不可解密的对称加密

T. Martin
{"title":"不可解密的对称加密","authors":"T. Martin","doi":"10.1109/IEEEGCC.2011.5752504","DOIUrl":null,"url":null,"abstract":"Cryptography is necessary where the confidentiality of information needs to be protected, but it often not sufficient. There are many cases where a persistent attacker can obtain the secret keys in use on a system, no matter how much the system tries to prevent this (e.g. cold-boot attacks, DRM circumvention). On the other hand, there are many systems where information needs to be stored and protected, but not understood by (i.e. available to) the recording device. This includes sensors, video recorders, CCTV, networking equipment, etc. By the nature of symmetric encryption, they have more access than they need. Asymmetric encryption could be used to prevent this, but is impractical for large volumes of data. We present a solution that allows a device to symmetrically encrypt data without itself being able to decrypt it, and nor can any attacker that compromises the device.","PeriodicalId":119104,"journal":{"name":"2011 IEEE GCC Conference and Exhibition (GCC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Undecryptable symmetric encryption\",\"authors\":\"T. Martin\",\"doi\":\"10.1109/IEEEGCC.2011.5752504\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cryptography is necessary where the confidentiality of information needs to be protected, but it often not sufficient. There are many cases where a persistent attacker can obtain the secret keys in use on a system, no matter how much the system tries to prevent this (e.g. cold-boot attacks, DRM circumvention). On the other hand, there are many systems where information needs to be stored and protected, but not understood by (i.e. available to) the recording device. This includes sensors, video recorders, CCTV, networking equipment, etc. By the nature of symmetric encryption, they have more access than they need. Asymmetric encryption could be used to prevent this, but is impractical for large volumes of data. We present a solution that allows a device to symmetrically encrypt data without itself being able to decrypt it, and nor can any attacker that compromises the device.\",\"PeriodicalId\":119104,\"journal\":{\"name\":\"2011 IEEE GCC Conference and Exhibition (GCC)\",\"volume\":\"20 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-04-19\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 IEEE GCC Conference and Exhibition (GCC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IEEEGCC.2011.5752504\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 IEEE GCC Conference and Exhibition (GCC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IEEEGCC.2011.5752504","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

摘要

在需要保护信息机密性的地方,加密是必要的,但通常还不够。在许多情况下,持久攻击者可以获得系统上正在使用的秘钥,无论系统如何努力阻止它(例如冷引导攻击、规避DRM)。另一方面,在许多需要存储和保护信息的系统中,记录设备无法理解(即无法获取)这些信息。这包括传感器、录像机、闭路电视、网络设备等。根据对称加密的本质,它们拥有比所需更多的访问权限。非对称加密可以用来防止这种情况,但对于大量数据来说是不切实际的。我们提出了一种解决方案,该解决方案允许设备对称加密数据,而无需自身解密,任何攻击者也无法危及设备。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Undecryptable symmetric encryption
Cryptography is necessary where the confidentiality of information needs to be protected, but it often not sufficient. There are many cases where a persistent attacker can obtain the secret keys in use on a system, no matter how much the system tries to prevent this (e.g. cold-boot attacks, DRM circumvention). On the other hand, there are many systems where information needs to be stored and protected, but not understood by (i.e. available to) the recording device. This includes sensors, video recorders, CCTV, networking equipment, etc. By the nature of symmetric encryption, they have more access than they need. Asymmetric encryption could be used to prevent this, but is impractical for large volumes of data. We present a solution that allows a device to symmetrically encrypt data without itself being able to decrypt it, and nor can any attacker that compromises the device.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信