{"id":136338,"date":"2022-03-03T05:34:59","date_gmt":"2022-03-03T13:34:59","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2022\/03\/researchers-show-they-can-steal-data-during-homomorphic-encryption"},"modified":"2022-03-03T05:34:59","modified_gmt":"2022-03-03T13:34:59","slug":"researchers-show-they-can-steal-data-during-homomorphic-encryption","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2022\/03\/researchers-show-they-can-steal-data-during-homomorphic-encryption","title":{"rendered":"Researchers show they can steal data during homomorphic encryption"},"content":{"rendered":"<p style=\"padding-right: 20px\"><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/researchers-show-they-can-steal-data-during-homomorphic-encryption3.jpg\"><\/a><\/p>\n<p>Homomorphic encryption is considered a next generation data security technology, but researchers have identified a vulnerability that allows them to steal data even as it is being encrypted.<\/p>\n<p>\u201cWe weren\u2019t able to crack <a href=\"https:\/\/techxplore.com\/tags\/homomorphic+encryption\/\" rel=\"tag\" class=\"\">homomorphic encryption<\/a> using mathematical tools,\u201d says Aydin Aysu, senior author of a paper on the work and an assistant professor of computer engineering at North Carolina State University. \u201cInstead, we used <a href=\"https:\/\/techxplore.com\/tags\/side-channel+attacks\/\" rel=\"tag\" class=\"\">side-channel attacks<\/a>. Basically, by monitoring <a href=\"https:\/\/techxplore.com\/tags\/power+consumption\/\" rel=\"tag\" class=\"\">power consumption<\/a> in a device that is encoding data for homomorphic encryption, we are able to read the data as it is being encrypted. This demonstrates that even next generation encryption technologies need protection against side-channel attacks.\u201d<\/p>\n<p>Homomorphic encryption is a way of encrypting data so that third parties cannot read it. However, homomorphic encryption still allows third parties and third-party technologies to conduct operations using the data. For example, a user could use homomorphic encryption to upload sensitive data to a cloud computing system in order to perform analyses of the data. Programs in the cloud could perform the analyses and send the resulting information back to the user, but those programs would never actually be able to read the <a href=\"https:\/\/techxplore.com\/tags\/sensitive+data\/\" rel=\"tag\" class=\"\">sensitive data<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Homomorphic encryption is considered a next generation data security technology, but researchers have identified a vulnerability that allows them to steal data even as it is being encrypted. \u201cWe weren\u2019t able to crack homomorphic encryption using mathematical tools,\u201d says Aydin Aysu, senior author of a paper on the work and an assistant professor of computer [\u2026]<\/p>\n","protected":false},"author":650,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1523,1625,2229,1492],"tags":[],"class_list":["post-136338","post","type-post","status-publish","format-standard","hentry","category-computing","category-encryption","category-mathematics","category-security"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/136338","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/650"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=136338"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/136338\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=136338"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=136338"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=136338"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}