apps:	Mylar*	(Encrypted	Meteor	Apps)
28
Data
Principal	Graph
Mylar
client
Mylar
server
Encrypted
Server-side
code
*	Mylar:	Building	Web	Applications	on	top	of	Encrypted	Data,	Popa et.	al,	NSDI	2014
#RSAC
Inferring	Encrypted	Data	[1/2]
29
Snapshot	Passive	Adversary
Based	on	background	information/what	you	don’t	encrypt	(MS	SQL)
Statistical	inference	on	DE	encrypted	values	(MS	SQL,	CryptDB)*
Sorting	attack	for	OPE	encrypted	dense	columns*
Cumulative	(statistical	and	sorting)	attack	for	OPE	encrypted	sparse	columns*
*	Inference	Attacks	on	Property	Preserving	Encrypted	Databases,	Naveed	et.	al,	CCS	2015
#RSAC
Inferring	Encrypted	Data	[2/2]
30
Persistent	Passive	Adversary
Monitoring	access	patterns	and	metadata	to	infer	encrypted	data*
Active	Adversary
Brute-force	querying
Repeated	onion	peeling	to	get	to	the	DE	encrypted	values
*	Breaking	Web	Applications	Built	on	top	of	Encrypted	Data,	Grubbs	et.	al,	CCS	2016
#RSAC
#RSAC
NOT	ENCRYPTED
ENCRYPTED
#RSAC
A
C
C
E
S
S
P A
T T
E
R
N
S
#RSAC
Property	Preserving Leaking	
Encryption
#RSAC
SoPETs are	not	so	Secure
Which	adversaries	can	SoPETs defend	against?
#RSAC
SoPETs at	best	Protect	only	against	
Snapshot	Passive	Adversaries
What	can	we	do	to	defend	against	stronger	adversaries?
#RSAC
Apply
37
{identify}
Encryption	Cast
{in	depth}
Defense
{less}
Metadata
{secure}
System	Design
{stronger}
PPE	Schemes
{more}
Encryption
#RSAC
One	does	not	simply	use	PPE	to	encrypt.
There	are	stronger	adversaries	waiting	to	get	your	data.	There	is	
unencrypted	data.	SoPETs are	riddled	with metadata	and	access	
traces.	The	very	encryption	may	reveal	information.	It	is	folly.
#RSAC
Q&A
More	details:	medium.com/@nabeelxy

More Related Content

PPTX
Online Authentication
PPTX
Owasp mobile top 10
PPTX
Mastering Next Gen SIEM Use Cases (Part 2)
PPTX
RSA APJ - BLOCKCHAIN SECURITY – IS IT REALLY DIFFERENT THAN ANYTHING ELSE ?
KEY
Cyberattacks on a marine context (NATO Congress 2011)
DOCX
Sanjoy_Debnath_Resume
PDF
Mobile Penetration Testing: Episode 1 - The Forensic Menace
PDF
Mobile Penetration Testing: Episode II - Attack of the Code
Online Authentication
Owasp mobile top 10
Mastering Next Gen SIEM Use Cases (Part 2)
RSA APJ - BLOCKCHAIN SECURITY – IS IT REALLY DIFFERENT THAN ANYTHING ELSE ?
Cyberattacks on a marine context (NATO Congress 2011)
Sanjoy_Debnath_Resume
Mobile Penetration Testing: Episode 1 - The Forensic Menace
Mobile Penetration Testing: Episode II - Attack of the Code

What's hot (20)

DOCX
Sanjoy debnath resume
PDF
How Android and iOS Security Enhancements Complicate Threat Detection
PDF
85% of App Store Apps Fail OWASP Mobile Top 10: Are you exposed?
PDF
OWASP Mobile Top 10
PDF
Rise of the Hacking Machines
PDF
Сергей Харюк (Украина). Проверка безопасности приложений на платформе iOS
PDF
DON'T Use Two-Factor Authentication...Unless You Need It!
PDF
OWASP Mobile Top 10 Deep-Dive
PPTX
Developing A Cyber Security Incident Response Program
PDF
Pulling our-socs-up
PDF
OpenKM Professional Extension: Cryptography
PPTX
OWASP Mobile TOP 10 2014
PDF
Cyber Kill Chain: Web Application Exploitation
PDF
Certificate Pinning in Mobile Applications
PDF
A 2018 practical guide to hacking RFID/NFC
PDF
Mobile Defense-in-Dev (Depth)
PDF
Mobile Penetration Testing: Episode III - Attack of the Code
PDF
Soc 2030-socs-are-broken-lets-fix- them
PDF
WebApps vs Blockchain dApps (SmartContracts): tools, vulns and standards
PDF
Mobile App Hacking In A Nutshell
Sanjoy debnath resume
How Android and iOS Security Enhancements Complicate Threat Detection
85% of App Store Apps Fail OWASP Mobile Top 10: Are you exposed?
OWASP Mobile Top 10
Rise of the Hacking Machines
Сергей Харюк (Украина). Проверка безопасности приложений на платформе iOS
DON'T Use Two-Factor Authentication...Unless You Need It!
OWASP Mobile Top 10 Deep-Dive
Developing A Cyber Security Incident Response Program
Pulling our-socs-up
OpenKM Professional Extension: Cryptography
OWASP Mobile TOP 10 2014
Cyber Kill Chain: Web Application Exploitation
Certificate Pinning in Mobile Applications
A 2018 practical guide to hacking RFID/NFC
Mobile Defense-in-Dev (Depth)
Mobile Penetration Testing: Episode III - Attack of the Code
Soc 2030-socs-are-broken-lets-fix- them
WebApps vs Blockchain dApps (SmartContracts): tools, vulns and standards
Mobile App Hacking In A Nutshell
Ad

Similar to Client side encryption without knowing its limits is a ticking time bomb! (20)

PDF
Running Secure Server Software on Insecure Hardware without a Parachute - RSA...
PPTX
Serverless Attack Vectors
PDF
Intelligence-Led Security: Powering the Future of Cyber Defense
PDF
rsa_usa_2019_paula_januszkiewicz
PDF
Stop Passing the Bug: IoT Supply Chain Security
PDF
Realities of Data Security
PDF
RSA 2016 Realities of Data Security
PPTX
RSA 2018: Recon For the Defender - You know nothing (about your assets)
PDF
Recon for the Defender: You Know Nothing (about Your Assets), Jon Snow
PDF
IDY-T08 More than Vaulting: Adapting to New Privileged Access Threats
PDF
RSA 2015 Realities of Private Cloud Security
PDF
Sophisticated Attacks vs. Advanced Persistent Security
PDF
CLOUD SECURITY ESSENTIALS 2.0 Full Stack Hacking & Recovery
PPTX
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud Security
PPTX
Cloud Security Essentials 2.0 at RSA
PDF
How to transform developers into security people
PDF
Stop Translating, Start Defending: Common Language for Managing Cyber-Risk
PDF
RSAC 2016: How to Get into ICS Security
PDF
Fighting malware - keeping your Intellectual Property safe
PPTX
Practical Approaches to Cloud Native Security
Running Secure Server Software on Insecure Hardware without a Parachute - RSA...
Serverless Attack Vectors
Intelligence-Led Security: Powering the Future of Cyber Defense
rsa_usa_2019_paula_januszkiewicz
Stop Passing the Bug: IoT Supply Chain Security
Realities of Data Security
RSA 2016 Realities of Data Security
RSA 2018: Recon For the Defender - You know nothing (about your assets)
Recon for the Defender: You Know Nothing (about Your Assets), Jon Snow
IDY-T08 More than Vaulting: Adapting to New Privileged Access Threats
RSA 2015 Realities of Private Cloud Security
Sophisticated Attacks vs. Advanced Persistent Security
CLOUD SECURITY ESSENTIALS 2.0 Full Stack Hacking & Recovery
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud Security
Cloud Security Essentials 2.0 at RSA
How to transform developers into security people
Stop Translating, Start Defending: Common Language for Managing Cyber-Risk
RSAC 2016: How to Get into ICS Security
Fighting malware - keeping your Intellectual Property safe
Practical Approaches to Cloud Native Security
Ad

More from Priyanka Aash (20)

PPTX
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
PDF
From Chatbot to Destroyer of Endpoints - Can ChatGPT Automate EDR Bypasses (1...
PDF
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
PDF
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
PDF
Lessons Learned from Developing Secure AI Workflows.pdf
PDF
Cyber Defense Matrix Workshop - RSA Conference
PDF
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
PDF
Securing AI - There Is No Try, Only Do!.pdf
PDF
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
PDF
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
PDF
10 Key Challenges for AI within the EU Data Protection Framework.pdf
PDF
Techniques for Automatic Device Identification and Network Assignment.pdf
PDF
Keynote : Presentation on SASE Technology
PDF
Keynote : AI & Future Of Offensive Security
PDF
Redefining Cybersecurity with AI Capabilities
PDF
Demystifying Neural Networks And Building Cybersecurity Applications
PDF
Finetuning GenAI For Hacking and Defending
PDF
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
PDF
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
PDF
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
From Chatbot to Destroyer of Endpoints - Can ChatGPT Automate EDR Bypasses (1...
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Lessons Learned from Developing Secure AI Workflows.pdf
Cyber Defense Matrix Workshop - RSA Conference
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
Securing AI - There Is No Try, Only Do!.pdf
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
10 Key Challenges for AI within the EU Data Protection Framework.pdf
Techniques for Automatic Device Identification and Network Assignment.pdf
Keynote : Presentation on SASE Technology
Keynote : AI & Future Of Offensive Security
Redefining Cybersecurity with AI Capabilities
Demystifying Neural Networks And Building Cybersecurity Applications
Finetuning GenAI For Hacking and Defending
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf

Recently uploaded (20)

PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
A Presentation on Artificial Intelligence
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Electronic commerce courselecture one. Pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Machine learning based COVID-19 study performance prediction
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
cuic standard and advanced reporting.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Encapsulation theory and applications.pdf
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
Machine Learning_overview_presentation.pptx
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Unlocking AI with Model Context Protocol (MCP)
Reach Out and Touch Someone: Haptics and Empathic Computing
Agricultural_Statistics_at_a_Glance_2022_0.pdf
A Presentation on Artificial Intelligence
Building Integrated photovoltaic BIPV_UPV.pdf
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Review of recent advances in non-invasive hemoglobin estimation
Electronic commerce courselecture one. Pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Machine learning based COVID-19 study performance prediction
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
gpt5_lecture_notes_comprehensive_20250812015547.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
cuic standard and advanced reporting.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
Encapsulation theory and applications.pdf
MIND Revenue Release Quarter 2 2025 Press Release
Machine Learning_overview_presentation.pptx
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Unlocking AI with Model Context Protocol (MCP)

Client side encryption without knowing its limits is a ticking time bomb!