Plaintext: Difference between revisions
(New page: ==Plaintext== In cryptography, '''plaintext''' is information used as input to an encryption algorithm; the output is termed '''ciphertext'''. The plaintext could be...) |
|||
Line 3: | Line 3: | ||
==Secure Handling of Plaintext== | ==Secure Handling of Plaintext== | ||
In a [[cryptosystem]], weaknesses can be introduced through insecure handling of the plaintext, allowing an attacker to bypass the cryptography altogether. Plaintext is vulnerable in use and in storage, whether in electronic or paper format. The area of [[physical security]] deals with how media can be secured from local attacks. An attacker might enter a poorly secured building and attempt to open locked desk drawers or safes. An attacker can also engage in dumpster diving, and may be able to reconstruct shredded sheets. One countermeasure is to burn or thoroughly crosscut shred discarded printed plaintexts. If plaintext is kept in a computer file, the disk along with the entire computer and its components must be secure. Sensitive data is sometimes processed on computers whose mass storage is removable, in which case physical security of the removed disk is vital. In the case of securing a computer, that security must be physical as well as virtual. The wide availability of | In a [[cryptosystem]], weaknesses can be introduced through insecure handling of the plaintext, allowing an attacker to bypass the cryptography altogether. Plaintext is vulnerable in use and in storage, whether in electronic or paper format. The area of [[Physical_and_Environmental_Security: | physical security]] deals with how media can be secured from local attacks. An attacker might enter a poorly secured building and attempt to open locked desk drawers or safes. An attacker can also engage in dumpster diving, and may be able to reconstruct shredded sheets. One countermeasure is to burn or thoroughly crosscut shred discarded printed plaintexts. If plaintext is kept in a computer file, the disk along with the entire computer and its components must be secure. Sensitive data is sometimes processed on computers whose mass storage is removable, in which case physical security of the removed disk is vital. In the case of securing a computer, that security must be physical as well as virtual. The wide availability of thumb-drives, which can plug into most modern computers and receive hundreds of megabytes of data, poses another security headache. A spy (perhaps posing as a cleaning person) could easily conceal one and even swallow it, if necessary.<br> | ||
<br> | <br> | ||
Discarded computers, disk drives and media are also a potential source of plaintexts. Most operating systems do not actually erase anything; they simply mark the disk space occupied by a deleted file as 'available for use', and remove its entry from the file system directory. The information in a file deleted in this way remains fully present until overwritten at some later time when the operating system reuses the disk space. With even low-end computers being sold with 30 Gigabytes of disk space, this 'later time' may be months, or never. Even overwriting that part of a disk occupied by a deleted file is insufficient in many cases. Peter Gutmann (computer scientist) of the University of Auckland wrote a celebrated paper some years ago on the recovery of overwritten information from magnetic disks (though it must be noted that drive densities have got much higher since then which should make this type of recovery much harder if not impossible). Also modern hard drives remap sectors that are starting to fail and the sectors that are no longer in use will contain information that is invisible to software but is nonetheless still there on the physical platter. Some government agencies (e.g., NSA) require that all disk drives be physically pulverized when they are discarded, and in some cases, chemically treated with corrosives before or after. This practice is not widespread outside of the government, however. For example, Garfinkel and Shelat (2003) | Discarded computers, disk drives and media are also a potential source of plaintexts. Most operating systems do not actually erase anything; they simply mark the disk space occupied by a deleted file as 'available for use', and remove its entry from the file system directory. The information in a file deleted in this way remains fully present until overwritten at some later time when the operating system reuses the disk space. With even low-end computers being sold with 30 Gigabytes of disk space, this 'later time' may be months, or never. Even overwriting that part of a disk occupied by a deleted file is insufficient in many cases. Peter Gutmann (computer scientist) of the University of Auckland wrote a celebrated paper some years ago on the recovery of overwritten information from magnetic disks (though it must be noted that drive densities have got much higher since then which should make this type of recovery much harder if not impossible). Also modern hard drives remap sectors that are starting to fail and the sectors that are no longer in use will contain information that is invisible to software but is nonetheless still there on the physical platter. Some government agencies (e.g., NSA) require that all disk drives be physically pulverized when they are discarded, and in some cases, chemically treated with corrosives before or after. This practice is not widespread outside of the government, however. For example, Garfinkel and Shelat (2003) analyzed 158 second-hand hard drives and found that less than 10% had been sufficiently sanitized; a wide variety of personal and confidential information was found among the others.<br> | ||
<br> | <br> | ||
Laptop computers are a special problem. The US State Department, the British Secret Service, and the US Department of Defense have all had laptops containing secret information, presumably in readable text form, 'vanish' in recent years. Disk encryption techniques can provide protection if they are used properly.<br> | Laptop computers are a special problem. The US State Department, the British Secret Service, and the US Department of Defense have all had laptops containing secret information, presumably in readable text form, 'vanish' in recent years. Disk encryption techniques can provide protection if they are used properly.<br> |
Latest revision as of 15:52, 14 June 2007
Plaintext
In cryptography, plaintext is information used as input to an encryption algorithm; the output is termed ciphertext. The plaintext could be, for example, a diplomatic message, a bank transaction, an e-mail, a diary or any information that someone might want to prevent others from reading. Typically the plaintext is the message in a form where no special effort has been made to make the information unreadable without special knowledge. In some systems, however, multiple layers of encryption are used, in which case the ciphertext output of one encryption algorithm becomes the plaintext input to the next.
Secure Handling of Plaintext
In a cryptosystem, weaknesses can be introduced through insecure handling of the plaintext, allowing an attacker to bypass the cryptography altogether. Plaintext is vulnerable in use and in storage, whether in electronic or paper format. The area of physical security deals with how media can be secured from local attacks. An attacker might enter a poorly secured building and attempt to open locked desk drawers or safes. An attacker can also engage in dumpster diving, and may be able to reconstruct shredded sheets. One countermeasure is to burn or thoroughly crosscut shred discarded printed plaintexts. If plaintext is kept in a computer file, the disk along with the entire computer and its components must be secure. Sensitive data is sometimes processed on computers whose mass storage is removable, in which case physical security of the removed disk is vital. In the case of securing a computer, that security must be physical as well as virtual. The wide availability of thumb-drives, which can plug into most modern computers and receive hundreds of megabytes of data, poses another security headache. A spy (perhaps posing as a cleaning person) could easily conceal one and even swallow it, if necessary.
Discarded computers, disk drives and media are also a potential source of plaintexts. Most operating systems do not actually erase anything; they simply mark the disk space occupied by a deleted file as 'available for use', and remove its entry from the file system directory. The information in a file deleted in this way remains fully present until overwritten at some later time when the operating system reuses the disk space. With even low-end computers being sold with 30 Gigabytes of disk space, this 'later time' may be months, or never. Even overwriting that part of a disk occupied by a deleted file is insufficient in many cases. Peter Gutmann (computer scientist) of the University of Auckland wrote a celebrated paper some years ago on the recovery of overwritten information from magnetic disks (though it must be noted that drive densities have got much higher since then which should make this type of recovery much harder if not impossible). Also modern hard drives remap sectors that are starting to fail and the sectors that are no longer in use will contain information that is invisible to software but is nonetheless still there on the physical platter. Some government agencies (e.g., NSA) require that all disk drives be physically pulverized when they are discarded, and in some cases, chemically treated with corrosives before or after. This practice is not widespread outside of the government, however. For example, Garfinkel and Shelat (2003) analyzed 158 second-hand hard drives and found that less than 10% had been sufficiently sanitized; a wide variety of personal and confidential information was found among the others.
Laptop computers are a special problem. The US State Department, the British Secret Service, and the US Department of Defense have all had laptops containing secret information, presumably in readable text form, 'vanish' in recent years. Disk encryption techniques can provide protection if they are used properly.
Modern cryptographic systems are designed to resist attacks based on known plaintext or even chosen plaintext. Older systems used techniques such as padding and Russian copulation to obscure information in plaintext that would be known or easily guessed.
See Also
References
- S. Garfinkel and A Shelat, "Remembrance of Data Passed: A Study of Disk Sanitization Practices", IEEE Security and Privacy, January/February 2003 (PDF).