Trends in Data Protection and Encryption Technologies
Trends in Data Protection and Encryption Technologies
Alain Mermoud
Vincent Lenders
Bernhard Tellenbach Editors
Trends in
Data Protection and
Encryption
Technologies
Trends in Data Protection and Encryption
Technologies
Valentin Mulder • Alain Mermoud •
Vincent Lenders • Bernhard Tellenbach
Editors
Trends in
Data Protection and
Encryption
Technologies
Editors
Valentin Mulder Alain Mermoud
Cyber-Defence Campus Cyber-Defence Campus
armasuisse Science and Technology armasuisse Science and Technology
Thun, Switzerland Thun, Switzerland
© The Editor(s) (if applicable) and The Author(s) 2023. This book is an open access publication.
Open Access This book is licensed under the terms of the Creative Commons Attribution 4.0 Inter-
national License ([Link] which permits use, sharing, adaptation,
distribution and reproduction in any medium or format, as long as you give appropriate credit to the
original author(s) and the source, provide a link to the Creative Commons license and indicate if changes
were made.
The images or other third party material in this book are included in the book’s Creative Commons
license, unless indicated otherwise in a credit line to the material. If material is not included in the book’s
Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the
permitted use, you will need to obtain permission directly from the copyright holder.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication
does not imply, even in the absence of a specific statement, that such names are exempt from the relevant
protective laws and regulations and therefore free for general use.
The publisher, the authors, and the editors are safe to assume that the advice and information in this book
are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or
the editors give a warranty, expressed or implied, with respect to the material contained herein or for any
errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional
claims in published maps and institutional affiliations.
This Springer imprint is published by the registered company Springer Nature Switzerland AG
The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland
Foreword by Quentin Ladetto
v
vi Foreword by Quentin Ladetto
Data fuels our modern economy and is at the heart of our digital lifestyle. Its
protection is, therefore, not only important but crucial for modern societies to
function. When discussing the protection of data, quite often, the public discussion
focuses on confidentiality. However, with increasing dependence on technology
for everyday services, the understanding that availability and integrity are just as
important spreads fast beyond expert circles. Data protection is a topic that has
been discussed previously. For example, the Spartans already used cryptography,
the best-known means to protect data. However, modern, interconnected large-
scale systems have very different requirements, not only on the robustness of
protection mechanisms but also on their scalability and maintainability. To protect
ourselves, an organization, or even a nation, it is, therefore, crucial to maintain
an overview of available technologies and innovations that have the potential to
fill gaps or improve current solutions. The National strategy for the protection of
Switzerland against cyber risks 2018–20221 has, therefore, as its first measure the
“early identification of trends and technologies and knowledge building.” This book
is a significant contribution toward our national strategy—and beyond. Today’s
and future information and industrial control systems often face data protection
challenges that still need to be met satisfactorily. For example, a significant enabler
in e-commerce is machine learning, which can enable better customer experiences
through targeted recommendations. At the same time, the combination of data to
extrapolate knowledge about customer preferences and requirements might allow
profiling beyond reason. Further, accumulating data in a data lake benefits machine
learning but, without proper protection, gives access to data beyond what a single
entity would need. Challenges like these can be met using technologies such
as, for example, searchable symmetric encryption revealing a subset of data that
the person or algorithm searching is allowed to see without revealing the entire
dataset. In this book, the authors introduce encryption fundamentals, discuss critical
technologies for data protection, and present specific use cases. This makes the book
1 National strategy for the protection of Switzerland against cyber risks (NCS) 2018–2022.
vii
viii Foreword by Florian Schütz
a valuable guide for decision-making within the Swiss Federal administration and
administrations of other nations. Nevertheless, limiting the view on governments
only would not do the book justice. This book will also serve the industry well.
While its primary audience will be Chief Information Security Officers (CISO) and
Chief Technology Officers (CTO), it will also be interesting for the tech-savvy board
members or engineers looking to get an entry point into data protection topics. Last
but not least, the book will be interesting for anyone interested in data protection
and encryption. I am happy that this significant contribution by the Cyber-Defence
Campus toward our strategic goals has been made available for everyone – as true
resilience against cyber threats requires all of us to properly understand protective
technology and its applicability to today’s challenges.
ix
x Preface
This book is the result of a study conducted during the year 2022 for the National
Cyber Security Centre (NCSC) by the Cyber-Defence Campus of armasuisse
Science and Technology (S+T). In this respect, this book contributes to measure 1
(Technology Monitoring) of the National strategy for the protection of Switzerland
against cyber risks (NCS) 2018–2022. In this sense, this publication can be
considered as co-branding success.
xi
Contents
xiii
xiv Contents
12 Identity-Based Cryptography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
Bernhard Tellenbach
13 Multi-Party Threshold Cryptography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
Christian Cachin
14 Searchable Symmetric Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
Cyrill Krähenbühl and Adrian Perrig
15 Digital Signature . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
Weyde Lin
16 Hardware Security Module. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
Maria Sommerhalder
17 Secure Multi-Party Computation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
Louis-Henri Merino and José Cabrero-Holgueras
Part V Use-Cases
30 Secure Media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179
Touradj Ebrahimi
31 Secure Positioning and Localization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187
Martin Strohmeier
32 Secure Payment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193
Sophia Ding
33 Disk, File and Database Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201
Linus Gasser and Imad Aad
34 WEB3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209
Linus Gasser
35 5G . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215
Weyde Lin
36 Email Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221
Emilia Nunes
37 Secure Messaging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227
Emilia Nunes
38 Secure Smartphone . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233
Yann Donon, Fabien Künzler, Pawel Jasinski, Carl Piening,
and Arnaud Savary
Authors
Name Affiliation Chapter(s)
Thomas Lugrin Swiss Confederation, Bern, One-time Pad, Symmetric
Switzerland Cryptography, Asymmetric
Encryption, Hash Functions,
and Random Number
Generator
François Weissbaum Swiss Confederation, Bern, Symmetric Cryptography
Switzerland
Christian Stohrer Swiss Confederation, Bern, Asymmetric Encryption
Switzerland
Cyrill Krähenbühl Swiss Federal Institute of Key Management, and
Technology in Zurich, Zurich, Searchable Symmetric
Switzerland Encryption
Adrian Perrig Swiss Federal Institute of Key Management, and
Technology in Zurich, Zurich, Searchable Symmetric
Switzerland Encryption
Urs Wagner Swiss Confederation, Bern, Hash Functions
Switzerland
Imad Aad EPFL, Lausanne, Switzerland Zero-knowledge Proof, and
Disk, File and Database
Encryption
Jean-Pierre Hubaux EPFL, Lausanne, Switzerland Homomorphic Encryption, and
Blockchain
Jasper Rödiger Rohde und Schwarz, Cologne, Quantum Key Distribution
Germany
Linus Gasser EPFL, Lausanne, Switzerland Post-quantum Cryptography,
Blockchain, Disk, File and
Database Encryption, and
WEB3
xvii
xviii List of Contributors
Reviewers
Name Affiliation Chapter(s)
Joachim Rosenthal University of Zurich, Zurich, Post-quantum Cryptography
Switzerland
Stefan Röhrich Rohde und Schwarz, Cologne, Post-quantum Cryptography,
Germany Disk, File and Database
Encryption, and Tunneling and
VPN
Katerina Mitrokotsa University of St. Gallen, St. Multi-party Threshold
Gallen, Switzerland Cryptography
Kévin Huguenin University of Lausanne, Differential Privacy
Lausanne, Switzerland
Nikos Karapanos Futurae, Zurich, Switzerland Authentication, and Biometrics
William Blonay Cyber-Defence Campus, Thun, 5G
Switzerland
Loic Maréchal University of Lausanne, Scientometric and Wikipedia
Lausanne, Switzerland Pageview Analysis
Andrei Kucharavy HES-SO Valais-Wallis, Sion, Scientometric and Wikipedia
Switzerland Pageview Analysis
Part I
Encryption Foundations
Chapter 1
One-Time Pad
Thomas Lugrin
1.1 Introduction
1.2 Analysis
The invention of the one-time pad can be attributed to Gilbert S. Vernam, who
developed an automated system for teletypewriters using punched paper tapes in
1917 [1]. Together with Joseph O. Mauborgne, he realized that if the keystream, i.e.
the distribution of the punches on the tape, was uniformly random and independent
such as an infinite non-periodic tape, the cipher would be unbreakable. An earlier
mention of the one-time pad can be found in an 1882 publication by Frank
Miller [2] and could have been a source of inspiration for Vernam [3]. A famous
implementation of the one-time pad is the hotline between the United States and the
USSR that was established in 1963 [4].
T. Lugrin ()
Federal Administration, Bern, Switzerland
e-mail: [Link]@[Link]
1.2.1 Definition
The one-time pad takes a plaintext message and a random key of the same length as
inputs. The message and key are represented in bits in a modern setup. Encryption
consists of adding the message to the key using the XOR operator. The result is
the ciphertext. The one-time pad decryption process is similar, as the ciphertext is
XOR-ed with the same key to recover the plaintext. The simplicity of the encryption
and decryption process makes it a very fast cipher, but the length of the key makes
it difficult to use in practice.
In 1949, Claude E. Shannon formally showed that the one-time pad has perfect
secrecy in an information-theoretic sense [5]. Any ciphertext of a given length can be
the encryption of any plaintext of the same length with equal probability. Moreover,
adversaries with arbitrarily considerable computing power cannot break it, which
means it is also quantum-computer resistant.
The one-time pad is, however, not perfect in a broader sense, as it does
not provide authentication of the sender, nor does it ensure the integrity of the
ciphertext; a malicious intermediary can modify the ciphertext without any of the
communicating parties noticing it. Even worse, if parts of the plaintext are known,
as is typical in e-mail headers, the corresponding ciphertext parts can be altered
to yield precisely any malicious plaintext of the same length. Re-using the key
completely breaks the one-time pad security: XOR-ing two ciphertexts gives the
XOR-ed plaintexts. If there is enough redundancy in text encoding, e.g., ASCII, one
can recover the two plaintexts. More generally, this means that the keystream used
by the one-time pad must be free of any dependence patterns, i.e., it must be truly
random, see Chap. 7.
1.2.2 Trends
The one-time pad should generally not be used, and standardized symmetric
encryption algorithms should be preferred and used with the appropriate parameters
1 One-Time Pad 5
and the correct implementation, see Chap. 2. Its usage is costly, and its setup is
complicated. Nevertheless, its use could be envisaged in particular government
applications where perfect secrecy is a must. The key exchange shall be performed
reliably, the keys securely stored until their use and systematically destroyed after
encryption. Further measures are required to guarantee the communicating parties’
authenticity and the encrypted messages’ integrity.
The development of Quantum Key Distribution (QKD, see Chap. 9) renewed
interest in the one-time pad [6], as keys could be shared on an interception-aware
channel. In practice, however, attacks exist that take advantage of the redundancy
of the signal [7], meaning that the one-time pad using QKD would not guarantee
perfect secrecy.
A critical aspect in the application of the one-time pad is the quality of the source of
randomness used to feed the keystream. It should be investigated and verified before
use. The correctness of its implementation should be verifiable. In particular, the
same key should never be re-used. The reliability of the key exchange mechanism
should undergo a thorough investigation, and authenticity and integrity should be
guaranteed to hold using different mechanisms.
The length of the key is a hindrance to using the one-time pad; if a secure channel
exists to communicate a key of the same length as the message to be sent, this same
channel could also serve to send that same message. Nevertheless, in the standard
one-time pad setup, the secret key exchange would typically happen before the
exchange of the message, thus providing a shift of secrecy through time. The one-
time pad offers, however, neither authentication nor integrity.
The properties of the one-time pad make it hardly usable in practice, except in
particular circumstances, typically in the government, and must be complemented
by authentication procedures and integrity protocols.
1.4 Conclusion
The one-time pad is interesting from a theoretical point of view, but it could be
more complex and questionable to use in practice. It is very appealing because of
its perfect secrecy property. However, it lacks basic security properties shared by
standard ciphers, namely authentication, and integrity. It needs to solve the central
issue of the critical exchange between communication partners. Some secure stream
ciphers simulations of the one-time pad should be preferred.
6 T. Lugrin
References
1. D. Kahn. The Codebreakers: The Comprehensive History of Secret Communication from Ancient
Times to the Internet. Scribner, New York, 2nd edition, 1996.
2. F. Miller. Telegraphic Code to Insure Privacy and Secrecy in the Transmission of Telegrams.
Charles M. Cornwell, New York, 1882.
3. Steven M. Bellovin. Frank Miller: Inventor of the one-time pad. Cryptologia, 35:203–2222,
2011.
4. Mariusz Borowski and Marek Leśniewicz. Modern usage of “old” one-time pad. In Military
Communications and Information Systems Conference (MCC), pages 1–5. IEEE, 2012.
5. C. E. Shannon. Communication theory of secrecy systems. Bell System Technical Journal,
28:656–715, 1949.
6. C. H. Bennett and Gilles Brassard. Quantum cryptography: Public key distribution and
coin tossing. In Proceedings of International Conference on Computers, Systems and Signal
Processing, pages 175–179, Bangalore, 1984.
7. Miloslav Dušek, Ondřej Haderkaab, and Martin Hendrych. Generalized beam-splitting attack
in quantum cryptography with dim coherent state. Optics Communication, 169:103–108, 1999.
Open Access This chapter is licensed under the terms of the Creative Commons Attribution 4.0
International License ([Link] which permits use, sharing,
adaptation, distribution and reproduction in any medium or format, as long as you give appropriate
credit to the original author(s) and the source, provide a link to the Creative Commons license and
indicate if changes were made.
The images or other third party material in this chapter are included in the chapter’s Creative
Commons license, unless indicated otherwise in a credit line to the material. If material is not
included in the chapter’s Creative Commons license and your intended use is not permitted by
statutory regulation or exceeds the permitted use, you will need to obtain permission directly from
the copyright holder.
Chapter 2
Symmetric Cryptography
2.1 Introduction
2.2 Analysis
2.2.1 Definition
symmetric when it uses the same key for encryption and decryption. See Chap. 3 for
details on asymmetric cryptography.
Symmetric ciphers are generally grouped into two sub-categories: stream and
block ciphers. Stream ciphers generate a continuous keystream and combine it bit
by bit with the plaintext to produce the ciphertext, typically using the exclusive-
or (XOR) operator; block ciphers divide the plaintext into fixed-size sequences
of bits called blocks, potentially applying some padding. They then run the same
encryption procedure on each block. Various procedures have been standardized,
also known as modes of operation [1, 2]. In order to ensure a good level of security,
each block should have a length of at least 128 bits. The distinction between the
two cipher types is loose since block ciphers applied to 1-bit blocks are essentially
stream ciphers. Block ciphers operating in counter mode (CTR) provide a good
example, where a block-counter appended to a fixed random nonce is encrypted,
de facto providing a keystream, which is then XOR-ed with the blocks of plaintext.
The output feedback mode (OFB) is another example with a similar structure.
It is essential to verify that an encrypted message has not been modified during
its transport. This is why the authenticity—or at least the integrity—of the encrypted
message should be verified before decrypting it. This requirement can be satisfied by
using, e.g., Authenticated Encryption or Authenticated Encryption with Associated
Data (AEAD) [3, 4], which ensure data confidentiality as well as authenticity.
2.2.2 Trends
It is advised to encrypt data using symmetric methods in the future. However, the
required key length for symmetric encryption must be at least 256 bits to guarantee
a sufficient level of protection against brute force attacks and the possible arrival
of quantum computers. Therefore, standard methods such as AES [5] with 256 bits
should be promoted.
When symmetric encryption is used, it is recommended to complement it with
methods that guarantee the encrypted message’s authenticity—or at least integrity.
In general, one should not develop symmetric encryption algorithms on one’s own,
as the standard methods are secure and efficient. Instead, well-established cryp-
tographic libraries that implement those standard algorithms should be preferred
over homemade implementations. Moreover, when buying a product, one should
check that its parameter setup corresponds to symmetric security of at least 256 bits,
e.g., standard symmetric encryption algorithms such as AES [5] with 256 bits. The
AES Algorithm is also known as Rijndael’s Algorithm. The four other algorithms
(Serpent, Twofish, RC6, and MARS) that were selected for the final round of the
competition conducted by NIST in 2001 [6] can also be used in addition to the
standard AES.
2.4 Conclusion
Over the last decades, the use of methods guaranteeing the confidentiality of a
message has exploded, and symmetrical methods have been proven secure in this
domain. If the proper implementations and parameters are used, these algorithms
will remain secure even with the arrival of the quantum computer—see, for example,
Section 2.5 of [7]. Therefore, the choice of secure algorithms and the size of the
parameters proposed in this document is expected to stay the same over the next
decade.
References
1. Morris J. Dworkin. Recommendation for Block Cipher Modes of Operation: Methods and
Techniques. Technical Report SP 800-38A, National Institute of Standards and Technology,
December 2001.
2. Morris J. Dworkin. Recommendation for Block Cipher Modes of Operation: Three Variants
of Ciphertext Stealing for CBC Mode. Technical Report SP 800-38A Addendum, National
Institute of Standards and Technology, October 2010.
3. Mihir Bellare, Phillip Rogaway, and David Wagner. The EAX mode of operation. In
International Workshop on Fast Software Encryption, pages 389–407. Springer, 2004.
4. Morris J. Dworkin. Recommendation for Block Cipher Modes of Operation: Galois/Counter
Mode (GCM) and GMAC. Technical Report SP 800-38D, National Institute of Standards and
Technology, November 2007.
5. Morris J. Dworkin, Elaine B. Barker, James R. Nechvatal, James Foti, Lawrence E. Bassham,
E. Roback, and James F. Dray Jr. Advanced Encryption Standard (AES). Technical report,
National Institute of Standards and Technology, November 2001.
6. James Nechvatal, Elaine Barker, Donna Dodson, Morris J. Dworkin, James Foti, and Edward
Roback. Status report on the first round of the development of the advanced encryption
standard. Journal of Research of the National Institute of Standards and Technology,
104(5):435, September 1999.
10 F. Weissbaum and T. Lugrin
Open Access This chapter is licensed under the terms of the Creative Commons Attribution 4.0
International License ([Link] which permits use, sharing,
adaptation, distribution and reproduction in any medium or format, as long as you give appropriate
credit to the original author(s) and the source, provide a link to the Creative Commons license and
indicate if changes were made.
The images or other third party material in this chapter are included in the chapter’s Creative
Commons license, unless indicated otherwise in a credit line to the material. If material is not
included in the chapter’s Creative Commons license and your intended use is not permitted by
statutory regulation or exceeds the permitted use, you will need to obtain permission directly from
the copyright holder.
Chapter 3
Asymmetric Encryption
3.1 Introduction
While symmetric encryption uses the same key to encrypt and decrypt data, public
key cryptography uses a pair of keys. One of these keys is used for encryption and
the other one for decryption. For the security of the public key cryptosystem, only
the decryption key must be kept secret. For this reason, it is often referred to as
the private key. On the other hand, the encryption key, or public key, can be made
publicly available without harming the security of the cryptosystem.
3.2 Analysis
To ensure that only the intended recipient can decrypt a cipher text, the public
key must be authenticated through other means, e.g., a Public Key Infrastructure
(PKI) [3]. For more information on key management, see Chap. 4.
Asymmetric encryption is not the only application for public key cryptography.
Digital signatures, see Chap. 15, used to verify the authenticity of a document, are
another important example. Another application is homomorphic encryption, see
Chap. 8.
3.2.1 Definition
An asymmetric encryption scheme uses two different keys, a private one and a
public one. While the public key is used for encryption and may be known by others,
the private key is used for decryption and must be kept secret. Like most public
cryptosystems, asymmetric encryption relies on one-way mathematical functions.
This means that while it is easy to compute the result from given input data, it is hard
to recover the input data from the result. Moreover, the corresponding mathematical
problems are conjectured to be hard, such that it is computationally infeasible to
decrypt a message without knowing the private key.
3.2.2 Trends
The widespread public critical systems are based on the integer factorization
problem or the discrete logarithm problem over finite fields and elliptic curves. In
a seminal paper, Peter W. Shor showed that it is possible to solve these problems
efficiently using a sufficiently powerful quantum computer [4]. This triggered
the search for replacement schemes. Several standardization agencies are now
evaluating new proposals for this. In 2022, NIST announced the winners of their
corresponding competition. For further details, we refer to Chap. 10 dedicated to
post-quantum cryptography.
The advent of the quantum computer threatens public key cryptosystems considered
secure today. A strategy should therefore be developed that considers the impli-
cations of this threat on the security of current systems and proposes appropriate
measures to ensure the preservation of security.
3 Asymmetric Encryption 13
Generally, one should not develop proprietary public cryptosystems, as the stan-
dardized algorithms have been thoroughly tested and deeply analyzed. Furthermore,
any proprietary design will likely fail and expose weaknesses that may corrupt the
entire system’s security. Therefore, when procuring products involving public key
cryptography, only those that have been standardized and verified for correctness by
an appropriate specialized authority should be considered.
3.4 Conclusion
References
1. Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone. Handbook of Applied
Cryptography. CRC Press, Boca Raton, October 1996.
2. Wikipedia, Public-key cryptography. [Link]
cryptography&oldid=1099221204, July 2022.
3. Carlisle Adams and Steve Lloyd. Understanding Public-Key Infrastructure. Addison–Wesley
Professional, Boston, 2nd edition, 2003.
4. Peter W. Shor. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms
on a Quantum Computer. SIAM Journal on Computing, 26(5):1484–1509, October 1997.
arXiv:quant-ph/9508027.
5. R. L. Rivest, A. Shamir, and L. Adleman. a method for obtaining digital signatures and public-
key cryptosystems. 21(2):120–126, feb 1978.
Open Access This chapter is licensed under the terms of the Creative Commons Attribution 4.0
International License ([Link] which permits use, sharing,
adaptation, distribution and reproduction in any medium or format, as long as you give appropriate
credit to the original author(s) and the source, provide a link to the Creative Commons license and
indicate if changes were made.
The images or other third party material in this chapter are included in the chapter’s Creative
Commons license, unless indicated otherwise in a credit line to the material. If material is not
included in the chapter’s Creative Commons license and your intended use is not permitted by
statutory regulation or exceeds the permitted use, you will need to obtain permission directly from
the copyright holder.
Chapter 4
Key Management
4.1 Introduction
Key management describes how cryptographic keys are created, securely stored,
distributed to the respective key holders, and used in accordance with protocol
specifications. It is thus a cornerstone of most cryptographic systems and must
be handled with care. Advances in hardware security modules (HSM) used in key
storage and high-end as well as low-cost random number generator used in key
generation show a promising future for secure and affordable key management.
However, future challenges, such as quantum resilience have to be overcome by
new key management systems. For the military, existing experience in handling
cryptographic keys could help in the development of a key management system,
and the reputation of Switzerland could help promote key management systems
developed in Switzerland.
4.2 Analysis
4.2.1 Definition
Key management can be split into four stages: creation, storage, distribution, and
usage of keys.
Once keys are generated, they must be stored securely. Hardware security modules
(HSM) are commonly used to protect the confidentiality of keys (see Chap. 16). This
is essential, especially in the case of key hierarchies, where one key can be used to
generate or issue other keys, and a compromised key (especially the root key) would
invalidate all security properties. While key creation and storage are difficult to
implement correctly, there are widely accepted solutions, such as hardware random
number generators (HRNG) and HSMs from well-established vendors.
longer valid, for example, because the key was compromised or the resource owner
changed.
Once keys are distributed to the respective users, keys must be used according to
the protocol specifications. Depending on the protocol, keys can be reused without
implications, or key reuse can potentially compromise the security properties of the
protocol. Therefore, a protocol must define policies, for example, whether the key
is stored in memory or on a trusted platform module (TPM), how often a key is
replaced (key rollover), or for which operation a key can be used.
4.2.2 Trends
For the military, secure key management is essential to maintain autonomy and
protect against foreign and domestic adversaries. Single entities that can impact
the operation or security of the key management system are potential threats that
must be assessed carefully. An example of such an entity is a kill switch that can
shut down a large portion of the (Internet) communication [11]. In the commercial
sector, depending on the sensitivity of data, separate key management systems are
already in use today, as shown by the SCION-based secure swiss finance network
(SSFN), which provides high availability and security for communication between
Swiss banks.
For the military, buying a key management system or developing a custom one
represents a fundamental choice. The main reason for developing a system is
that in the military, there is a large amount of knowledge and experience in key
management on various aspects, such as key storage and distribution. On the
other hand, purchasing a standard key management protocol from a trusted vendor
might facilitate collaboration with foreign entities while not absorbing the limited
development resources of the military.
Civil society and businesses need more incentives to develop their key manage-
ment system due to the lack of know-how and high cost. The exception could be a
security-affine IT company using the reputation of Switzerland as a “safe” country
to market the developed product (see Securosys [4]). For both sectors, buying is
the natural choice as it allows for easier interoperability with other organizations,
typically at a lower cost (Table 4.1).
4.4 Conclusion
There are well-established standards for key management, e.g., FIPS 140-3 [14]
for hardware security modules or random number generators which provide a
measurable quality for key management systems. Furthermore, although many
commercial key management systems exist from reputable vendors, Swiss IT
security companies can potentially enter the key management market by leveraging
the trust placed in Switzerland as a safe country. Finally, recent research on PKI
explores ways to have more flexible notions of trust without the reliance on globally
trusted entities, solves the revocation problem, and efficiently provides symmetric
keys between users.
References
1. Nadia Heninger, Zakir Durumeric, Eric Wustrow, and J. Alex Halderman. Mining Your Ps and
Qs: Detection of Widespread Weak Keys in Network Devices. pages 205–220, 2012.
2. Ziyong Zheng, Yichen Zhang, Weinan Huang, Song Yu, and Hong Guo. 6 Gbps real-time
optical quantum random number generator based on vacuum fluctuation. Review of Scientific
Instruments, 90(4):043105, April 2019. Publisher: American Institute of Physics.
3. Gaoliang Ma, Huaguo Liang, Liang Yao, Zhengfeng Huang, Maoxiang Yi, Xiumin Xu, and
Kai Zhou. A Low-Cost High-Efficiency True Random Number Generator on FPGAs. In 2018
IEEE 27th Asian Test Symposium (ATS), pages 54–58, October 2018. ISSN: 2377-5386.
4. Securosys SA. Securosys | Hardware Security Ready For the Challenges of Tomorrow. https://
[Link]/en/.
20 C. Krähenbühl and A. Perrig
5. Anish Athalye, M Frans Kaashoek, and Nickolai Zeldovich. Verifying Hardware Security
Modules with Information-Preserving Refinement. page 18.
6. Internet Security Research Group (ISRG). Let’s Encrypt stats. [Link]
September 2022.
7. National Institute of Standards and Technology (NIST). NIST RPKI monitor. [Link]
[Link]/, September 2022.
8. Trevor Smith, Luke Dickinson, and Kent Seamons. Let’s Revoke: Scalable Global Certificate
Revocation. In Proceedings 2020 Network and Distributed System Security Symposium, San
Diego, CA, 2020. Internet Society.
9. Laurent Chuat, Cyrill Krähenbühl, Prateek Mittal, and Adrian Perrig. F-PKI: Enabling
Innovation and Trust Flexibility in the HTTPS Public-Key Infrastructure. In Proceedings 2022
Network and Distributed System Security Symposium, San Diego, CA, USA, 2022. Internet
Society.
10. Benjamin Rothenberger, Dominik Roos, Markus Legner, and Adrian Perrig. PISKES:
Pragmatic Internet-Scale Key-Establishment System. In Proceedings of the 15th ACM Asia
Conference on Computer and Communications Security, ASIA CCS ’20, pages 73–86, New
York, NY, USA, October 2020. Association for Computing Machinery.
11. Benjamin Rothenberger, Daniele E. Asoni, David Barrera, and Adrian Perrig. Internet
Kill Switches Demystified. In Proceedings of the 10th European Workshop on Systems
Security, EuroSec’17, pages 1–6, New York, NY, USA, April 2017. Association for Computing
Machinery.
12. Douglas Stebila, Scott Fluhrer, and Shay Gueron. Hybrid key exchange in tls 1.3. Internet-
Draft draft-ietf-tls-hybrid-design-05, IETF Secretariat, August 2022.
13. Vasileios Mavroeidis, Kamer Vishi, Mateusz D., and Audun Jøsang. The impact of quantum
computing on present cryptography. International Journal of Advanced Computer Science and
Applications, 9(3), 2018.
14. National Institute of Standards and Technology. Security requirements for cryptographic
modules. Technical Report NIST FIPS 140-3, National Institute of Standards and Technology,
Gaithersburg, MD, April 2019.
Open Access This chapter is licensed under the terms of the Creative Commons Attribution 4.0
International License ([Link] which permits use, sharing,
adaptation, distribution and reproduction in any medium or format, as long as you give appropriate
credit to the original author(s) and the source, provide a link to the Creative Commons license and
indicate if changes were made.
The images or other third party material in this chapter are included in the chapter’s Creative
Commons license, unless indicated otherwise in a credit line to the material. If material is not
included in the chapter’s Creative Commons license and your intended use is not permitted by
statutory regulation or exceeds the permitted use, you will need to obtain permission directly from
the copyright holder.
Chapter 5
Hash Functions
5.1 Introduction
Hash functions are one-way functions that map arbitrary-length input to fixed-
length output. Cryptographic hash functions enjoy additional properties, making
them suitable for many cryptographic applications. Established hash functions are
considered secure, and no significant development is expected in this area. Insecure
hash functions should be discarded, and existing secure hash functions should be
promoted and adequately used.
5.2 Analysis
5.2.1 Definition
5.2.2 Trends
The last competition to find and standardize a new Secure Hash Algorithm (SHA-
3) ended in 2012 [5] with the winner’s announcement, namely Keccak. However,
both SHA-3 (FIPS PUB 202, [6]) and its predecessor SHA-2 (FIPS PUB 180-
4, [7]) with a minimal length of 256 bits are considered secure (concerning the
properties mentioned in Sect. 5.2.1) and we see no indication that this will change
in the next few years. Furthermore, other hash functions are considered secure (e.g.,
BLAKE) [8]. We, therefore, consider a significant development in this area unlikely.
Switzerland should continue to use and promote the use of cryptographically secure
and standardized hash functions.
5 Hash Functions 23
Standardized hash functions considered secure in Sect. 5.2.1 exist, and open-source
implementations thereof can be used at no cost. There is hence no need for
Switzerland to develop its hash functions.
The security properties required from hash functions depend on the intended
purpose. For example, a collision attack on the used hash functions has catastrophic
consequences when it is used in signature schemes (see [9] for an attack scenario),
whereas this is not necessarily problematic when it is used in HMACs. Nevertheless,
insecure hash functions should not be used anymore, independently of their area of
application.
Numerous hash functions are considered secure concerning the properties men-
tioned in 5.2.1; their design and properties differ. For example, SHA-2 is vulnerable
to length extension attacks, whereas SHA-3 is not [8]. This is why hash functions
cannot be used interchangeably and should be chosen carefully depending on the
intended purpose.
There exist a wide range of cryptographic applications that make use of hash
functions. The US National Institute of Standards and Technology (NIST) publishes
standards for hash functions (FIPS 180-4 in [7], FIPS 202 in [6]) as well as methods
making use of hash functions (e.g., HMAC in FIPS 198-1, HKDF in SP 800-56A/B,
digital signatures in FIPS 186-5).
5.4 Conclusion
Hash functions have been in use in cryptographic applications for a long time. There
exist established hash functions, and their pitfalls are known and documented. The
development in computing power, including Quantum Computers, is not expected
to yield a general problem with hash functions in the foreseeable future. As
a consequence, not much development in this area is expected. Insecure hash
functions should be discarded and existing secure hash functions adequately used.
References
1. James M Turner. The Keyed-Hash Message Authentication Code (HMAC), 2008. Federal Inf.
Process. Stds. (NIST FIPS), National Institute of Standards and Technology, Gaithersburg, MD.
2. Lily Chen. Recommendation for Key Derivation Using Pseudorandom Functions, 2022. Federal
Inf. Process. Stds. (NIST FIPS), National Institute of Standards and Technology, Gaithersburg,
MD.
3. Lov K. Grover. A fast quantum mechanical algorithm for database search. In Proceedings of
the twenty-eighth annual ACM symposium on Theory of computing, pages 212–219, 1996.
4. Bart Preneel. Cryptographic hash functions. European Transactions on Telecommunications,
5(4):431–448, 1994.
24 U. Wagner and T. Lugrin
Open Access This chapter is licensed under the terms of the Creative Commons Attribution 4.0
International License ([Link] which permits use, sharing,
adaptation, distribution and reproduction in any medium or format, as long as you give appropriate
credit to the original author(s) and the source, provide a link to the Creative Commons license and
indicate if changes were made.
The images or other third party material in this chapter are included in the chapter’s Creative
Commons license, unless indicated otherwise in a credit line to the material. If material is not
included in the chapter’s Creative Commons license and your intended use is not permitted by
statutory regulation or exceeds the permitted use, you will need to obtain permission directly from
the copyright holder.
Chapter 6
Zero-Knowledge Proof
Imad Aad
6.1 Introduction
6.2 Analysis
I. Aad ()
EPFL, Lausanne, Switzerland
e-mail: [Link]@[Link]
a need to rethink the trust the user puts in the service provider (i.e., how much the
prover trusts the verifier). Optimally, the prover should share the proof of his claim
with the verifier without revealing any additional information (e.g., sharing proof of
adulthood instead of the date of birth).
6.2.1 Definition
than interactive ZKPs. Unlike interactive ZKPs, non-interactive ZKPs apply to large
groups of verifiers since the proof can be transferred to third parties, which is a big
advantage w.r.t. interactive ZKP solutions.
One non-interactive ZKP solution is called zkSNARK (zero-knowledge Succinct
Non-interactive Argument of Knowledge) [4, 6, 7]. It has, besides zero-knowledge
and non-interactiveness, the following properties:
• Succinct: Regardless of the problem size, the proof is 288 bytes, which is
convenient for storage cost (e.g., on a blockchain)
• Argument (i.e., claim of the prover): The result of any execution of a computation
can be used as a statement/argument.
In order to move from interactive to non-interactive, zkSNARK replaces the
verifier’s random challenges to the prover with a “common reference value,” such as
a random string commonly agreed upon and accessible to all. At the same time, no
party influences the actual random choice. Based on the “common reference value,”
the prover simulates the challenges and constructs the proof. The verifier then re-
runs the experiment for verification.
6.2.2 Trends
ZKPs are still in their early days. Open initiatives and standardization efforts involve
industry, academia, and technical and non-technical specialists. The potential impact
is well beyond 2025.
ZKPs also bring promising research in “zero knowledge treaty verification”. The
most famous example is “nuclear warhead verification”, where ZKPs can give
information about the nuclear warheads without revealing closed secret designs. The
details of “nuclear warhead verification” are based on the comparison of physical
properties of objects (thus the term “physical ZKP”) which is out of the scope of
this article. However, this opens the door for a wide range of other applications in
international treaties, controls, and mediations.
Being very active on the international level in treaties and mediations, Switzer-
land can benefit from ZKPs for specific checks without revealing additional secret
information, which often hinders negotiations between opposing parties. Identifying
the specific use cases and the corresponding ZKP solutions can be a potential
collaboration between authorities and academia.
28 I. Aad
efficiencies. ZKPs will play a similar role. However, as mentioned before, the
market share of these privacy-based services is relatively small, with occasional
boosts due to data leaks and scandals. This trend is likely to remain the same.
There are different ZKPs for different use cases, and most of these are either being
researched or open-source implementations. So far, Buying is not an option.
6.4 Conclusion
ZKPs are in their early stages, and research is still widening their application range
and use cases.
For the industry (swiss or worldwide), this may bring new opportunities to:
• Using the (new) PET as a differentiation factor (like Threema and Proton do for
messaging and email)
• Adopting ZKP where applicable, therefore improving the security of data sharing
For civil society, where ever ZKPs apply, this is an additional way to secure
personal data, reducing the impacts of data breaches.
For the Swiss government and military, ZKPs may help improve controls and
mediation between conflicting parties. Therefore it is recommended to investigate
the potentials further here and keep observing the evolution of ZKPs.
30 I. Aad
References
1. Gwyneth Iredale. Example of A Good Zero Knowledge Proof, March 2021. 101 Blockchains.
2. 14 ZKP Clare Nelson. [Link]
nYshblWbR8UBr0k8wNWSU2pGeQtM7Fn0, August 2022.
3. Vincent Tabora. Self-Sovereign Identity With Zero Knowledge Proof. [Link]
[Link]/self-sovereign-identity-with-zero-knowledge-proof-9a05f36f16da,
December 2018. Medium.
4. Hasib Anwar. Zero Knowledge Proof: A Introductory Guide. [Link]
knowledge-proof/, November 2021. 101 Blockchains.
5. Zero-Knowledge Proof: How it Works, Use Cases & Applications. [Link]
com/zero-knowledge-proofs/, August 2022.
6. Demonstrate how Zero-Knowledge Proofs work without using math. [Link]
pulse/demonstrate-how-zero-knowledge-proofs-work-without-using-chalkias, August 2022.
7. Introduction to zk-SNARKs (Part 1). [Link]
September 2018. Decentriq.
8. CoinYuppie. 2022 predictions: Zero-knowledge proofs (ZKPs) key to Web3 - CoinYuppie:
Bitcoin, Ethereum, Metaverse, NFT, DAO, DeFi, Dogecoin, Crypto News. [Link]
com/2022-predictions-zero-knowledge-proofs-zkps-key-to-web3/, [Link]
2022-predictions-zero-knowledge-proofs-zkps-key-to-web3/, March 2022.
9. Wikipedia, Web3. [Link]
August 2022.
Open Access This chapter is licensed under the terms of the Creative Commons Attribution 4.0
International License ([Link] which permits use, sharing,
adaptation, distribution and reproduction in any medium or format, as long as you give appropriate
credit to the original author(s) and the source, provide a link to the Creative Commons license and
indicate if changes were made.
The images or other third party material in this chapter are included in the chapter’s Creative
Commons license, unless indicated otherwise in a credit line to the material. If material is not
included in the chapter’s Creative Commons license and your intended use is not permitted by
statutory regulation or exceeds the permitted use, you will need to obtain permission directly from
the copyright holder.
Chapter 7
Random Number Generator
Thomas Lugrin
7.1 Introduction
Most modern encryption and authentication methods rely on the generation of ran-
dom numbers [1], such as for key generation, initial vectors, or nonces. Therefore,
a reliable source of entropy is fundamental in making encryption and authentication
methods secure—weak sources of randomness can compromise otherwise secure
encryption and authentication schemes.
7.2 Analysis
7.2.1 Definition
T. Lugrin ()
Federal Administration, Bern, Switzerland
e-mail: [Link]@[Link]
7.2.2 Trends
Small-size, low-cost QRNGs have already been integrated into off-the-shelf devices
such as smartphones, computers, and hardware security modules.
Using secure RNGs that cannot be manipulated or tampered with and whose output
is not predictable is fundamental as a basis for encryption methods. Applications
involving particularly sensitive data can combine the output from two or more
independent sources of randomness for improved security. PRNGs, which produce
deterministic outcomes, must not be used in cryptography in isolation and must at
least blend in TRNG’s randomness.
Open-source solutions such as the Linux kernel RNG /dev/urandom are
considered reliable [6]. Hardware products dedicated to producing randomness from
reliable and reputable producers can be used as a complement after appropriate
verification and approval.
Several companies are operating in the TRNG market, e.g., developing QRNG
chips that can be integrated into hardware. A few companies selling QRNG chips
7 Random Number Generator 33
or systems are listed in Table 7.1. These QRNG chips do not offer stronger
guarantees than other TRNGs; they are just another means of potentially generating
cryptographically secure randomness.
7.4 Conclusion
generators are not suited in such a context, except if suitably combined with a
reliable entropy source.
Proving that a source of bits is truly random is impossible on finite sequences,
but statistical test suites exist that provide evidence against non-randomness. Good
physical sources of entropy must be chained with robust post-processing techniques
to remove biases and serial dependencies.
Standard tools like /dev/urandom on Linux systems provide a good source
of random numbers based on multiple hardware-based entropy sources. Additional
security can be achieved by combining independent RNGs, typically based on
physical processes of different types, e.g., quantum physics.
References
1. Kinga Marton, Alin Suciu, and Iosif Ignat. Randomness in Digital Cryptography: A Survey.
Romanian Journal of Information Science and Technology, 13:219–240, 2010.
2. Jonathan Katz and Yehuda Lindell. Introduction to Modern Cryptography. CRC Press, Boca
Raton, 3rd edition, 2021.
3. David Johnston. Random Number Generators—Principles and Practices: A Guide for Engi-
neeers and Programmers. Walter de Gruyter GmbH, Berlin/Boston, 2018.
4. Steve Crocker, Donald E. Eastlake 3rd, and Jeffrey I. Schiller. Randomness Recommendations
for Security. Request for Comments RFC 1750, Internet Engineering Task Force, December
1994.
5. random(4) - Linux manual page. [Link]
August 2022.
6. Stephan Müller. Documentation and Analysis of the Linux Random Number Generator.
Technical report, Bundesamt für Sicherheit in der Informationstechnik, April 2020.
7. Andrew Rukhin, Juan Soto, James Nechvatal, Elaine Barker, Stefan Leigh, Mark Levenson,
David Banks, Alan Heckert, and James Dray. A Statistical Test Suite for Random and
Pseudorandom Number Generators for Cryptographic Applications. Technical report, National
Institute of Standards and Technology, April 2010.
8. Wolfgang Killmann and Werner Schindler. A proposal for: Functionality classes for random
number generators. Technical report, Bundesamt für Sicherheit in der Informationstechnik,
September 2011.
Open Access This chapter is licensed under the terms of the Creative Commons Attribution 4.0
International License ([Link] which permits use, sharing,
adaptation, distribution and reproduction in any medium or format, as long as you give appropriate
credit to the original author(s) and the source, provide a link to the Creative Commons license and
indicate if changes were made.
The images or other third party material in this chapter are included in the chapter’s Creative
Commons license, unless indicated otherwise in a credit line to the material. If material is not
included in the chapter’s Creative Commons license and your intended use is not permitted by
statutory regulation or exceeds the permitted use, you will need to obtain permission directly from
the copyright holder.
Chapter 8
Homomorphic Encryption
Jean-Pierre Hubaux
8.1 Introduction
The basic idea is several decades old, and partial solutions were already proposed
in the late twentieth century. In 2009, Craig Gentry proved that it was possible to
operate under fully homomorphic encryption (FHE) to support any computation [1].
Since then, many improvements were made, notably to increase performance.
For sensitive data, such as healthcare information, homomorphic encryption
can enable new services by removing privacy barriers inhibiting data sharing, or
increasing the security of existing services. For example, due to medical data privacy
concerns, predictive analytics in healthcare can be hard to apply via a third-party
service provider. However, these privacy concerns are diminished if the predictive
analytics service provider can operate on encrypted data instead. Moreover, even if
the service provider’s system is compromised, the data would remain secure [2].
For many years, homomorphic encryption has suffered from two significant
weaknesses: Limitations on the nature of the computations that could be performed
and high computational costs (and thus higher energy consumption and slower
execution). The former has been addressed by the advent of the already mentioned
FHE and the subsequent enhancements brought after that; polynomials of the
appropriate degree can approximate non-polynomial functions. In addition, several
software optimizations have mitigated the latter. Nevertheless, many additional
improvements (several orders of magnitude) are expected by deploying specialized
hardware accelerators that should become available by 2025.
8.2.1 Trends
On the business side, considering how heavily Switzerland is involved in the service
sector, including data-intense activities, it is expected that homomorphic encryption
can be of high relevance. In particular, better protection can reduce the vulnerability
of data entrusted to Swiss companies.
In Switzerland, the three main industry-level activities related to HE are as
follows. In its Zurich Research Lab, IBM has developed an HE library called
HElib. HElib is a free and open-source cross-platform software. It implements
various forms of homomorphic encryption. It is based on the Brakerski-Gentry-
Vaikuntanathan (BGV) fully homomorphic encryption scheme. It also includes
several optimizations, such as Smart-Vercauteren ciphertext packing techniques. It
is written in C++.
The US-Swiss company Inpher has developed an open-source HE library called
TFHE [5]. It is written in C/C++ and based on the ring variant of the Gentry, Sahai,
and Waters (GSW) cryptosystem. TFHE is distinct from the company’s flagship
product, XOR, a software product providing secure multi-party computation fea-
tures. However, XOR and TFHE can be used jointly in some cases. The company is
funded mainly by US banks and operates primarily in that sector, but it also invests
in the health sector.
Finally, the EPFL spin-off Tune Insight SA that was founded in 2021 has
developed a HE library called Lattigo, written in GoLang [6]. The library is based
on the Cheon-Kim-Kim-Song (CKKS) crypto scheme and thus provides floating
point operations and supports fast bootstrapping.
For cloud computing, homomorphic encryption can respond to the legal uncer-
tainty generated by the Schrems II ruling of the European Court of Justice. Indeed,
Schrems II has challenged the agreement that was previously set up between the
US and EU authorities in terms of processing of data related to EU citizens by
US companies [7]. Homomorphic encryption is a response to this concern because,
with HE, Swiss-based users can use US-operated cloud services while retaining the
exclusive knowledge of their decryption keys and, therefore, all their data.
For an overview of HE libraries (including those unrelated to Switzerland), the
reader is referred to the Wikipedia article on HE [2]. For applications aiming at
building intelligence out of siloed data, homomorphic encryption can be combined
with secure multi-party computation (SMC) which is described in Chap. 17.
At the time of this writing (November 2022), HE is still in a maturation phase, and
much more information can be found about the HE tools themselves than about
real-world applications. Nevertheless, we briefly provide three real-world examples
related to the three companies mentioned above with Swiss-based technical activi-
ties on HE.
Organizations can use IBM’s HElib to scale their stream processing applications
into the infrastructure-as-a-service clouds elastically. Moreover, the proposed solu-
tion not only elastically scales data stream processing applications into public clouds
but also preserves the privacy of such applications [8].
Inpher’s technical solutions, XOR and TFHE, can be used to support privacy-
preserving techniques in financial services. More specifically, these tools can be
instrumental in fighting financial crime such as money laundering and enable
enforcement use cases [9].
Finally, armasuisse and Tune Insight SA are collaborating on sharing cyberse-
curity intelligence [10]. Tune Insight has already deployed its privacy-preserving
distributed data analysis solution among several university hospitals.
8.4 Conclusion
References
1. Craig Gentry. A fully homomorphic encryption scheme. Stanford PhD thesis, 2009.
2. Wikipedia, Homomorphic encryption. [Link]
Homomorphic_encryption&oldid=1099292061, July 2022.
3. Homomorphic Encryption Standardization – An Open Industry / Government / Academic
Consortium to Advance Secure Computation. [Link] August
2022.
4. Abbas Acar, Hidayet Aksu, Selcuk Uluagac, and Mauro Conti. A survey on homomorphic
encryption schemes: Theory and implementation. ACM Computing Surveys, 2019.
5. TFHE Fast Fully Homomorphic Encryption over the Torus. [Link] August
2022.
6. Lattigo: lattice-based multiparty homomorphic encryption library in Go. [Link]
tuneinsight/lattigo, August 2022.
7. Mildebrath Hendrik. The CJEU judgment in the Schrems II case, September 2020.
8. Rodrigo Arosha, Dayarathna Miyuru, and Sanath Jayasena. Latency-aware secure elastic
stream processing with homomorphic encryption. Data Science and Engineering, 2020.
8 Homomorphic Encryption 39
Open Access This chapter is licensed under the terms of the Creative Commons Attribution 4.0
International License ([Link] which permits use, sharing,
adaptation, distribution and reproduction in any medium or format, as long as you give appropriate
credit to the original author(s) and the source, provide a link to the Creative Commons license and
indicate if changes were made.
The images or other third party material in this chapter are included in the chapter’s Creative
Commons license, unless indicated otherwise in a credit line to the material. If material is not
included in the chapter’s Creative Commons license and your intended use is not permitted by
statutory regulation or exceeds the permitted use, you will need to obtain permission directly from
the copyright holder.
Chapter 9
Quantum Key Distribution
Jasper Rödiger
9.1 Introduction
A new class of computers, so-called quantum computers, will soon be able to crack
common encryption algorithms. Quantum Key Distribution (QKD) is a promising
solution to stay secure in the quantum computer age, which is progressively getting
industrialized in recent years. Worldwide, point-to-point QKD links are combined
into larger and larger testbed networks, which approach more commercially usable
networks. Topics like certification and standardization have become increasingly
important for QKD. Since Switzerland is strong in the field of QKD in terms of
academia and industry, it has the opportunity to produce QKD technology within
the country successfully.
9.2 Analysis
9.2.1 Definition
Quantum computers will soon thus endanger secure data traffic. Entirely new
methods will therefore be needed to secure data transmission in the future.
Nowadays, two leading families of cryptographic techniques are used to protect
telecommunications. The first is symmetric encryption, see Chap. 2, such as AES,
and the other is public-key cryptography, also known as asymmetric cryptography.
The asymmetric cryptographic methods are often used to distribute the symmetric
J. Rödiger ()
Rohde und Schwarz, Cologne, Germany
e-mail: [Link]@[Link]
9.2.2 Trends
There are many different QKD protocols in existence, which, based on the above-
described principles, use different degrees of freedom and state preparation and
measurement mechanisms. The maturity of the implementation and theoretical
assessment of the different QKD protocols are vastly different. Some implemen-
tations of those protocols are already quite mature, can be purchased as QKD
solutions for point-to-point secure communication by different vendors, or are close
to being purchasable. Worldwide, those point-to-point solutions are combined to
testbed networks, which approach more commercially usable networks.
The largest of those QKD networks is the quantum backbone network built in
China from 2013 to 2017, which spans over 2000 km of fiber between Beijing and
Shanghai, including the satellite Micius offering satellite-based QKD links [3]. It
is being expanded in 2017 to cover China by 2025. In the EU, since 2019, the
EuroQCI initiative aims to build a secure quantum communication infrastructure
(QCI) that will span the whole EU, including its overseas territories through
fiber and satellite links [4]. All 27 EU member states have signed the EuroQCI
declaration, committing themselves to the EuroQCI initiative. EuroQCI’s goal is
to have a fully operational QCI by 2027. The US company Battelle and the swiss
company IDQuantique implemented a QKD network in the US in 2013 between
9 Quantum Key Distribution 43
Columbus and Dublin in Ohio, namely the Battelle Quantum Network (BQN) [5].
It is their declared goal to extend the BQN to span 700 km.
Another sign that QKD is progressively getting industrialized can be observed
by examining standardization endeavors. The most critical standardization organi-
zations regarding QKD are ETSI and ITU. The first standardization activity was
already started in 2008 by the ETSI by establishing the Industry Specification Group
on QKD. Later, the ITU started in the realm of QKD and remained very active.
Additionally, cybersecurity authorities, like, e.g., the German BSI or the French
ANSSI, will play an essential role in the certification of QKD products [6]. However,
governmental agencies still point out the lack of scalability [7] or even oppose its
use for business-critical networks [8].
Since the QKD market is growing, Switzerland can keep its advantages in the field
of QKD if the field is further supported [10].
44 J. Rödiger
9.4 Conclusion
References
1. Craig Gidney and Martin Ekerå. How to factor 2048 bit RSA integers in 8 hours using 20 million
noisy qubits. Quantum, 5:433, April 2021. arXiv:1905.09749 [quant-ph].
2. S. Pirandola, S. Pirandola, U. L. Andersen, L. Banchi, M. Berta, D. Bunandar, R. Colbeck,
D. Englund, T. Gehring, C. Lupo, C. Ottaviani, J. L. Pereira, M. Razavi, J. Shamsul Shaari,
J. Shamsul Shaari, M. Tomamichel, M. Tomamichel, V. C. Usenko, G. Vallone, P. Villoresi, and
P. Wallden. Advances in quantum cryptography. Advances in Optics and Photonics, 12(4):1012–
1236, December 2020. Publisher: Optica Publishing Group.
3. An Assessment of the U.S. and Chinese Industrial Bases in Quantum Technology. RAND
Corporation, 2022.
9 Quantum Key Distribution 45
Open Access This chapter is licensed under the terms of the Creative Commons Attribution 4.0
International License ([Link] which permits use, sharing,
adaptation, distribution and reproduction in any medium or format, as long as you give appropriate
credit to the original author(s) and the source, provide a link to the Creative Commons license and
indicate if changes were made.
The images or other third party material in this chapter are included in the chapter’s Creative
Commons license, unless indicated otherwise in a credit line to the material. If material is not
included in the chapter’s Creative Commons license and your intended use is not permitted by
statutory regulation or exceeds the permitted use, you will need to obtain permission directly from
the copyright holder.
Chapter 10
Post-quantum Cryptography
Linus Gasser
10.1 Introduction
The chapter about Post-quantum Cryptography discusses the need for a new
generation of cryptography to protect against future quantum computers. These
computers will likely reverse many of the one-way functions used in current asym-
metric encryption methods, making encrypted data vulnerable. The US government
advocates vigorously to implement post-quantum algorithms by 2035, as an enemy
could decrypt encrypted data or messages copied today. Symmetric encryption is
not significantly faster for quantum computers to break, but asymmetric encryption,
which relies on one-way functions, is vulnerable. NIST started a Post-Quantum
Cryptography (PQC) challenge in 2016, with four algorithms selected as safe
against quantum computers in 2022. The first implementations have started to
appear, combining PQC with classical algorithms for added security. The research
will continue to find faster and more secure algorithms, but no known cryptographic
algorithm is provably secure against quantum computers and allows homomorphic
encryption. Hybrid encryption is becoming more common, but protocols without
a fallback must be considered carefully, as some quantum-safe algorithms may be
attackable.
L. Gasser ()
EPFL, Lausanne, Switzerland
e-mail: [Link]@[Link]
10.2 Analysis
Cryptography is widely used to encrypt (hide) and sign (prove the source) electronic
documents and internet traffic. The underlying mathematical concept is a one-way
function [1] that makes it easy to encrypt but challenging to decrypt without a secret.
However, future quantum computers will likely be able to reverse many of these one-
way functions that are widely used and allow the calculation of the secret needed to
decrypt the data.
The US government urges its services to implement post-quantum algorithms
by 2035 [2]. The urgency comes from the fact that even if quantum computers are
expected to be available after that date, an enemy who copied encrypted data or
encrypted messages might decrypt them at this point. For data with a long secrecy
requirement, it is thus crucial to start using quantum-safe encryption well before
such quantum computers exist.
10.2.1 Definition
Current encryption algorithms can be separated into two groups: symmetric encryp-
tion (see Chap. 2) and asymmetric encryption (see Chap. 3).
As of 2022, quantum computers are not significantly faster at breaking symmetric
cryptography [3]. However, asymmetric encryption is based on one-way functions
which can take a random, secret key and create a corresponding public key. The
inverse function, taking a public key, and finding the secret key, is supposed to be
hard for the two most commonly used algorithms, namely RSA and Elliptic Curves.
Future quantum computers should be able to speed up this reversing operation
and make it possible to use a public key to find the corresponding private key
within minutes instead of eons. They will use the Shor algorithm to break the
one-way functions of RSA and Elliptic Curves. However, as seen in [4], there are
still exponential advancements in terms of the number of qubits and their quality
(error rate) required until quantum computers are powerful enough to run the Shor
algorithm for today’s asymmetric encryption algorithms.
Various propositions exist for one-way functions where quantum computers
do not have an advantage. There are a couple of challenges: similar to one-way
functions in widespread use today, these new ones need to be secure against any type
of attack. It is not because nobody found an attack that would break an algorithm
that the algorithm is secure as it often takes years to find such attacks, as seen in the
example of two entries in the NIST post-quantum standardization effort [5]. Another
problem is the encryption’s speed, the keys’ size, and the corresponding messages.
10 Post-quantum Cryptography 49
10.2.2 Trends
Fig. 10.1 Timelines of development of new algorithms and development of quantum computers
50 L. Gasser
There are different options for quantum-safe implementations. The first one would
be to implement the probable best algorithm available. The second would be a
hybrid combination of classical and quantum-safe algorithms to get the most secure
option. Moreover, to wait until a consensus emerges on the best algorithm existing
(Table 10.2).
10 Post-quantum Cryptography 51
10.4 Conclusion
For the time being, symmetric encryption is secure and a quantum computer will
not be able to create a significant speedup over classical computers for decrypting
messages. However, the estimations of if and when a quantum computer capable of
breaking RSA and Elliptic Curves will become available differ significantly between
experts. As Fig. 10.1 indicates, not switching to quantum-safe algorithms would
mean that long-term secrets might get compromised. For this reason, switching
to quantum-safe algorithms is critical for data that must remain secret for years
(e.g., military secrets or e-voting data). For all other data, it is crucial to ensure
that systems are at least crypto-agile (migration path exists) or already come with
support for hybrid algorithms, primarily when they are widely used like SSH [8].
52 L. Gasser
References
Open Access This chapter is licensed under the terms of the Creative Commons Attribution 4.0
International License ([Link] which permits use, sharing,
adaptation, distribution and reproduction in any medium or format, as long as you give appropriate
credit to the original author(s) and the source, provide a link to the Creative Commons license and
indicate if changes were made.
The images or other third party material in this chapter are included in the chapter’s Creative
Commons license, unless indicated otherwise in a credit line to the material. If material is not
included in the chapter’s Creative Commons license and your intended use is not permitted by
statutory regulation or exceeds the permitted use, you will need to obtain permission directly from
the copyright holder.
Part II
Low-Level Applications
Chapter 11
Functional Encryption
Romain Gay
11.1 Introduction
11.2 Analysis
11.2.1 Definition
R. Gay ()
IBM Switzerland, Zurich, Switzerland
e-mail: RGA@[Link]
11.2.2 Trends
Traditional encryption schemes already address the need for confidential point-
to-point communication. However, only advanced encryption schemes such as
Functional Encryption can handle more sophisticated data sharing involving an
untrusted cloud. Several technological trends are likely to accelerate the deployment
of this new tool:
• recent progress regarding the building of general purpose Functional Encryption
that supports rich and complex classes of functions, performing advanced
analytics of the encrypted plaintexts
• efficiency improvement for schemes supporting simple functions, with the
implementation of libraries and the application to real-life use cases, such as
Privacy-preserving and auditable Digital Currency, Motion Detection and Local
Decision Making, and Privacy-Preserving Statistical Analysis [2–5].
• rise of new decentralized schemes where no trusted setup is required, removing
the single point of failure that plagues conventional encryption schemes.
Just as Homomorphic Encryption, Functional Encryption protects data in use—
as opposed to standard encryption that only protects data in transit or at rest—with
the additional advantage that the computation performed by the cloud is trusted by
design and requires less interaction with the clients since the server can directly
recover partial information from the encrypted data.
11 Functional Encryption 57
A large share of Swiss businesses, such as the medical, banking, and insurance
sectors, rely heavily on users’ data, which is often confidential and sensitive. Besides
solid privacy laws, these businesses can build trust with the consumers by using
cryptographic tools such as Functional Encryption to build a product that is private
by design. On the other hand, many data sets deemed too sensitive to share could
be securely aggregated and put to practical use, for instance, medical data used for
research.
The fact that the Fentec project [2], whose sponsors include the Swiss company
Kudelsky Security [6], is currently developing an open-source library for Functional
Encryption makes a case for buy. As typical for cryptographic schemes, and
especially for recent technologies such as Functional Encryption, it is riskier to
develop a homemade solution than using a tried and tested implementation. Using
existing technology implies a faster development of products and a solution that is
less prone to bugs.
On the other hand, making a scheme from scratch would avoid using a scheme
that potentially has a (purposeful or accidental) trapdoor. It could also permit a
tailored scheme for a particular application, improving performance.
Overall the case for buying is more compelling than making because it would
require significant efforts to build a security scheme that is on par with the existing
open-source solutions.
Functional Encryption schemes come in many forms. First, the general purpose
schemes that can handle arbitrarily complex functions and satisfy strong security
notions are versatile tools but need more concrete efficiency. Second, another class
of Functional Encryption schemes handles complex functions but only supports a
somewhat limited security notion where keys only have a short life span (technically
speaking, the attackers’ capability of corrupting keys needs to be bounded and
known in advance so that the security parameters can be scaled accordingly). These
schemes may be well suited for applications that require performing sophisticated
computation on the encrypted data and where the attackers’ capabilities are
relatively limited in scope.
Finally, the third type of Functional Encryption scheme focuses on smaller
classes of simple functions, such as a weighted average on encrypted data. These
58 R. Gay
schemes are the most efficient, and the simple functions they handle are sufficient for
applications such as private inference. In some applications, simplicity is beneficial
since it allows the classifier to justify itself easily. For instance, if a bank refuses
a loan based on data analysis from a client, it should be able to justify its choice
and make sure the decision is fair (e.g., not based on discriminatory attributes). This
is easier to do if the classifier is a simple function. There are a variety of schemes
and underlying cryptographic assumptions available. The schemes based on elliptic
curves enjoy the smallest ciphertext and key sizes. In contrast, the lattice-based
options have the advantage of post-quantum security but are currently less efficient
(especially size-wise) than their counterparts.
11.4 Conclusion
References
Open Access This chapter is licensed under the terms of the Creative Commons Attribution 4.0
International License ([Link] which permits use, sharing,
adaptation, distribution and reproduction in any medium or format, as long as you give appropriate
credit to the original author(s) and the source, provide a link to the Creative Commons license and
indicate if changes were made.
The images or other third party material in this chapter are included in the chapter’s Creative
Commons license, unless indicated otherwise in a credit line to the material. If material is not
included in the chapter’s Creative Commons license and your intended use is not permitted by
statutory regulation or exceeds the permitted use, you will need to obtain permission directly from
the copyright holder.
Chapter 12
Identity-Based Cryptography
Bernhard Tellenbach
12.1 Introduction
In identity-based cryptosystems (IBC), identity is also the public key. This has two
clear advantages over traditional public-key cryptosystems. First, certificates are
not needed to bind the two independent information units, identity and public key.
Second, key management is simplified because users can easily remember public
keys for identities such as email addresses or domain names. There exists a wide
variety of IBCs with widely differing properties and application domains. However,
since most of them need a trusted third party that can derive the private keys of
participants, those systems are not suitable for applications where this is a problem.
This might contribute to the fact that, in practice, applications of IBC are still
relatively rare, although there are various standards for IBC. Examples are ISO/IEC
18033-5:2015, IEEE 1363.3-2013, or the MIKEY-SAKKE protocol for securing
communication links, which is being actively pushed by the UK’s National Cyber
Security Centre. In Switzerland, the use of technology in the public and private
sectors, unlike research on it at universities, has yet to receive much attention.
Changing this could lead to more effective solutions to several problems that it can
address.
B. Tellenbach ()
Cyber-Defence Campus, Thun, Switzerland
e-mail: [Link]@[Link]
12.2 Analysis
12.2.1 Definition
In identity-based cryptosystems, the public key is also the identity. This has two
clear advantages over traditional public-key cryptosystems: first, there is no need
for certificates to bind the two independent information units, identity and public
key, and second, key management is simplified because users can easily remember
public keys, at least for identities such as email addresses or domain names. These
two properties were the primary motivation of Adi Shamir when he introduced this
type of cryptography in 1984 [1].
12.2.2 Trends
across a system of hierarchical PKGs (private key generators). There are also
proposed solutions for the key-escrow problem [7–9]. However, in many cases,
these solutions still need to be well-tested or have limitations of their own. Finally,
resistance to quantum computing is likely to be an issue since many of today’s
solutions are based on assumptions about difficult-to-solve problems on elliptic
curves. Approaches that rely on believed-to-be quantum computing-resistant lattice-
based cryptography have existed since 2008. However, these need to be prepared
for practical use because of various open questions and factors such as too large
public keys [10]. It is therefore expected that this technology will continue to be
actively researched and improved in the coming years. Additional application areas
and forms will be proposed and tested.
In practice, applications of IBC are still relatively rare, although there are now
various standards for IBC procedures and their application, e.g. ISO/IEC 18033-
5:2015 or IEEE 1363.3-2013. Examples of products where IBC can already be used
today are FortiMail from Fortinet or Voltage SecureMail Cloud. Another example
where IBC is used is the MIKEY-SAKKE protocol for securing communication
links, which is standardized in IETF RFCs 6507, 6508, and 6509 and is being
actively pushed by the UK’s National Cyber Security Centre (NCSC). While
isolated solutions currently exist in individual companies and sectors, the use
of MIKEY-SAKKE should later allow seamless cross-government and industry
communication. This is why the NCSC only certifies secure Voice-Over-IP (VoIP)
clients for official use by the UK government that supports this protocol. A good
overview of the topic and possible application areas is provided by the ETSI
Technical Report 103 719 from March 2022, which is also suitable for non-
experts [11]. ETSI sees, in particular, government and enterprise applications,
public safety and mission-critical applications, the Internet of Things, and Intelligent
Transport Systems as promising application areas.
This section presents the pros and cons of buying or making identity-based
cryptography solutions (Table 12.1).
other recommendations, [12] contains some and serves as a starting point for more
in-depth investigation.
12.4 Conclusion
Identity-based encryption systems are characterized by the fact that the public key
is easy to remember, and the implementations skip the step of linking the public key
to a specific identity. However, they also have some disadvantages. In particular,
the trust that must be placed in the trusted third party is significantly higher than in
traditional public key systems.
Whether these and other potentially disadvantageous properties, such as the lack
of well-tested quantum-safe solutions, are relevant depends on the specific use
case. Moreover, the lively research activity in the field can potentially mitigate or
eliminate undesirable properties.
References
1. Adi Shamir. Identity-Based Cryptosystems and Signature Schemes. In George Robert Blakley
and David Chaum, editors, Advances in Cryptology, Lecture Notes in Computer Science, pages
47–53, Berlin, Heidelberg, 1985. Springer.
2. Wikipedia, key escrow. [Link]
1100458218, July 2022.
3. Craig Gentry and Alice Silverberg. Hierarchical ID-Based Cryptography. 2002. Cryptology
ePrint Archive.
4. Jeremy Horwitz and Ben Lynn. Toward Hierarchical Identity-Based Encryption. In Gerhard
Goos, Juris Hartmanis, Jan van Leeuwen, and Lars R. Knudsen, editors, Advances in
Cryptology — EUROCRYPT 2002, volume 2332, pages 466–481. Springer Berlin Heidelberg,
Berlin, Heidelberg, 2002. Series Title: Lecture Notes in Computer Science.
5. Dan Boneh, Xavier Boyen, and Eu-Jin Goh. Hierarchical Identity Based Encryption with
Constant Size Ciphertext. In Ronald Cramer, editor, Advances in Cryptology – EUROCRYPT
2005, Lecture Notes in Computer Science, pages 440–456, Berlin, Heidelberg, 2005. Springer.
6. Roman Langrehr and Jiaxin Pan. Tightly Secure Hierarchical Identity-Based Encryption.
Journal of Cryptology, 33(4):1787–1821, October 2020.
7. Keita Emura, Shuichi Katsumata, and Yohei Watanabe. Identity-based encryption with security
against the KGC: A formal model and its instantiations. Theoretical Computer Science,
900(C):97–119, January 2022.
8. Rikke Bendlin, Sara Krehbiel, and Chris Peikert. How to Share a Lattice Trapdoor: Threshold
Protocols for Signatures and (H)IBE. Cryptology ePrint Archive, 2013.
9. Mahender Kumar and Satish Chand. ESKI-IBE: Efficient and secure key issuing identity-based
encryption with cloud privacy centers. Multimedia Tools and Applications, 78(14):19753–
19786, July 2019.
10. Goichiro Hanaoka and Shota Yamada. A Survey on Identity-Based Encryption from Lattices.
In Tsuyoshi Takagi, Masato Wakayama, Keisuke Tanaka, Noboru Kunihiro, Kazufumi Kimoto,
and Dung Hoang Duong, editors, Mathematical Modelling for Next-Generation Cryptography:
CREST Crypto-Math Project, Mathematics for Industry, pages 349–365. Springer, Singapore,
2018.
64 B. Tellenbach
Open Access This chapter is licensed under the terms of the Creative Commons Attribution 4.0
International License ([Link] which permits use, sharing,
adaptation, distribution and reproduction in any medium or format, as long as you give appropriate
credit to the original author(s) and the source, provide a link to the Creative Commons license and
indicate if changes were made.
The images or other third party material in this chapter are included in the chapter’s Creative
Commons license, unless indicated otherwise in a credit line to the material. If material is not
included in the chapter’s Creative Commons license and your intended use is not permitted by
statutory regulation or exceeds the permitted use, you will need to obtain permission directly from
the copyright holder.
Chapter 13
Multi-Party Threshold Cryptography
Christian Cachin
13.1 Introduction
13.2 Analysis
13.2.1 Definition
C. Cachin ()
University of Bern, Bern, Switzerland
e-mail: cachin@[Link]
gain security by drawing on replication and redundancy and rely on multiple parties
to operate. Threshold cryptography is the technology that lets such systems execute
cryptographic operations. As no single party must store any secret material (such as
the private key) because the party may leak when it is corrupted, the cryptographic
operations must also be distributed.
In a threshold cryptosystem, the private key is typically distributed among the N
parties that constitute the system using cryptographically secure secret sharing. Up
to F of the parties might be faulty and leak their key shares, but .F +1 must cooperate
in executing a cryptographic operation. From the outside, the cryptographic result
(such as the digital signature or the decryption of a ciphertext) is the same as if
the operation had been executed on a single party. It is crucial that the operation
reveals nothing about the private key to the faulty parties and that it is robust.
That is, it cannot be disrupted by faulty parties that may act maliciously. Threshold
cryptosystems require at least .N > 2 ∗ F , which means that any minority of the
parties could become corrupted.
Threshold cryptosystems have been developed for most public-key cryptosys-
tems in use today. This includes digital signatures (RSA, DSA, ECDSA, BLS,
and more), encryption (RSA, variants of ElGamal encryption, including pairing-
based ones.), and coin-tossing for producing unbiased randomness. However,
the efficiency of implementations differs widely depending on the mathematical
structure of the underlying cryptosystem; for example, threshold implementations
of BLS-based schemes are easy to build and relatively efficient, but the operations
of DSA and ECDSA are challenging to distribute.
Particular focus must be placed on generating the private key held jointly by the
parties. The simplest method would be to generate the key material on a single node,
but this introduces more centralization than is generally accepted. The reason is that
this node itself could become corrupted, contradicting the motto that no single party
can be trusted. Protocols for distributed key generation (DKG) have therefore been
developed. However, they are often more complex than the standard operation of the
public-key schemes, and they require integration with a distributed communication
platform.
Notably, threshold cryptosystems differ widely according to their needs for
interaction among the parties. The most efficient schemes are non-interactive: when
producing a digital signature, every party generates a “share” of such a signature
and disseminates it. Upon receiving .F + 1 such shares, every party can obtain
the digital signature. Many other schemes, however, require multiple rounds of
interaction among the parties and some steps in which they reach a consensus on
which parties have been potentially faulty during the key-generation process. These
are more difficult to implement and are not widely available or deployed today. A
typical example from the latter category is DKG protocols: they require more than
one rounds of communication and some “agreement” on which parties terminated
the protocol correctly.
13 Multi-Party Threshold Cryptography 67
13.2.2 Trends
13.4 Conclusion
For building secure distributed systems that can survive a partial corruption of their
components, multi-party threshold cryptography plays an important role. It is related
to secure multi-party computation because both use the same trust model, also
found in many blockchain platforms. However, MPC systems are more general than
threshold cryptosystems and may compute arbitrary functions, whereas threshold
cryptosystems are limited to operations with cryptographic keys. In addition, MPC
protocols are several orders of magnitude less efficient than the typical threshold
cryptosystems. Therefore, threshold cryptosystems are expected to be deployed
earlier than MPC-based systems.
13 Multi-Party Threshold Cryptography 69
References
1. Luca Gambazzi, Patrick Schaller, Alain Mermoud, and Vincent Lenders. Blockchain in
Cyberdefence: A Technology Review from a Swiss Perspective, March 2021. arXiv:2103.02606
[cs].
2. Yvo G. Desmedt. Threshold cryptography. European Transactions on Telecommunications,
5(4), 1994.
3. The dfinity foundation is a major contributor to the internet computer blockchain. [Link]
org, July 2022.
4. Information Technology Laboratory Computer Security Division. Multi-Party Threshold
Cryptography | CSRC | CSRC. [Link] July 2018.
CSRC | NIST.
Open Access This chapter is licensed under the terms of the Creative Commons Attribution 4.0
International License ([Link] which permits use, sharing,
adaptation, distribution and reproduction in any medium or format, as long as you give appropriate
credit to the original author(s) and the source, provide a link to the Creative Commons license and
indicate if changes were made.
The images or other third party material in this chapter are included in the chapter’s Creative
Commons license, unless indicated otherwise in a credit line to the material. If material is not
included in the chapter’s Creative Commons license and your intended use is not permitted by
statutory regulation or exceeds the permitted use, you will need to obtain permission directly from
the copyright holder.
Chapter 14
Searchable Symmetric Encryption
14.1 Introduction
14.2 Analysis
14.2.1 Definition
14.2.2 Trends
There is a long history of research on SSE, starting with early work in 2000 by Song
et al. [4]. Over the last 20 years, SSEs have improved functionality, security, and
efficiency. First, the functionality of SSE schemes was improved, e.g., by allowing
modifications to the dictionaries [5]. The attacker model was extended to provide
forward privacy (previous search queries cannot be associated with future updates)
and backward privacy (search queries cannot be associated with deleted documents).
Finally, SSE schemes become increasingly efficient (e.g., Aura [6], which has a sub-
millisecond index insertion time and a sub-microsecond deletion time). State-of-
the-art SSE schemes have become practical to be used in real-world settings while
providing strong security properties [6, 7].
With the emergence of cloud-based services and storage, parties in various
sectors have decided to move their data to cloud storage, significantly reducing
operational costs. In most cases, the cloud infrastructure is not hosted by the party
but by an independent provider. In such cases, it is often preferential or even required
by law or policy to only store encrypted data in the cloud. Unfortunately, storing
14 Searchable Symmetric Encryption 73
encrypted data makes searching the database impossible for the provider that does
not possess the decryption keys. SSE allows parties to combine the benefits of
encrypted cloud storage while retaining the ability to search this data. Since the
trend of increasingly using cloud storage is not expected to slow down in the near
future, efficient SSE approaches are likely to be increasingly used.
However, it is essential to note that correctly designing and implementing SSE is
difficult. Many proposed systems have become insecure as they leak access patterns
or even allow reconstructing the complete database [8, 9]. The risk of storing
sensitive data on remote storage using SSE must thus be carefully evaluated case-
by-case.
There is ample opportunity to move more sensitive data to the cloud to reduce
hardware and management costs and facilitate information sharing. At the same
time, privacy regulations or company-specific policies that require sensitive data to
be encrypted fuel the need for SSE.
For the military, public cloud solutions are likely not up to their standard in terms of
security and reliability. However, the military must collaborate with foreign armed
forces, police forces, or between different divisions. Therefore, custom-built SSE
solutions running on trustworthy cloud infrastructures could be attractive, especially
for sharing data within Switzerland. Furthermore, a solution offered by a trustworthy
international source could also be an exciting option for collaboration with foreign
entities.
For the civil society and economy sector, custom-built solutions may be pro-
hibitive in terms of cost and complicate collaboration with other entities. Public
cloud SSE solutions are also attractive due to their low cost and simple management.
A straightforward use case for SSE in civil society is storing privacy-sensitive
healthcare data on a public cloud for collaboration between health insurance
providers, hospitals, and clinics (Table 14.1).
SSE). In general, which type of SSE should be used depends on the application (e.g.,
keyword search or geometric range search on spatial data), the efficiency, and the
security requirements.
14.4 Conclusion
SSE provides the necessary tools to ensure privacy for the transitions of different
sectors from local storage to cloud-based remote storage. The benefits of cloud-
based services have been shown over the last decade for virtually all sectors.
Moreover, this trend of moving data to the cloud does not show any signs of slowing
down, making efficient and secure SSE solutions a vital tool for Switzerland in the
coming years. However, the secure usage of SSE approaches is very challenging;
thus, data security needs to be carefully assessed, especially in the case of highly
sensitive information.
14 Searchable Symmetric Encryption 75
References
1. Reza Curtmola, Juan Garay, Seny Kamara, and Rafail Ostrovsky. Searchable symmetric
encryption: Improved definitions and efficient constructions. Journal of Computer Security,
19(5):895–934, November 2011.
2. Rakesh Agrawal, Jerry Kiernan, Ramakrishnan Srikant, and Yirong Xu. Order preserving
encryption for numeric data. In Proceedings of the ACM international conference on
Management of data, SIGMOD ’04. ACM Press, 2004.
3. Georgios Kellaris, George Kollios, Kobbi Nissim, and Adam O'Neill. Generic attacks on secure
outsourced databases. CCS ’16. ACM, oct 2016.
4. Dawn Xiaoding Song, D. Wagner, and A. Perrig. Practical techniques for searches on encrypted
data. In Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000, pages 44–55,
May 2000. ISSN: 1081-6011.
5. Seny Kamara, Charalampos Papamanthou, and Tom Roeder. Dynamic searchable symmetric
encryption. In Proceedings of the 2012 ACM conference on Computer and communications
security - CCS ’12, page 965, Raleigh, North Carolina, USA, 2012. ACM Press.
6. Shi-Feng Sun, Ron Steinfeld, Shangqi Lai, Xingliang Yuan, Amin Sakzad, Joseph Liu, Surya
Nepal, and Dawu Gu. Practical Non-Interactive Searchable Encryption with Forward and
Backward Privacy. In Proceedings 2021 Network and Distributed System Security Symposium,
Virtual, 2021. Internet Society.
7. Tianyang Chen, Peng Xu, Wei Wang, Yubo Zheng, Willy Susilo, and Hai Jin. Bestie: Very
Practical Searchable Encryption with Forward and Backward Security. In Computer Security –
ESORICS 2021: 26th European Symposium on Research in Computer Security, Darmstadt,
Germany, October 4–8, 2021, Proceedings, Part II, pages 3–23, Berlin, Heidelberg, October
2021. Springer-Verlag.
8. Paul Grubbs, Richard McPherson, Muhammad Naveed, Thomas Ristenpart, and Vitaly
Shmatikov. Breaking Web Applications Built On Top of Encrypted Data. pages 1353–1364,
October 2016.
9. Francesca Falzon, Evangelia Anna Markatou, Akshima, David Cash, Adam Rivkin, Jesse Stern,
and Roberto Tamassia. Full Database Reconstruction in Two Dimensions. In Proceedings of the
2020 ACM SIGSAC Conference on Computer and Communications Security, CCS ’20, pages
443–460, New York, NY, USA, October 2020. Association for Computing Machinery.
Open Access This chapter is licensed under the terms of the Creative Commons Attribution 4.0
International License ([Link] which permits use, sharing,
adaptation, distribution and reproduction in any medium or format, as long as you give appropriate
credit to the original author(s) and the source, provide a link to the Creative Commons license and
indicate if changes were made.
The images or other third party material in this chapter are included in the chapter’s Creative
Commons license, unless indicated otherwise in a credit line to the material. If material is not
included in the chapter’s Creative Commons license and your intended use is not permitted by
statutory regulation or exceeds the permitted use, you will need to obtain permission directly from
the copyright holder.
Chapter 15
Digital Signature
Weyde Lin
15.1 Introduction
The chapter “Digital Signature” covers the use of cryptographic methods and
asymmetric cryptography to sign data and provide origin authentication, data
integrity, and signer non-repudiation. The signing process involves generating a
hash of the data using a cryptographic hashing function, encrypting the hash with the
signing party’s private key, and sending the data and encrypted hash to the verifying
party. The verifying party can determine the validity of the signature by generating a
hash of the data and comparing it to the decrypted hash. The digital signature market
is expected to grow by around 30% annually over the next few years, with a focus on
reducing friction for users and ensuring security. In Switzerland, organizations can
either make their digital signature solution for internal use or buy a solution from
established companies offering digital signature services.
15.2 Analysis
W. Lin ()
Eraneos Switzerland AG, Zurich, Switzerland
e-mail: [Link]@[Link]
15.2.1 Definition
Figure 15.1 illustrates the signing and verifying of a digital signature. To digitally
sign data, two cryptography functions are used [1, 2]. The first step is to generate
a hash (fingerprint) of the data using a cryptographic hashing function (see Hash
Functions in Chap. 5). The hash is then encrypted by the signing party using its
private key. This encrypted hash is the data’s digital signature. Finally, the data
and the signature are sent to the verifying party as separate files in a container
or embedded in the data (e.g., signed PDF). As part of the verification process,
the verifying party generates the hash of the data using the same cryptographic
hashing function. Additionally, the verifying party decrypts the signature using the
signing party’s public key, resulting in a decrypted hash that the signer can only
generate. The verifying party can determine whether the digital signature is valid
by comparing the decrypted hash with the calculated hash [3]. When a public key
is used with a public key certificate (i.e., a certificate that confirms the validity of a
public key and contains information about the key owner), it can be identified who
signed the document, or it can be proved that it was signed by a specific individual
(see Public Key Infrastructure in Chap. 10).
Fig. 15.1 Schematic depiction of digital data signing and verifying process
15 Digital Signature 79
15.2.2 Trends
Make: It is important to note that a digital signature is only helpful if all parties
use the same standard. As a result, making your digital signature products is only
suitable for internal use within an organization which is rarely the case—as such,
creating your solution for signing data allows you to control all aspects of the
signing process. Military applications may benefit from this technology.
Buy: Many other use cases, especially those in which data is shared with third
parties, could benefit from buying from one of the established companies offering
digital signature services (e.g., DocuSign, Connective, Adobe Sign, One Span,
Evidos, Signicat, Signing Hub, Cryptomathic) or electronic signatures (accred-
ited by ZertES (Federal law on electronic signatures): Swisscom (Schweiz) AG,
QuoVadis Trustlink Schweiz AG, SwissSign AG, Bundesamt für Informatik und
Telekommunikation BIT [7]). Furthermore, in civil society and the economy,
purchasing commercial off-the-shelf (COTS) products from accredited companies
is beneficial since they are already certified, meet the legal framework, and should
be compatible with other products.
80 W. Lin
Electronic signatures are sometimes used as synonyms for digital signatures [8].
Despite this, in many legislations (e.g., eIDAS in the European Union or ZertES in
Switzerland), the term electronic signature (or e-signature) has a particular meaning.
It refers to signing data with the same legal status as a handwritten signature.
Electronic signatures are often based on a digital signature. In the EU (eIDAS
Regulation [9]) and Switzerland (ZertES [10] and VzertES [11]), this is codified
in the law. Electronic signatures can be classified into the following types:
• Qualified electronic signature (QES): QESs is recognized as equivalent to
handwritten signatures in Switzerland and the European Union. A QES is based
on a digital signature and can be used for documents that require a legal form
(e.g., employment contracts)
• Advanced electronic signature (AES): An advanced electronic signature is also
based on a digital signature but does not provide liability protection. It defines
specific technical requirements for electronic signatures and allows for the
signer’s identification. AES can be used for documents that do not require a legal
form (e.g., rental agreement)
• Basic electronic signature: A handwritten or scanned signature can be used, as
well as a signature recorded with a stylus on a tablet. There is no legal or technical
requirement for this type of signature.
Everything regarding the usage of the electronic signature can be found in the
Federal Act on certification services in the field of electronic signatures and other
applications of digital certificates [12].
A particular case of the digital signature is code signing, which entails digitally
signing executables and scripts. By doing so, it is possible to verify the code’s author
and ensure that it has not been altered or compromised since it was signed.
15.4 Conclusion
References
Open Access This chapter is licensed under the terms of the Creative Commons Attribution 4.0
International License ([Link] which permits use, sharing,
adaptation, distribution and reproduction in any medium or format, as long as you give appropriate
credit to the original author(s) and the source, provide a link to the Creative Commons license and
indicate if changes were made.
The images or other third party material in this chapter are included in the chapter’s Creative
Commons license, unless indicated otherwise in a credit line to the material. If material is not
included in the chapter’s Creative Commons license and your intended use is not permitted by
statutory regulation or exceeds the permitted use, you will need to obtain permission directly from
the copyright holder.
Chapter 16
Hardware Security Module
Maria Sommerhalder
16.1 Introduction
16.2 Analysis
Various industries use hardware security modules (HSMs) to secure data, including
banking, insurance, digital identity, and blockchain applications. Their functions
include key generation, key management, encryption, decryption, and hashing.
M. Sommerhalder ()
Eraneos Switzerland AG, Zurich, Switzerland
e-mail: [Link]@[Link]
16.2.1 Definition
16.2.2 Trends
For over 20 years, HSMs have been used to protect cryptographic material in
multiple applications [4]. However, a Ponemon Institute survey of 580 IT and
security practitioners worldwide (55% from organizations with 1000 or more
employees) found that HSMs are primarily used for key management or payment. A
survey made in 2014 found that Organizations typically utilize 13 modules for key
management, followed by eight for payment purposes [5].
The advent of cloud computing has increased the complexity of securing critical
data. Data is now stored in the cloud: the percentage of corporate data stored in
the cloud in organizations worldwide has doubled from 30% in 2015 to 60% by
2022 [6]. Many companies are concerned that their data will be unprotected from
unauthorized access by the cloud provider or the US government in case of a
subpoena, as most of the renowned cloud providers operate from the United States.
As a result, double-key encryption has become increasingly popular, which encrypts
data using two keys. A copy is stored on an HSM, and a copy is stored in the cloud.
Before storing the data in the cloud, the owner of the data or the HSM vendor
encrypts it so that the cloud provider cannot decrypt it. Parties can only access the
data with both keys [7]. The use of double key encryption is widespread in highly
regulated industries such as banking, health, and the public sector to comply with
privacy and data protection laws [7].
Global payment markets are expanding, resulting in a higher demand for HSM
machines to secure payment-related cryptographic operations. Many other factors
are driving the growth of the HSM market, including the rise of cybersecurity
16 Hardware Security Module 85
threats and the need for confidentiality in the banking, financial services, and
insurance industries [8]. There is also an increase in demand for HSMs from other
sources, such as the automotive industry, where they are used to enable secure
communication, verify and authenticate software updates [9].
Several key players in the global HSM market include Gemalto, Inc., IBM
Corporation, Ultra Electronics Group Holdings, Utimaco GmbH, Futurex L.P.,
Thales e-Security, Inc., Hewlett Packard Enterprise Development L.P., SWIFT C.S.,
and Yubico, Inc. [8].
In EPFL’s School of Computer and Communication Sciences, there is a research
domain entitled “Security and Privacy”, which publishes papers on the topic [10].
The area of research involving the development of post-quantum hardware security
modules is also present. The possibility of seeing some of them be available
shortly, combined with embedded hardware accelerators, see Chap. 20 [11]. The
area of combining Iot devices and Hardware Security modules is also explored. For
example, the HSM can achieve the integrity of the key injection [12].
Due to the political stability and the availability of skilled labor, a specialist
ecosystem has developed in Switzerland, with many HSM providers having branch
offices here and Swiss providers establishing themselves on the international stage.
The Swiss branch of Securosys SA and the Swiss branch of Thales Suisse SA are
examples of this.
16.3.1 Maturity
Due to the maturity of the HSM market, it is possible to find machines suitable for
a wide range of applications. However, HSMs should be purchased from reputable
vendors, preferably ones that have already been certified (see below).
Three recommendations are presented in this section regarding the use of HSMs.
• Geo-redundant setup and Clustering
HSMs must be stored in secure data centers, but even then, hardware failures,
natural disasters, or human error can destroy an HSM. This would result in the
irreversible loss of all key material. Typically, a company has two to three devices
with the same build and data (i.e., replicated) located geographically. Therefore,
86 M. Sommerhalder
16.4 Conclusion
References
4. Michael Suby. An Anchor of Trust in a Digital World: Risk Management Strategies for Digital
Processes - Whitepaper. March 2020.
5. Ponemon Institute LLC. HSM Global Market Study. July 2014.
6. Statista. Share of corporate data stored in the cloud in organizations worldwide from 2015
to 2022. [Link]
data/, March 2022.
7. Mustapha Hedabou. Cloud Key Management Based on Verifiable Secret Sharing. In Min Yang,
Chao Chen, and Yang Liu, editors, Network and System Security, volume 13041, pages 289–
303. Springer International Publishing, Cham, 2021. Series Title: Lecture Notes in Computer
Science.
8. Bloomberg. Hardware Security Modules Market size worth $ 7.9 Billion, Globally, by 2028 at
12.4% CAGR: Verified Market Research. February 2022.
9. Claudius Pott, Philipp Jungklass, David Jacek Csejka, Thomas Eisenbarth, and Marco Siebert.
Firmware Security Module: A Framework for Trusted Computing in Automotive Multiproces-
sors. Journal of Hardware and Systems Security, 5(2):103–113, June 2021.
10. EPFL. Security & Privacy. [Link] August
2022.
11. Wen Wang and Marc Stöttinger. Post-Quantum Secure Architectures for Automotive Hardware
Secure Modules, 2020. Report Number: 026.
12. Simranjeet Sidhu, Bassam J. Mohd, and Thaier Hayajneh. Hardware Security in IoT Devices
with Emphasis on Hardware Trojans. Journal of Sensor and Actuator Networks, 8(3):42,
September 2019. Number: 3 Publisher: Multidisciplinary Digital Publishing Institute.
13. Capital Markets and Technology Association. Digital Assets Custody Standard. [Link]
ch/content/77ea8b352579fd35f28e246cec6c4c46/cmta-digital-assets-custody-standard-v-12-
[Link], October 2020.
14. National Institute of Standards and Technology. Security requirements for cryptographic
modules. Technical Report NIST FIPS 140-3, National Institute of Standards and Technology,
Gaithersburg, MD, April 2019.
15. Common Criteria Portal. Certified Products. [Link]
August 2022.
16. NIST. FIPS General Information. [Link] May
2018.
Open Access This chapter is licensed under the terms of the Creative Commons Attribution 4.0
International License ([Link] which permits use, sharing,
adaptation, distribution and reproduction in any medium or format, as long as you give appropriate
credit to the original author(s) and the source, provide a link to the Creative Commons license and
indicate if changes were made.
The images or other third party material in this chapter are included in the chapter’s Creative
Commons license, unless indicated otherwise in a credit line to the material. If material is not
included in the chapter’s Creative Commons license and your intended use is not permitted by
statutory regulation or exceeds the permitted use, you will need to obtain permission directly from
the copyright holder.
Chapter 17
Secure Multi-Party Computation
17.1 Introduction
17.2 Analysis
17.2.1 Definition
are kept secret from all other parties. Some MPC protocols allow for auditable
computation allowing any party, including a party who did not participate in the
computation, to verify the correctness of the result [2, 3].
A significant benefit of using MPC is that many of the constructed MPC protocols
are information-theoretically secure, avoiding many of the problems involved with
using cryptographic hardness assumptions. However, using MPC comes at the cost
of performance (several orders of magnitudes slower), primarily due to MPC’s high
bandwidth requirements. Nonetheless, specialized MPC protocols can significantly
enhance performance compared to generic MPC protocols; one prominent example
is private set intersection [4]. A drawback of information-theoretic MPC protocols in
comparison to MPC protocols that rely on hardness assumptions that their security
guarantees are violated in the presence of a dishonest majority [5].
One particular case of multi-party computation is private set intersection (PSI).
In this case, each party has a set of items, and the goal is to learn the intersection of
those sets while revealing nothing else about those sets [6].
17.2.2 Trends
Virtually all organizations could see benefits from utilizing MPC as it enables
mutually distrustful parties to cooperatively compute the output of a function that
they all agree on without revealing their input. These parties may be distinct. (e.g.,
different healthcare providers aiming to collaborate to improve patient care but do
not want to disclose patient data) or the same (e.g., an organization aiming to protect
sensitive information by splitting this information across its multiple data centers,
where each data center is a party to the MPC protocol).
Some notable MPC use cases are secure auctions [7], privacy-preserving network
security monitoring [8], spam filtering on encrypted emails [9] and secure machine
learning [10]. Another notable MPC application is distributed authentication where
MPC can strengthen an organization’s key server by splitting the critical server’s
functionalities across multiple servers; an adversary capable of compromising one
or a threshold of critical servers will not be able to reconstruct the organizations’
keys. Please refer to Chap. 13 for additional information on multi-party threshold
systems. Unfortunately, factors such as a steep learning curve, unfamiliar math-
ematical notions, and a rapidly growing and evolving environment prevent easy
exploitation of the technology by programmers and end users. To reach a widespread
adoption of MPC, these issues must be addressed [11]. Application Programming
interfaces (APIs) for secure multiparty computations are a promising technology to
overcome these challenges. Another one are compilers.
17 Secure Multi-Party Computation 91
An MPC solution consists of two major disciplines (distributed systems & cryp-
tography), each with its challenges and it would thus require extensive efforts to
design and implement a homemade MPC solution. The author then recommends
purchasing an existing MPC solution for all markets (military, civil society, and
economy) Nevertheless, he recommends different deployments as discussed in
Sect. 17.3.2.
There are three MPC deployment variations: on-premise, hybrid, and cloud. For the
military and maybe for civil society, the preferable setup is on-premise to prevent
distributing private inputs to the software provider. To achieve the promises of
MPC, an on-premise setup should require two or more independent data centers
where each data center is considered a party to the MPC protocol. For civil society
and the economy, the likely preferable option is a hybrid setup where the client’s
IT infrastructure and the software provider’s IT infrastructure are each a party to
the MPC protocol. The bandwidth between these two parties could be significant
but may save the client from compartmentalizing their IT infrastructure. Cloud
deployment allows for the complete outsourcing of the MPC solution where it is
operated only on the software provider’s IT infrastructure. This cloud deployment
is likely the least expensive option.
17.4 Conclusion
References
1. David Evans, Vladimir Kolesnikov, and Mike Rosulek. A Pragmatic Introduction to Secure
Multi-Party Computation. April 2020.
2. Carsten Baum, Ivan Damgård, and Claudio Orlandi. Publicly Auditable Secure Multi-Party
Computation. In Michel Abdalla and Roberto De Prisco, editors, Security and Cryptography
for Networks, pages 175–196, Cham, 2014. Springer International Publishing.
3. Sanket Kanjalkar, Ye Zhang, Shreyas Gandlur, and Andrew Miller. Publicly Auditable MPC-
as-a-Service with succinct verification and universal setup. arXiv:2107.04248 [cs], July 2021.
4. Vladimir Kolesnikov, Ranjit Kumaresan, Mike Rosulek, and Ni Trieu. Efficient Batched
Oblivious PRF with Applications to Private Set Intersection. In Proceedings of the 2016 ACM
SIGSAC Conference on Computer and Communications Security, CCS ’16, pages 818–829,
New York, NY, USA, October 2016. Association for Computing Machinery.
5. Shai Halevi, Yuval Ishai, Eyal Kushilevitz, and Tal Rabin. Best Possible Information-Theoretic
MPC. In Theory of Cryptography: 16th International Conference, TCC 2018, Panaji, India,
November 11–14, 2018, Proceedings, Part II, pages 255–281, Berlin, Heidelberg, November
2018. Springer-Verlag.
6. CSRC Presentation: A Brief Overview of Private Set Intersection | CSRC. [Link]
presentations/2021/a-brief-overview-of-private-set-intersection, April 2021. CSRC | NIST.
7. Peter Bogetoft, Dan Lund Christensen, Ivan Damgård, Martin Geisler, Thomas Jakobsen,
Mikkel Krøigaard, Janus Dam Nielsen, Jesper Buus Nielsen, Kurt Nielsen, Jakob Pagter,
Michael Schwartzbach, and Tomas Toft. Secure Multiparty Computation Goes Live. In Roger
Dingledine and Philippe Golle, editors, Financial Cryptography and Data Security, pages 325–
343, Berlin, Heidelberg, 2009. Springer.
8. Martin Burkhart, Mario Strasser, Dilip Many, and Xenofontas Dimitropoulos. SEPIA:
Privacy-Preserving aggregation of Multi-Domain network events and statistics. In 19th
USENIX Security Symposium (USENIX Security 10), Washington, DC, August 2010. USENIX
Association.
9. Trinabh Gupta, Henrique Fingler, Lorenzo Alvisi, and Michael Walfish. Pretzel: Email
encryption and provider-supplied functions are compatible. In Proceedings of the Conference
of the ACM Special Interest Group on Data Communication, SIGCOMM ’17, page 169–182,
New York, NY, USA, 2017. Association for Computing Machinery.
10. Jian Liu, Mika Juuti, Yao Lu, and N. Asokan. Oblivious neural network predictions via minionn
transformations. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and
Communications Security, CCS ’17, page 619–631, New York, NY, USA, 2017. Association
for Computing Machinery.
11. José Cabrero-Holgueras and Sergio Pastrana. Sok: Privacy-preserving computation techniques
for deep learning. Proceedings on Privacy Enhancing Technologies, 2021(4):139–162, 2021.
Open Access This chapter is licensed under the terms of the Creative Commons Attribution 4.0
International License ([Link] which permits use, sharing,
adaptation, distribution and reproduction in any medium or format, as long as you give appropriate
credit to the original author(s) and the source, provide a link to the Creative Commons license and
indicate if changes were made.
The images or other third party material in this chapter are included in the chapter’s Creative
Commons license, unless indicated otherwise in a credit line to the material. If material is not
included in the chapter’s Creative Commons license and your intended use is not permitted by
statutory regulation or exceeds the permitted use, you will need to obtain permission directly from
the copyright holder.
Part III
High-Level Applications
Chapter 18
Trusted Execution Environment
Maria Sommerhalder
18.1 Introduction
18.2 Analysis
M. Sommerhalder ()
Eraneos Switzerland AG, Zurich, Switzerland
e-mail: [Link]@[Link]
Fig. 18.1 Depiction of a TEE compared with a “normal” environment. The root of Trust and
Remote Attestation is used to authenticate the device and the executed applications. The Trusted
Application Manager is used to install applications, which can then be consumed in the TEE
18.2.1 Definition
TEEs are areas on a central processor or device that execute code with higher levels
of security than the rest of the device. Security is provided by encrypted memory
regions called enclaves. Because the environment is isolated from the rest of the
device, it is not affected by infection or compromise of the device. The code or
applications that run on the TEE are referred to as trusted applications (TAs) [2]
(see Fig. 18.1).
In principle, TEEs are similar to hardware security modules (HSMs), which are
dedicated devices that allow the creation of keys protected by hardware and perform
everyday cryptographic operations such as encryption, decryption, and signing. It is
a separate module that is connected to the main CPU and motherboard via a PCI bus
or a network [3] (see HSM in Chap. 16). On the other hand, the TEE is a component
of the typical chipset and does not require any additional hardware.
TEEs often vary in terms of their exact security goals. However, most of them
aim to provide four high-level security protections. The first one is the verifiable
launch of the execution environment for the sensitive code and data so that a remote
entity can assure that it was set up correctly. The second is the run-time isolation to
protect the confidentiality and integrity of sensitive code and data. The third is the
trusted IO to enable secure access to peripherals and accelerators. The fourth one is
the secure storage for TEE data that must be stored persistently and made available
only to authorized entities at a later time [4].
18 Trusted Execution Environment 97
18.2.2 Trends
[Link] Application on Mobile Phones
The mobile phone is capable of downloading and using a wide variety of appli-
cations. As a result of this increased complexity of code bases running on mobile
operating systems, vulnerabilities and compromises are more likely to be exploited.
Malicious code from one application can access information from another appli-
cation and leak the information. Using TEEs, application space can be separated
from each other, and sensitive applications can be restricted to running within the
TEE. Data that requires high levels of security can be designated to be stored
and processed exclusively within the TEE and nowhere else [1]. In most modern
smartphones and tablets, the ARM TrustZone implements a TEE [5].
Today’s computer and mobile systems are becoming increasingly complex, hosting
a variety of untrusted software components, such as multiple applications interacting
with user data on a single smartphone or multiple tenants sharing a single cloud
platform [4]. Thus, systems must protect sensitive data from unauthorized access
over networks and physical attacks. In addition to storing encryption keys [9], TEE
is capable of isolating private data, such as contacts, messages, photos, or sensitive
data, such as credentials, passwords, or medical information. In the event of a loss,
theft, or malware infection, data is not exposed [10].
98 M. Sommerhalder
TEEs are used to protect cryptocurrency wallets. One example is the ARM
TrustZone-based Secure Blockchain Lightweight Wallet (SBLWT) [11]. In SBLWT,
the private key associated with the digital assets is isolated. By using this method,
retail investors can replace the common practice of backing up private keys on paper
or insecurely storing them in the cloud [12].
[Link] Demand
Currently, hardware tokens are used in many aspects of our lives, including one-
time tokens for multi-factor authentication and tokens for opening cars or buildings.
In the future, TEEs in our mobile phones may replace these, improving the user
experience and reducing the costs for service providers [1]. With the many possible
applications of TEEs in mobile phones, it can be inferred that demand for such
devices will increase. As of 2021, almost 15 billion mobile devices were operating
worldwide. The previous year, just over 14 billion mobile devices were operating
worldwide. By 2025, the number of mobile devices is expected to reach 18
billion. The demand for TEE systems is likely to increase as these devices become
increasingly available and related apps become increasingly popular on a global
scale [13].
[Link] Actors
There are many key players in the global TEE market, including IBM Corporation,
Intel Corporation, Fortanix, Inc., Alibaba Group Holdings, Microsoft Corporation,
Advanced Micro Devices, Inc., and Edgeless Systems GmbH. Securosys SA,
CYSEC SA, Legic Identsystems SA, and Fortinet Switzerland GmbH are the market
leaders in the Swiss market.
[Link] Research
The Secure & Trustworthy Systems Group at ETH Zurich has released an Open
Framework for Architecting Trusted Execution Environments as a reference for
creating large systems [14, 15]. On the other hand, Zurich University of Applied
Sciences (ZHAW) is focused on developing privacy-preserving applications of
TEE [16].
The Linux Foundation’s Confidential Computing Consortium is a community
dedicated to defining and accelerating the adoption of confidential computing [17].
TEE Committee members are members of GlobalPlatform [18]. The project aims to
define an open security architecture for consumers and connected devices using a
TEE and to enable the development and deployment of services by multiple service
18 Trusted Execution Environment 99
18.3.1 Maturity
As noted above, most mobile phones are equipped with TEE functionality [1].
Furthermore, TEE has achieved a high level of maturity due to the almost 15 billion
mobile phones in circulation [13].
• Lack of standards
The development of TEE has been siloed by a small number of companies,
which has led to the need for well-established standards. Unfortunately, this
resulted in proprietary designs (SGX, SEV, TrustZone) with interoperability
issues. However, a few research groups are committed to developing industry
standards (see research section above).
18.4 Conclusion
With TEE, sensitive data is protected in an isolated enclave, and other applications
are prevented from accessing the reserved memory enclave. Furthermore, since
TEEs are part of a standard chipset, this inexpensive technology can be leveraged
across many devices, resulting in increased security, especially in the mobile sector
and IoT products.
References
1. Jan-Erik Ekberg, Kari Kostiainen, and N. Asokan. The Untapped Potential of Trusted
Execution Environments on Mobile Devices. IEEE Security & Privacy, 12(4):29–37, July
2014.
2. Victor Costan and Srinivas Devadas. Intel SGX Explained. [Link]
2016. Published: Cryptology ePrint Archive, Paper 2016/086.
3. A. M. Parker. HSMs and Key Management: Effective Key Security. [Link]
com/news-events/blog/hsms-and-key-management-effective-key-security, August 2022.
4. Moritz Schneider, Ramya Jayaram Masti, Shweta Shinde, Srdjan Capkun, and Ronald Perez.
SoK: Hardware-supported Trusted Execution Environments. 2022. Publisher: arXiv Version
Number: 1.
5. ARM. ARM Security Technology Building a Secure System using TrustZone Technology.
[Link] April 2009.
6. Christian Priebe. Protecting applications using trusted execution environments. April 2020.
Publisher: Imperial College London.
7. Arseny Kurnikov. Trusted Execution Environments in Cloud Computing. Doctoral thesis,
School of Science, 2021. ISBN: 978-952-64-0619-0 (electronic), 978-952-64-0618-3 (printed)
ISSN: 1799-4942 (electronic), 1799-4934 (printed), 1799-4934 (ISSN-L) Series: Aalto Univer-
sity publication series DOCTORAL DISSERTATIONS; 171/2021.
8. Tim Geppert, Jan Anderegg, Leoncio Frei, Simon Moeller, Stefan Deml, David Sturzenegger,
and Nico Ebert. Overcoming Cloud Concerns with Trusted Execution Environments?
Exploring the Organizational Perception of a Novel Security Technology in Regulated Swiss
Companies. 2022.
9. Kalmer Keerup, Dan Bogdanov, Baldur Kubo, and Per Gunnar Auran. Privacy-Preserving
Analytics, Processing and Data Management. In Caj Södergård, Tomas Mildorf, Ephrem
Habyarimana, Arne J. Berre, Jose A. Fernandes, and Christian Zinke-Wehlmann, editors, Big
Data in Bioeconomy, pages 157–168. Springer International Publishing, Cham, 2021.
10. GlobalPlatform. The Trusted Execution Environment: Delivering Enhanced Security at a
Lower Cost to the Mobile Market. [Link]
GlobalPlatform_TEE_Whitepaper_2015.pdf, 2015.
18 Trusted Execution Environment 101
11. Weiqi Dai, Jun Deng, Qinyuan Wang, Changze Cui, Deqing Zou, and Hai Jin. SBLWT: A
Secure Blockchain Lightweight Wallet Based on Trustzone. IEEE Access, 6:40638–40648,
2018.
12. Karanjai Rabimba, Shi Weidong, Xu Lei, Chen Lin, Zhang Fengwei, and Gao Zhimin. Lessons
Learned from Blockchain Applications of Trusted Execution Environments and Implications
for Future Research. In Workshop on Hardware and Architectural Support for Security and
Privacy, pages 1–8, Virtual CT USA, October 2021. ACM.
13. S. O’Dea. Forecast number of mobile devices worldwide from 2020 to 2025 (in billions)*.
Technical report, Statista, September 2021.
14. ETH Zurich. Research. [Link] August 2022.
15. Dayeol Lee, David Kohlbrenner, Shweta Shinde, Krste Asanović, and Dawn Song. Keystone:
an open framework for architecting trusted execution environments. In Proceedings of the
Fifteenth European Conference on Computer Systems, pages 1–16, Heraklion Greece, April
2020. ACM.
16. ZHAW. Privacy-preserving confidential computing with trusted execution environments.
[Link]
August 2022.
17. The Linux Foundationő. What is the Confidential Computing Consortium? https://
[Link]/, August 2022.
18. GlobalPlatform, Inc. GlobalPlatform, Inc. [Link]
19. GlobalPlatform. Trusted Execution Environment (TEE) Committee. [Link]
org/technical-committees/trusted-execution-environment-tee-committee/.
20. Jo Van Bulck, Marina Minkin, Ofir Weisse, Daniel Genkin, Baris Kasikci, Frank Piessens,
Mark Silberstein, Thomas F. Wenisch, Yuval Yarom, and Raoul Strackx. Foreshadow:
Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution. In
27th USENIX Security Symposium (USENIX Security 18), pages 991–1008, Baltimore, MD,
August 2018. USENIX Association.
21. Paul Kocher, Jann Horn, Anders Fogh, and Daniel Genkin, Daniel Gruss, Werner Haas, Mike
Hamburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, Michael Schwarz, and Yuval
Yarom. Spectre Attacks: Exploiting Speculative Execution. In 40th IEEE Symposium on
Security and Privacy (S&P’19), 2019.
22. Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Anders Fogh,
Jann Horn, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, and Mike Hamburg.
Meltdown: Reading Kernel Memory from User Space. In 27th USENIX Security Symposium
(USENIX Security 18), 2018.
23. David Cerdeira, Nuno Santos, Pedro Fonseca, and Sandro Pinto. Sok: Understanding the
prevailing security vulnerabilities in trustzone-assisted tee systems. In 2020 IEEE Symposium
on Security and Privacy (SP), pages 1416–1432, 2020.
Open Access This chapter is licensed under the terms of the Creative Commons Attribution 4.0
International License ([Link] which permits use, sharing,
adaptation, distribution and reproduction in any medium or format, as long as you give appropriate
credit to the original author(s) and the source, provide a link to the Creative Commons license and
indicate if changes were made.
The images or other third party material in this chapter are included in the chapter’s Creative
Commons license, unless indicated otherwise in a credit line to the material. If material is not
included in the chapter’s Creative Commons license and your intended use is not permitted by
statutory regulation or exceeds the permitted use, you will need to obtain permission directly from
the copyright holder.
Chapter 19
Confidential Computing
Yacine Felk
19.1 Introduction
19.2 Analysis
In classical computing, data exists in three states: in transit, at rest, and in use.
Data traversing the network is “in transit,” data in storage is “at rest,” and data
being processed is “in use.” In a world where we are constantly storing, consuming,
and sharing sensitive data—from credit card data to medical records, from firewall
configurations to our geolocation data—protecting sensitive data in all of its states
is more critical than ever. While techniques to protect data in transit and at rest are
Y. Felk ()
CYSEC, Lausanne, Switzerland
e-mail: [Link]@[Link]
now commonly deployed, the third state - protecting data in use—is the new frontier
being addressed by the Confidential Computing Consortium [1].
19.2.1 Definition
19.2.2 Trends
life sciences, the public sector, and defense will drive over 75% of demand [2].
Awareness of the benefits of confidential computing and willingness to invest in
exploration is expected to double across crucial regulated industries through 2026.
One can wonder about the drivers for use cases in confidential computing.
Confidential computing encompasses different use cases across many critical
industries, to name a few:
• Cloud Key Management Services (KMS).
• Improve application security on the public cloud and prevent data compromise
from malicious actors.
• Scalable replacement for dedicated Hardware Security Modules (HSMs).
• Sharing sensitive data with third parties for analytics and other multi-party
computing scenarios.
• Smart Contracts and Blockchain.
• Secure data during AI/ML modeling.
• Secure the intellectual property and data generated or utilized in edge and IoT
devices from malicious elements.
In 2020, the Federal Council established Switzerland’s strategy for Public Cloud and
elaborated an analysis of its impacts on public and administrative data governance
and protection [3]. Interestingly, the conclusions emphasize the importance of
hyperscalers (such as GCP, AWS, Oracle, Alibaba, etc.) infrastructure exploitation
to guarantee reliable and resilient services. This can only be done with the
exploitation of confidential computing technologies, ensuring that the application
deployment environment is isolated from the infrastructure provider environment,
thus ensuring data confidentiality and integrity. When looking at confidential
computing consortium members, three players are Swiss-based:
• Swisscom: national telco operator providing the IT infrastructure.
• Decentriq: providing trusted collaboration application exploiting technologies
• CYSEC: providing a complete set of confidential computing software creating
secure private environments and enabling to turn of Public Cloud into Private
Clouds for any application or workload.
Competitors of the three Swiss companies mentioned above are insistent with their
state-owned organizations and delegations. To mention two actual examples:
• In March 2022, Fortanix announced the adoption of its Data Security Manager
(DSM) platform by federal agencies to safeguard sensitive data and mitigate
106 Y. Felk
19.4 Conclusion
References
Open Access This chapter is licensed under the terms of the Creative Commons Attribution 4.0
International License ([Link] which permits use, sharing,
adaptation, distribution and reproduction in any medium or format, as long as you give appropriate
credit to the original author(s) and the source, provide a link to the Creative Commons license and
indicate if changes were made.
The images or other third party material in this chapter are included in the chapter’s Creative
Commons license, unless indicated otherwise in a credit line to the material. If material is not
included in the chapter’s Creative Commons license and your intended use is not permitted by
statutory regulation or exceeds the permitted use, you will need to obtain permission directly from
the copyright holder.
Chapter 20
Hardware Acceleration
Dina Mahmoud
20.1 Introduction
With Moore’s law and Dennard’s scaling no longer fueling the improvement
in computing performance, new avenues for increasing performance are needed.
Hardware acceleration is one avenue where many researchers and industrial parties
work and invest. This is because accelerators can allow for high levels of parallelism
not supported by general-purpose central processing units. These high levels of
parallelism are particularly well-suited for many modern applications. Therefore,
research on and use of hardware acceleration is expected to continue soon. However,
various parties should consider various aspects when deciding whether to invest in
hardware acceleration by making their accelerators or buying them from a third
party. This factsheet presents an analysis of hardware acceleration and the trends
until 2025. It also discusses the aspects to consider and how specific considerations
are more important for some actors.
20.2 Analysis
With the slowdown of Moore’s law, system developers are examining potential
avenues for performance improvement of computing systems. As simply increasing
the frequency or the number of transistors on the chip is no longer feasible, IT
infrastructure operators have adopted hardware acceleration. Various platforms and
levels of hardware acceleration exist.
D. Mahmoud ()
EPFL, Lausanne, Switzerland
e-mail: [Link]@[Link]
20.2.1 Definition
20.2.2 Trends
There has been a steady growth in research on hardware acceleration (as shown in
Fig. 20.1) and in the adoption of specialized hardware. For instance, specialized
accelerators like the Apple Neural Engine are making their way into consumer
Fig. 20.1 Describes arXiv and IEEE Xplore publications containing the keywords “Hardware
acceleration” OR “Hardware accelerator”
20 Hardware Acceleration 111
electronics [4]. ARM also offers security algorithm accelerators to support the
Armv8-A cryptography extensions [5]. Due to the inability of CPUs to meet the
increasing computing demand, the use of specialized hardware is expected to keep
increasing until 2025. The increased interest in using hardware accelerators has also
increased the research on their security in terms of attacks and countermeasures.
This section presents the pros and cons of buying or making secure hardware
accelerators (Table 20.1).
Depending on the type of hardware accelerator, many risks and opportunities are
associated with making or buying it. Making the hardware accelerator from scratch
gives higher security guarantees as there is no possibility for third-party-implanted
hardware Trojans. Furthermore, specific countermeasures can be implemented to
protect against various exploits, such as redundancy, masking, and hiding. However,
there is significant engineering effort in building a correct, highly performant,
secure hardware accelerator. If not correctly designed and built, bugs can result
in misbehavior, reducing the system’s performance or reliability. Furthermore, the
interoperability of hardware accelerators with other components in the system is
a critical aspect to consider. Buying accelerators usually guarantees that they will
have standard interfaces, but it is possible to design a specialized core with standard
interfaces.
For specialized military applications, where security is of the utmost concern,
and if accelerators are unlikely to already be in existence, making the accelerators
is better. Making the hardware eliminates the possibility of hardware Trojans, but
not of bugs in the design nor potential leakage of information. Coupled with proper
testing (for security and reliability), making the accelerator would guarantee secure
and reliable hardware. If the accelerator can be bought, design effort can be saved,
but guaranteeing the security would come at the cost of extensive security testing
to guarantee that there are no (intentional or unintentional) backdoors. Making
112 D. Mahmoud
accelerators that target widely used applications can have a significant economic
benefit for businesses. Such accelerators can be sold to many parties resulting
in high profits. For example, many hardware accelerator designs can be bought
and used on Amazon Web Services Marketplace [6]. However, this is only the
case for widely used applications. For more specialized accelerators, making them
may still prove helpful to the business if the accelerator significantly improves
their workloads’ performance. However, there may be no direct profit from selling
the accelerators. Buying pre-existing accelerators will allow for faster end-product
development if the business entity is not accustomed to building hardware. For the
remaining actors, buying the accelerators is a good solution. Again, some testing
would need to be done to guarantee a minimum level of security for the purchased
hardware.
20.4 Conclusion
References
1. Wen-mei Hwu and Sanjay Patel. Accelerator Architectures – A Ten-Year Retrospective. IEEE
Micro, 38(6):56–62, November 2018. Conference Name: IEEE Micro.
2. IRDSTM 2021: Executive Summary - IEEE IRDSTM . [Link]
executive-summary, August 2022.
3. Mohamed Gafsi, Mohamed Ali Hajjaji, Jihene Malek, and Abdellatif Mtibaa. FPGA hardware
acceleration of an improved chaos-based cryptosystem for real-time image encryption and
decryption. Journal of Ambient Intelligence and Humanized Computing, October 2021.
114 D. Mahmoud
Open Access This chapter is licensed under the terms of the Creative Commons Attribution 4.0
International License ([Link] which permits use, sharing,
adaptation, distribution and reproduction in any medium or format, as long as you give appropriate
credit to the original author(s) and the source, provide a link to the Creative Commons license and
indicate if changes were made.
The images or other third party material in this chapter are included in the chapter’s Creative
Commons license, unless indicated otherwise in a credit line to the material. If material is not
included in the chapter’s Creative Commons license and your intended use is not permitted by
statutory regulation or exceeds the permitted use, you will need to obtain permission directly from
the copyright holder.
Chapter 21
Secure Operating System
21.1 Introduction
The operating system (OS) is the backbone of every modern computer system,
managing the system’s resources and executing applications. Its security is critical
as a vulnerability in the OS or any applications running on it can expose the entire
system to risk. Different types of OS can be considered security-wise: (1) security-
focused OS and (2) security-evaluated OS. A security-focused OS aims to provide
a higher level of security by protecting the rest of the system from modules that an
attacker might exploit. In contrast, a security-evaluated OS is certified by an external
security-auditing organization. Hardening measures will vary as different use cases
have different requirements for a secure OS. In addition, different technologies are
used to complement the security provided by the OS. The trend for secure OSes
is, among others, the use in container-focused OSes and intelligent vehicles where
digital features are increasing, as well as in mobile phones.
21.2 Analysis
21.2.1 Definition
Every modern computer system runs a core piece of software executed on top of the
hardware. This software is the operating system (OS). It is responsible for allocating
the primary resources of the system (e.g., CPU, memory, communication ports) and
supervising the execution of all the applications within the system. Given the crucial
role of the OS, its security (or the lack of security) might have a significant impact
on the whole system: a vulnerability in the OS, or any applications running in it,
exposes a danger to all the other applications running in the system as well as to
all the data stored in it. This situation becomes highly problematic when the system
stores important (confidential) data or runs critical applications in high-risk facilities
(e.g., satellite communications, power plants, banking systems, aircraft systems, and
SCADA systems). Therefore, it is essential to improve OS security to ensure data
integrity, confidentiality and availability.
When discussing secure operating systems, we generally refer to (1) security-
focused OS and (2) security-evaluated OS. In any case, such operating systems are
designed to provide a higher level of security.
(1) Security-Focused OS
A security-focused operating system should guarantee the secure or trusted execu-
tion of components that might not be secure (programs). That is, the OS should
protect the rest of the system from modules that an attacker might exploit to get
control of the system, for instance, using sandboxing, compartmentalization or by
isolating cryptography functions and key management. QubeOS is one such OS,
which is especially valuable in industries where sensitive data has to be securely
segregated. Other examples include Tails OS and ReactOS.
In addition, to provide an extra level of security at different layers, OSes may
leverage other software and hardware technologies and mechanisms, described in
more detail in other chapters, such as Secure Boot, Trusted Platform Modules
(TPM), Hardware Security Modules (HSM), disk encryption, network protection
and other security-related features such as access control lists (ACLs), event
auditing.
One example of such hardware-based technology is HSM (Chap. 16). An HSM
can improve the security of an operating system by providing secure storage for
cryptographic keys and other sensitive data, such as passwords and certificates. This
makes it much more difficult for attackers to access the keys and other sensitive data,
even if they have successfully compromised the operating system or other software
on the computer. In addition, an HSM can also perform cryptographic operations,
such as encryption, decryption, and signing. By offloading these operations to the
HSM, the operating system can reduce its exposure to security threats, as the keys
and sensitive data are not accessible to the operating system or other software.
Similarly to an HSM, a Trusted Execution Environment, or TEE (Chap. 18) is
a secure area of a computing device, typically implemented on the chip itself, that
provides a secure environment for executing sensitive operations. The TEE is also
used to provide secure storage for cryptographic keys and other sensitive data, such
as passwords and certificates, which would protect such assets in a scenario where
the OS is compromised. For example, iOS uses a dedicated, isolated and hardware-
backed subsystem called secure enclave to isolate important cryptographic tasks.
And on Android smartphones, it depends on the manufacturer of the smartphone
21 Secure Operating System 117
whether and which type of TEE is present (e.g., Google Pixel smartphones contain
the Titan M chip for this purpose).
An example of a software-based solution that improves the security of an
operating system is SELinux [1]: a security feature built into the Linux operating
system that provides enhanced security through the use of mandatory access control
(MAC) policies. SELinux defines access control policies that restrict processes
and users’ actions on files, processes, and network resources. The policies are
implemented in software and are enforced by the Linux kernel
(2) Security-Evaluated OS
A security-evaluated OS is an OS that has achieved certification from an external
security-auditing organization. However, they still need to implement more security
mechanisms to make certain system areas more secure (e.g., cryptographic modules,
fine-grained access control) according to the criteria. Some of the most popular
evaluation criteria are Common Criteria [2], FIPS 140-2 [3], and ITSEC [4].
Examples of such OSs are SUSE Linux or some Red Hat Linux Enterprise versions,
Windows 10 Enterprise, etc.
Even though a baseline exists for achieving a minimum level of security, the
ultimate set of requirements to make a secure OS depends on the specific use
case. For instance, a mobile OS has different requirements than a container-focused
OS. Therefore, different measures can be taken to harden the underneath operating
system for each specific use case.
21.2.2 Trends
The use of secure operating systems is beneficial not only for high-risk systems but
also for individuals who want to protect their assets.
In more critical environments, such as governments and military systems that
typically have higher security restrictions, security-evaluated OSes are a convenient
option used in other countries, ensuring those systems fulfill a set of security
requirements. In addition, these OSes ensure a minimum level of trustworthiness
and security by limiting access to specific resources and isolating components.
For Switzerland, a movement toward more secure operating systems is required
to improve the security of sectors such as the banking and the military sectors.
Individuals and businesses are also the targets of cyber attackers. While individ-
uals often opt for functionality over security, it is crucial to raise the importance of
using security-focused OSes with extra security features to reduce the attack surface
and protect their assets.
even more resources. For instance, the vulnerability management system is typically
the most critical and time-consuming part of an OS conception. In addition, one of
the most significant shortcomings of OSes built from scratch is the limited support
for existing software, which could limit the functionalities of a given system.
On the other hand, given the availability of existing solutions buying appears to
be a preferable option, especially regarding the maturity of the existing solutions
compared to an OS developed from zero and given the complexity of such a task.
When building an OS from scratch, many bugs might be introduced, and the time to
reach a certain level of stability and maturity might require several years. Operating
systems in the market have been developed for decades, and security has been
considered a significant concern to all of them. In addition, one could implement
additional security features on top of an existing OS to fill the needs (e.g., some
specific cryptographic functions or authentication mechanisms) (Table 21.1).
21.4 Conclusion
Although the use of secure operating systems is not a definitive solution to protect
against all the dangers of current cyberspace, it is clear that it can reduce the
impact of individual vulnerable applications or modules being exploited on the
whole system. Moreover, improving the security of the operating system is only
one measure that can be adopted to reduce the attack surface: the combination
of several other technologies, such as the ones discussed in other chapters, might
120 L. Romá and B. Tellenbach
increase the protection against cyber attacks and limit the ability of an attacker
to exploit our systems. In addition, the human factor is still a significant factor
concerning the overall security of a system. A secure OS will reduce the attack
surface. Nevertheless, training teams of users is essential for security.
References
1. Stephen Smalley Walsh and Greg. Selinux: Nsa’s open source security enhanced linux, 2003.
2. Common Criteria: New CC Portal. [Link] August 2022.
3. National Institute of Standards and Technology. Security Requirements for Cryptographic
Modules. Technical Report Federal Information Processing Standard (FIPS) 140-2, U.S.
Department of Commerce, December 2002.
4. C. Jahl. The information technology security evaluation criteria. pages 306 – 312. IEEE
Computer Society, January 1991.
5. Murugiah Souppaya, John Morello, and Karen Scarfone. Application Container Security Guide.
Technical Report NIST Special Publication (SP) 800-190, National Institute of Standards and
Technology, September 2017.
6. Flatcar Container Linux. [Link] August 2022. Flatcar.
7. Bottlerocket OS. [Link] August 2022. original-date:
2019-04-03T[Link]Z.
8. ARCA | Confidential Computing | Container Workload. [Link]
9. What is automotive grade linux? [Link] August 2022. Automotive
Grade Linux.
Open Access This chapter is licensed under the terms of the Creative Commons Attribution 4.0
International License ([Link] which permits use, sharing,
adaptation, distribution and reproduction in any medium or format, as long as you give appropriate
credit to the original author(s) and the source, provide a link to the Creative Commons license and
indicate if changes were made.
The images or other third party material in this chapter are included in the chapter’s Creative
Commons license, unless indicated otherwise in a credit line to the material. If material is not
included in the chapter’s Creative Commons license and your intended use is not permitted by
statutory regulation or exceeds the permitted use, you will need to obtain permission directly from
the copyright holder.
Chapter 22
Biometrics
22.1 Introduction
This chapter provides an overview of biometrics’s current state and future trends, a
technology that measures physiological characteristics for individual identification.
The technology is based on three types of biometrics: biological, morphological,
and behavioral. The data collected from a biometric sample is stored on a storage
medium and is compared with a database during authentication. The biometrics
market is growing globally and is expected to reach $68.6 billion by 2025. Future
trends in biometrics include increased usage in the sharing economy and unstaffed
shops, technical advancements in real-time biometric authentication and increased
privacy concerns.
22.2 Analysis
Recent years have seen a surge in the use of biometric authentication methods.
Technological progress, especially in the Internet of Things (IoT) and Artificial
Intelligence (AI), makes it possible to measure biometrics quickly within a reason-
able amount of time and with high-quality results. As a result, it is possible to solve
several challenges in existing security concepts by using biometrics. However, their
use also raises ethical and regulatory concerns.
22.2.1 Definition
22.2.2 Trends
The Swiss private sector already uses biometric identification and authentication
extensively (e.g., for school canteen access, attendance, and access to IT systems).
However, aligning these use cases with data protection laws takes time and effort.
According to the Swiss Federal Data Protection and Information Commissioner
(FDPIC), biometric systems should be used with caution, and many recommen-
dations are provided on how to use them effectively [20].
Using biometric fingerprints has been a part of Swiss law enforcement for over a
century [21]. In recent years, more advanced biometric methods have been consid-
ered (especially facial recognition). There is a legal basis for their use in criminal
investigations, but some legal experts argue that they are insufficient [22, 23]. In
particular, facial recognition is opposed by several groups due to privacy concerns,
22 Biometrics 125
violations of human rights, and fears of mass surveillance [24–26]. While Swiss
law enforcement agencies are aware of the risks associated with facial recognition
technology, they closely monitor the development of frameworks for the responsible
use of this technology. Although some high-level frameworks exist, they need to
include concrete recommendations for implementation [27].
Biometric technology is a subject of active research in Switzerland. For example,
the Swiss Center for Biometrics Research and Testing at IDIAP, [Link]
[Link], or the Center for Security Studies at ETH Zurich, https://
[Link]. In addition to conducting commercial research on identity and data
governance, IBM Research Zurich researches biometrics. Also, many companies
sell biometric products and solutions, such as Touchless Biometric Systems AG
(Pfäffikon SZ), Tech5 (Geneva, GE), as well as research spinoffs, such as PXL
Vision (Zürich, ZH), and BWO Systems (Schenkon, LU).
A biometric system is vulnerable to various attacks, from faking input (for example,
copying fingerprints) to attacking the technology itself. As a result, designing and
implementing secure biometric authentication methods requires highly specialized
technical expertise and experience. According to the British National Cyber Security
Centre, buyers should ask vendors to conduct a detailed security analysis of their
product [28].
A fully integrated solution offers significant advantages as it aligns biometric
hardware, key generation, validation, and storage with the cryptographic provider,
providing a coherent control environment. A well-established example is IBM’s
Trusted Platform Module and Fingerprint Reader ecosystem [29].
In recent years, there has been a push for the creation of open-source solu-
tions [30]. While their performance may be comparable to commercial solutions,
they usually need a more in-depth security analysis.
Organizations must choose both hardware and software when sourcing biometric
technology. For fingerprinting, for instance, the choice of hardware is influenced by
factors such as the company’s industry, the age range of users, and the climate.
In addition, the choice of hardware and software can impact the computational
workload of the biometric system [31].
• Weapons with fingerprint lock: Weapons with fingerprint lock. A signature gun
(smart gun) is a firearm that an authorized individual can only fire. A security
function such as this can prevent third parties from misusing the weapon [33].
22.4 Conclusion
The trend in biometrics is toward faster, more secure, and more convenient solutions.
As a result, there is an increasing market share of integrated systems, which
integrate hardware, key generation, validation, and storage, as well as cryptographic
providers. As biometrics become more prevalent and their integration with AI
systems increases, ethical and regulatory questions become more pressing.
References
13. Yunji Liang, Sagar Samtani, Bin Guo, and Zhiwen Yu. Behavioral Biometrics for Continuous
Authentication in the Internet-of-Things Era: An Artificial Intelligence Perspective. IEEE
Internet of Things Journal, 7(9):9128–9143, September 2020.
14. Silvio Barra, Aniello Castiglione, Maria De Marsico, Michele Nappi, and Kim-Kwang Ray-
mond Choo. Cloud-Based Biometrics (Biometrics as a Service) for Smart Cities, Nations, and
Beyond. IEEE Cloud Computing, 5(5):92–100, September 2018.
15. Inc. Aware. The Rise of Biometrics in the Cloud. [Link]
the-cloud/#, July 2021.
16. Riseul Ryu, Soonja Yeom, Soo-Hyung Kim, and David Herbert. Continuous Multimodal
Biometric Authentication Schemes: A Systematic Review. IEEE Access, 9:34541–34557,
2021.
17. Andy Greenberg. OPM now admits 5.6m Feds’ Fingerprints were stolen by hackers. https://
[Link]/2015/09/opm-now-admits-5-6m-feds-fingerprints-stolen-hackers/.
18. Christian Berghoff, Matthias Neu, and Arndt von Twickel. The Interplay of AI and Biometrics:
Challenges and Opportunities. 54(9):80–85, September 2021. Computer.
19. European Union. Proposal for a REGULATION OF THE EUROPEAN PARLIAMENT
AND OF THE COUNCIL LAYING DOWN HARMONISED RULES ON ARTIFI-
CIAL INTELLIGENCE (ARTIFICIAL INTELLIGENCE ACT) AND AMENDING CER-
TAIN UNION LEGISLATIVE ACTS. [Link]
CELEX%3A52021PC0206, April 2021.
20. Federal Data Protection and Information Commissioner (FDPIC). Some data protection
considerations with regard to the use of biometric data in the private sector. Annual Report
12 - 2004/2005, July 2005.
21. Bundesamt für Polizei fedpol. Der FingerabDruck.
22. Denis De la Reusille. Police use of prohibited Software. [Link]
ratsbetrieb/suche-curia-vista/geschaeft?AffairId=20223113, March 2022.
23. Franziska Ramser. Verbrecherjagd mit umstrittenen Mitteln. January 2022. SRF News Clip.
24. Katharina Jochum. Stadt Zürich will biometrische Überwachung verbieten. INSIDE IT, June
2022.
25. Regulierung der Gesichtserkennung im öffentlichen Raum. [Link]
ratsbetrieb/suche-curia-vista/geschaeft?AffairId=20213580,author=Glttli,Balthasar,.
26. Angela Müller. Gesichtserkennung im öffentlichen Raum gehört verboten. July 2022. Neue
Zürcher Zeitung.
27. WEF. A Policy Framework for Responsible Limits on Facial Recognition Use Case: Law
Enforcement Investigations. October 2021.
28. National Cyber Security Centre. Biometric recognition and authentication systems. https://
[Link]/collection/biometrics/how-biometrics-are-attacked.
29. Reiner Sailer, Leendert Van Doorn, and James P Ward. IBM Research Report RC23368. 2004.
30. S. Marcel, A. Anjo, and R. Lessmann. OPEN SOURCE SOFTWARE. [Link]
information/[Link]?ts=1651622400052.
31. Pawel Drozdowski, Christian Rathgeb, and Christoph Busch. Computational workload in
biometric identification systems: an overview. IET Biometrics, 8(6):351–368, November 2019.
32. National Institute of Standards and Technology. FY07: Biometrics—Identifying Friend
or Foe. [Link]
identifying-friend-or-foe, January 2017.
33. Woodie Kessel. Smart Guns Don’t Kill People. In Marie Crandall, Stephanie Bonne, Jennifer
Bronson, and Woodie Kessel, editors, Why We Are Losing the War on Gun Violence in the
United States, pages 249–254. Springer International Publishing, Cham, 2021.
128 S. Ding et al.
Open Access This chapter is licensed under the terms of the Creative Commons Attribution 4.0
International License ([Link] which permits use, sharing,
adaptation, distribution and reproduction in any medium or format, as long as you give appropriate
credit to the original author(s) and the source, provide a link to the Creative Commons license and
indicate if changes were made.
The images or other third party material in this chapter are included in the chapter’s Creative
Commons license, unless indicated otherwise in a credit line to the material. If material is not
included in the chapter’s Creative Commons license and your intended use is not permitted by
statutory regulation or exceeds the permitted use, you will need to obtain permission directly from
the copyright holder.
Chapter 23
Electronic Voting
Louis-Henri Merino
23.1 Introduction
Remote electronic voting, where eligible voters can cast votes from anywhere in the
world on their device, promises to increase voter turnout, improve accessibility, and
reduce costs. However, building a secure online voting system is complex, involving
four essential requirements: integrity, privacy, coercion-resistance, and availability.
Moreover, the successful deployment of a secure online voting system would require
close collaboration among the public and private sectors and academia. The military
and intelligence agencies could play an essential role in supporting the e-voting
operator against cyberattacks meant to deteriorate public trust in the voting outcome.
23.2 Analysis
23.2.1 Definition
Online voting promises to increase voter turnout, improve accessibility (e.g., support
for multiple languages) and reduce cost for voters [1, 2]. For organizations, online
voting can help increase productivity and decrease costs [2].
However, the outcome of an election event will usually have real-world impact,
making security paramount [3, 4]. At the moment, the approaches to securing an
election are still being debated, evolving since at least 1987 [3, 5–8].
23.2.2 Trends
Market and Application The most apparent market for remote e-voting systems
is government electoral agencies. However, many other actors could benefit from
remote e-voting, some of which include a government’s judicial branch (e.g., jury
voting), a government’s legislative branch (e.g., voting on legislative proposals),
corporations (e.g., boardroom voting), and academic institutions (e.g., student
representative elections). Each use case may have it is own subtle specialized
requirements; for example, for boardroom voting and jury voting, where the number
of voters is small, it is preferable to release the outcome without releasing the
number of votes per option since it could deter voters from voting their actual
preference [12].
Actors The design of an e-voting system for a high-stakes use case will likely
require the involvement (and close collaboration) of actors from all sectors:
academia for research, industry for technology transfer and support, and government
23 Electronic Voting 131
for regulations. This collaboration is observed with the development of the Swiss
Post E-Voting system with the intent for use in Swiss elections and referendums [10,
11, 13]. Academics have proposed various electronic voting schemes, found critical
vulnerabilities in the Swiss Post E-Voting System, and given feedback on proposed
Swiss regulations.
While online voting does not have direct military usage, the military could have
an impact on online voting in the public sector. A successful cyber-attack on the
nation’s e-voting platform may cause significant consequences to society (e.g.,
reducing public trust in the outcome) [14, 15]. A denial of service attack, for
example, could cause votes to be rejected, alternatively, cause a delay in the results.
In such circumstances, the support of the military may help e-voting operators
remain available and secure despite the most sophisticated attacks.
23.4 Conclusion
References
1. European Commission. Directorate General for Justice and Consumers. Study on the benefits
and drawbacks of remote voting: final report. Publications Office, LU, 2018.
2. David Chaum, Richard T. Carback III, Jeremy Clark, Chao Liu, Mahdi Nejadgholi, Bart
Preneel, Alan T. Sherman, Mario Yaksetig, and Filip Zagorski. VoteXX: A Remote Voting
System that is Coercion Resistant. October 2020. Accepted: 2020-11-30T[Link]Z.
3. Josh Benaloh. Verifiable Secret-Ballot Elections. September 1987.
4. Alex Moyher. The Challenges of Online Voting. Diversity: the art of thinking independently,
together, 2015.
5. Josh Benaloh and Dwight Tuinstra. Receipt-free secret-ballot elections (extended abstract). In
Proceedings of the twenty-sixth annual ACM symposium on Theory of Computing, STOC ’94,
pages 544–553, New York, NY, USA, May 1994. Association for Computing Machinery.
6. Ari Juels, Dario Catalano, and Markus Jakobsson. Coercion-Resistant Electronic Elections.
In David Chaum, Markus Jakobsson, Ronald L. Rivest, Peter Y. A. Ryan, Josh Benaloh,
Miroslaw Kutylowski, and Ben Adida, editors, Towards Trustworthy Elections: New Directions
in Electronic Voting, Lecture Notes in Computer Science, pages 37–63. Springer, Berlin,
Heidelberg, 2010.
7. Ralf Küsters, Tomasz Truderung, and Andreas Vogt. A Game-Based Definition of Coercion-
Resistance and Its Applications. IACR Cryptology ePrint Archive, 2009:582, January 2009.
8. Ralf Küsters, Tomasz Truderung, and Andreas Vogt. Verifiability, Privacy, and Coercion-
Resistance: New Insights from a Case Study. In 2011 IEEE Symposium on Security and
Privacy, pages 538–553, May 2011. ISSN: 2375-1207.
9. Huangyi Ge, Sze Yiu Chau, Victor E Gonsalves, Huian Li, Tianhao Wang, Xukai Zou, and
Ninghui Li. Koinonia: verifiable e-voting with long-term privacy. In Proceedings of the 35th
Annual Computer Security Applications Conference, ACSAC ’19, pages 270–285, New York,
NY, USA, December 2019. Association for Computing Machinery.
10. SR 161.116 - Federal Chancellery Ordinance of 13 December 2013 on Electronic Voting
(VEleS). [Link] August 2022.
11. Die Schweizerische Post. E-voting. [Link]
August 2022.
12. Johannes Mueller. Ordinos: A Verifiable Tally-Hiding E-Voting System. 2020.
13. Véronique Cortier, Alexandre Debant, and Pierrick Gaudry. A privacy attack on the Swiss Post
e-voting system. page 4.
23 Electronic Voting 133
14. Trust in public institutions: Trends and implications for economic security | DISD. https://
[Link]/development/desa/dspd/2021/07/trust-public-institutions/, August 2022.
15. Fabio Rugge. “MIND HACKING”: INFORMATION WARFARE IN THE CYBER AGE.
page 8.
Open Access This chapter is licensed under the terms of the Creative Commons Attribution 4.0
International License ([Link] which permits use, sharing,
adaptation, distribution and reproduction in any medium or format, as long as you give appropriate
credit to the original author(s) and the source, provide a link to the Creative Commons license and
indicate if changes were made.
The images or other third party material in this chapter are included in the chapter’s Creative
Commons license, unless indicated otherwise in a credit line to the material. If material is not
included in the chapter’s Creative Commons license and your intended use is not permitted by
statutory regulation or exceeds the permitted use, you will need to obtain permission directly from
the copyright holder.
Chapter 24
Data in Transit Security
Roland Meier
24.1 Introduction
24.2 Analysis
24.2.1 Definition
Data in transit (i.e., network traffic) is susceptible to eavesdropping and can leak
information through the following channels:
• Payload: The packet payload contains the message transmitted (e.g., parts of a
website or email).
R. Meier ()
Cyber-Defence Campus, Thun, Switzerland
e-mail: [Link]@[Link]
© The Author(s) 2023 135
V. Mulder et al. (eds.), Trends in Data Protection and Encryption Technologies,
[Link]
136 R. Meier
• Headers: The packet headers contain the information required to deliver the
packet to the correct destination and parse it correctly by the receiving applica-
tion. Packet headers, therefore, contain information about the sender and receiver
of a packet (e.g., their IP and MAC addresses) and information about the user
application and protocol.
• Metadata: Metadata in network traffic is normally considered as the protocol
information including the packet headers They are not contained in the packet
directly but can be observed when recording the packet (e.g., the packet size or
the time when it was received). If a packet is received at multiple locations, this
reveals additional information (e.g., the path a packet takes through the network).
For an eavesdropper, extracting information from unprotected headers and
payloads is easy. Nevertheless, even if headers and payloads are protected (i.e.,
encrypted), several so-called traffic-analysis attacks can infer sensitive information
based on traffic metadata.
For each type of information channels, there exist technologies to prevent the
leakage:
Protecting Payload and Headers The usual approach to protecting the payload
and packet headers is to encrypt them. To do so, various encrypted protocols exist
that encrypt data on various layers (not only the payload but also some headers).
Widely used protocols include MACsec, IPsec, and TLS, which are explained in
more detail below.
• MACsec (Medium Access Control security) [1]: Operates on the link layer and
encrypts packets between (layer 2) switches. MACsec encrypts the entire packet,
including all headers except the source and destination addresses in the link
layer (i.e., the source and destination MAC address). MACsec is typically used
to protect individual links in a local area network (LAN) or wide area network
(WAN) against eavesdropping.
• IPsec (Internet Protocol Security) [2]: Operates on the network layer and can
be used in two modes: transport mode and tunnel mode. In transport mode,
IPsec encrypts the payload of the IP layer (i.e., the headers of the transport-layer
protocol and packet payloads). In tunnel mode, IPsec creates a tunnel from the
sender to a destination and encrypts the IP header and its payload. To do so, it
encapsulates the original IP packet within a new IP packet whose destination
address is the tunnel’s endpoint, thereby revealing the IP addresses of both
ends of the tunnel. IPsec is typically used to create tunnels between locations
connected over an untrusted network (e.g., the Internet). For more information
about tunnels and so-called Virtual Private Networks (VPNs), see Chap. 26.
• TLS (Transport Layer Security) [3]: Operates on the transport layer and encrypts
only its payload. Therefore, it does not hide other packet headers such as the
source and destination IP addresses. TLS is used for many applications, but its
most well-known use case is web browsing over HTTPS.
24 Data in Transit Security 137
24.2.2 Trends
The percentage of encrypted network traffic has risen continuously in the past years,
and we expect this trend to continue in the following years.
A major driving factor for this is that the “Let’s Encrypt” certification author-
ity [8] allows everyone to obtain TLS certificates for free. This led to a rapid increase
in the websites reachable over encrypted connections, i.e., over HTTPS. In addition,
website operators are further incentivized to deploy TLS because it leads to a better
ranking in the Google search results [9].
In addition, QUIC, a new transport-layer protocol, was standardized in 2021 [10].
In contrast to TCP and UDP, QUIC is encrypted by default and provides better
138 R. Meier
performance and reliability than TCP and UDP. Google initially introduced it and
supports it in its products, but other platforms and services now support it as well.
TLS and QUIC are increasingly used to encrypt traffic that was traditionally not
encrypted. For example, DNS queries are now sent over encrypted channels.
Buy: The widely available secure transport protocols and their implementations in
popular libraries should be used for encryption.
Make: For sensitive environments, benefits outweigh metadata protection
schemes’ potential costs (e.g., additional overhead). Unfortunately, there is
no widespread solution here, and it would be necessary to develop a new
solution for Switzerland’s use case (e.g., based on research projects from Swiss
universities [5, 6, 11, 12]).
24.4 Conclusion
References
Open Access This chapter is licensed under the terms of the Creative Commons Attribution 4.0
International License ([Link] which permits use, sharing,
adaptation, distribution and reproduction in any medium or format, as long as you give appropriate
credit to the original author(s) and the source, provide a link to the Creative Commons license and
indicate if changes were made.
The images or other third party material in this chapter are included in the chapter’s Creative
Commons license, unless indicated otherwise in a credit line to the material. If material is not
included in the chapter’s Creative Commons license and your intended use is not permitted by
statutory regulation or exceeds the permitted use, you will need to obtain permission directly from
the copyright holder.
Chapter 25
Blockchain
25.1 Introduction
25.2 Analysis
25.2.1 Definition
more than half of the entities participating in the distributed network are honest.
Parts of the difficulty and confusion when talking about “Blockchains” stems from
the fact that there is no precise definition of a “Blockchain”. Some consider the
whole ecosystem, including all its components, the consensus mechanism, and the
execution environment for a scripting language running on the participating nodes
as “the Blockchain”. In contrast, others restrict the focus on the underlying data
structure that consists of blocks containing data that build a chain.
A broader term for blockchains is Digital Ledger Technologies (DLT). This
includes systems that do not rely on linked blocks but offer decentralized data
management. The difference between blockchains, DLTs, and databases can be
summarized as follows:
• Database: allows to store, retrieve, and update data according to a set of rules
(access control); the trust relies on the administrators
• DLT: like a database, but some of the system components are decentralized; the
trust relies on the majority of participants
• Blockchain: a special type of DLT where all of the system components are
decentralized
Thousands of blockchain systems have already been implemented. Here are the
main concepts differentiating their various kinds:
• Data structure—how the data is stored: this is either a single chain of blocks or
blocks that link to more than one other block to create a Directed Acyclic Graph
(DAG)
• Data content—what is stored: only asset transactions, or scripting possibilities
(smart contracts)
• Data visibility—who can view the data: global blockchains offer full access to the
data (public), while some local blockchains have a restriction at the network level
(private). Some newer global systems protect the data using a zero-knowledge
proof system [2, 3].
• Node onboarding—how new nodes are accepted in the system: Bitcoin uses
Proof of work (PoW), where new nodes spend energy to join. Newer blockchains
use Proof of Stake (PoS), where new nodes need to stake money to join. More
centralized DLTs use Proof of Authority (PoA) and have a centrally managed list
of nodes. One can add that PoW systems are also called Permissionless systems,
while PoA systems are called Permissioned systems. PoS is in between those
two.
• Consensus algorithm—how conflicting data gets stored: the simplest system is to
accept only a linear list of non-conflicting blocks, but this can take time. PBFT
systems vote on every new block and do not have to wait. Other systems exist
like Avalanche [4] or Narwhal/Tusk [5]
• Wallets—storage of user data: most DLTs use an access control system based on
private keys. As there is no central service to restore access in case of loss of this
private key, the wallets are of utmost importance in DLT systems
25 Blockchain 143
• 2nd layer—services on top of the DLT: as DLTs in 2022 are too slow for
worldwide usage. Some offer external protocols which use the underlying DLT
to synchronize in regular intervals
25.2.2 Trends
Market It is still very much debated where the money in DLT investment comes
from and how it is used. While some people promote blockchains as the ultimate
tool for a libertarian lifestyle [1], others think that blockchains only serve as an
opaque technical background for investment fraud. For example, Alvin [6] thinks
that Bitcoin is a unique asset in history and can best be compared with a zero-
coupon perpetual bond or an indefinite call option. This is an ironic way to say that
investing in blockchains is the same as high-risk speculation.
Applications In 2022, most of the visible applications of blockchains are in the
financial sector under the name of cryptocurrencies [7]. This includes invest-
ment/speculation in the form of assets like Non-Fungible Tokens (NFTs), Decen-
tralized Finance (DeFi), e.g. Uniswap. However, contrary to its name, only a few
cryptocurrencies are currently used for digital payment. If blockchains get regulated,
they might also be used for day-to-day payment services, where they will have to
compete with VISA, PayPal, Stripe, and others.
DeFi currently allows the exchange of tokens from one blockchain into tokens
from another. In the future, this will also include trading fiat money, lending, and
receivables management.
NFTs bind a public key to a digital token and can be used by artists to sell their
art. Depending on the license, the current holder of the digital token has some rights
toward the piece of art [8]. The opinion on NFTs is also very split between Ponzi
Schemes and a fairer way for artists to make money. They will undoubtedly continue
to be used for brand-aware marketing, but real-world use cases are difficult to find.
Finally, Decentralized Autonomous Organizations (DAOs) want to allow more
direct investments into innovative systems in the blockchain space. However,
most attempts have been crippled by wrong programming and subsequent loss of
investments. Another fact that makes DAOs difficult is missing legislation, which
makes it difficult to trust the investment.
A growing list of applications is produced around blockchains’ tracking and
logging capabilities: due to their underlying data structure, all history is available
forever. It is also easy to onboard new actors if the wallets are implemented in a user-
friendly way. This makes supply chain management easier for all involved partners
while removing the need for a central actor [9]. This supply chain management can
be helpful for civil purposes like determining where all ingredients for a medical
drug come from. However, also the military must know where the different parts
come from and whether they are trustworthy. An example is the detached labels,
where the parts are identified by a QRcode, which refers to the data on a blockchain.
144 L. Gasser and J.-P. Hubaux
While in the beginning, cryptocurrencies have been hailed as the new banks
and the downfall of the traditional financial system has been proclaimed, current
expectations are much lower. So far, cryptocurrencies have been used as an
25 Blockchain 145
This section presents the pros and cons of buying or making a blockchain. For
blockchains, “Instead of evaluating between ‘Make’ or ‘Buy’ like for the other
entries, we chose to differentiate between using a ‘private’ or ‘public’ blockchain.
This is because blockchains are a very complex technology, and nobody should
‘Make’ their own, new blockchain (Table 25.1).
25.4 Conclusion
One of the most exciting problems for the military to solve with blockchains is
the supply chain management problem. For this task, a public blockchain spanning
several armies plus their suppliers might reduce costs, increase security, and reduce
delivery times [11]. In civil society, blockchains and cryptocurrencies will remain
an investment/speculation vehicle for quite some time. However, there are no real
advantages to using a blockchain for most applications proposed. Several parts of
the economy, primarily banks and some parts of retail, can take advantage of current
and future blockchains to reduce their business running costs. Nevertheless, the
complexity of blockchain systems still has to be tamed before it makes economic
sense [12].
References
8. Nft NFT Blockchain Intellectual Property: Nfts and intellectual property rights. [Link]
[Link]/de-de/wissen/publications/1a1abb9f/nfts-and-intellectual-property-
rights, October 2021. nortonrosefulbright.
9. TradeLens | Supply chain data and docs. [Link] August 2022.
10. Digitalisation of the financial sector: Blockchain/DLT. [Link]
finanzmarktpolitik/digitalisation-financial-sector/[Link], January 2022.
11. Blockchain for military logistics. [Link]
military_logistics.
12. Nils Braun-Dubler, Hans-Peter Gier, Bulatnikova Tetiana, Manuel Langhart, Manuela Merki,
and Florian Roth. The Technical Capabilities of Blockchain and its Economic Viability, 2020.
Open Access This chapter is licensed under the terms of the Creative Commons Attribution 4.0
International License ([Link] which permits use, sharing,
adaptation, distribution and reproduction in any medium or format, as long as you give appropriate
credit to the original author(s) and the source, provide a link to the Creative Commons license and
indicate if changes were made.
The images or other third party material in this chapter are included in the chapter’s Creative
Commons license, unless indicated otherwise in a credit line to the material. If material is not
included in the chapter’s Creative Commons license and your intended use is not permitted by
statutory regulation or exceeds the permitted use, you will need to obtain permission directly from
the copyright holder.
Chapter 26
Tunneling and VPN
Weyde Lin
26.1 Introduction
Tunneling is a technique used to transport data packets over a network. The original
data packets, with a protocol not supported by the host network, are encapsulated
within another packet and then transported through the network. This technique is
helpful for encrypted networks and can be used in virtual private networks (VPNs).
Tunneling can be either full, where all network traffic is routed through the tunnel,
or split, where only part of the network traffic is routed. The trend in tunneling is
shifting from VPN access to a zero trust model, where the focus is on protecting
data and ensuring privacy rather than remote access.
26.2 Analysis
26.2.1 Definition
To transport data through a network, the data is divided into packets. In tunneling,
packets from one network are sent via another network’s connections. The packets
are encapsulated within packets and then transported by the second network [1].
This means that data with a protocol not supported by a given network can be sent
over that network. In tunneling, the original packet is encapsulated inside another
packet (see Fig. 26.1).
There are two types of tunnels:
W. Lin ()
Eraneos Switzerland AG, Zurich, Switzerland
e-mail: [Link]@[Link]
Fig. 26.1 Each packet has a header and a payload. The header lists the packet’s destination and
protocol. Packet A is encapsulated by Packet B and becomes its payload
• In full tunneling all network traffic goes through the tunnel [2].
• In split tunneling, only part of the network traffic is routed through the tunnel.
This allows the user or device to simultaneously access resources in different
networks [3].
Tunneling is very useful in encrypted networks. To create an encrypted tunnel,
a network packet, including the header, is completely encrypted and encapsulated
as a payload inside another packet for transport across a network. The payload is
decrypted at the destination, and the original packet is restored.
While tunneling is often used in virtual private networks1 (VPNs), VPN and
tunneling are technically not the same, and there are VPNs without tunneling. E.g.,
the VPN implementation, IPsec supports transport modes where not the complete
packets are encrypted and encapsulated. Instead, the packet retains its original
packets header [5], and only the packet payload is encrypted.
26.2.2 Trends
The internet protocol version 6 (IPv6) is a replacement for IPv4 that, due to its
limited number of available IP address space, will be phased out. However, as there
1 “A virtual network built on top of existing networks that can provide a secure communications
are still IPv4-only networks that do not support IPv6, the tunneling protocol 6in4 [6]
allows sending IPv6 packets over an IPv4 network [7].
Another prominent use case of tunnels is VPNs. The global VPN market is
expected to grow from US$ 44bn in 2022 to US$ 77.1bn in 2026 [8]. However,
at the same time, there is also a shift from VPN access to a zero trust model (e.g.,
Zero Trust Network Access (ZTNA) and/or Zero Trust Architectures (ZTA)). For
example, Google [9] and the US Government [10] both announced shifts from VPN
solutions to a zero trust model (See Zero Trust factsheet), and a 2021 study found
that 72% of all companies were adopting or planning to adopt zero trust [11].
Most tunneling protocols are defined in Request for Comments (RFC) documents
(see also below in 2.2 Variations and Recommendation for examples) and then
implemented by network equipment or software vendors. For VPNs, the most com-
mon closed-source solutions used globally [13] are Cisco VPN, Cisco AnyConnect,
Juniper VPN, and Citrix Gateway. There are also two widespread open-source VPN
solutions:
• OpenVPN [14] is an open-source (GNU GPLv2) VPN system that uses the
OpenSSL library to encrypt the data as well as the control channels. It was first
released in 2001. The throughput over an OpenVPN tunnel is somewhat limited,
but the software runs on any operating system and platform and makes it widely
used.
• WireGuard [15] is an open source (GNU GPLv2) VPN implementation to be easy
to use and with improved performance compared to other VPN implementations
and a low attack surface.
152 W. Lin
There are many tunneling protocols in use today; a few are listed below:
• GRE Tunneling [16]: Generic Routing Encapsulation (GRE) is a protocol where
packets are encapsulated inside other packets. It can connect separate networks
and allows protocols on a network that does not support said protocols.
• IP-in-IP [17]: Here, IP packets are encapsulated inside other IP packets. There
is no encryption, and the encapsulated packets remain unmodified.
• SSH tunneling [18]: SSH is typically used for the terminal access of a remote
machine, but it can also be used to establish a secure tunnel between two
computers.
• Point-to-Point Tunneling Protocol (PPTP) [19]: PPTP is an obsolete VPN
Protocol that uses a GRE tunnel
• Secure Socket Tunneling Protocol (SSTP) [20]: SSTP is a replacement and
improvement of PPTP, which encrypts the transfer with SSL/TLS.
• Layer 2 Tunneling Protocol (L2TP) [21]: L2TP is a tunnel protocol mainly
used in VPNs. It provides a tunnel for Layer 2.2
• Virtual Extensible Local Area Network (VXLAN) [24]: VXLAN is a network
virtualization technique that allows Layer 2 connection over a Layer 3 3 network.
• IPv6 in IPv4 Tunnel (or IPv4 in IPv6 Tunnel): In 6in4, IPv6 packets are
encapsulated in IPv4 packets. This allows the transport of IPv6 packets over
an IPv4 network. Vice versa is true for the opposite (4in6: IPv4 over an IPv6
network [6]).
26.4 Conclusion
Tunneling is essential for the secure access of a remote resource as an integral part
of most VPN implementations. Without such encrypted tunnels, the traffic to this
remote resource would be unencrypted and potentially taped by a malicious third
party. In addition, tunneling allows connection networks (e.g., VXLAN) or enables
the use of communications protocol on unsupported networks (e.g., 6in4).
2 “Layer 2, also known as the Data Link Layer, is the second level in the seven-layer OSI [Open
Systems Interconnection, see [22] reference model for network protocol design” [23].
3 Layer 3 is the Network Layer and the third level in the seven-layer OSI reference model [25].
26 Tunneling and VPN 153
References
Open Access This chapter is licensed under the terms of the Creative Commons Attribution 4.0
International License ([Link] which permits use, sharing,
adaptation, distribution and reproduction in any medium or format, as long as you give appropriate
credit to the original author(s) and the source, provide a link to the Creative Commons license and
indicate if changes were made.
The images or other third party material in this chapter are included in the chapter’s Creative
Commons license, unless indicated otherwise in a credit line to the material. If material is not
included in the chapter’s Creative Commons license and your intended use is not permitted by
statutory regulation or exceeds the permitted use, you will need to obtain permission directly from
the copyright holder.
Part IV
Data Protection
Chapter 27
Differential Privacy
27.1 Introduction
27.2 Analysis
V. Mulder ()
Cyber-Defence Campus, Thun, Switzerland
e-mail: [Link]@[Link]
M. Humbert
University of Lausanne, Lausanne, Switzerland
e-mail: [Link]@[Link]
27.2.1 Definition
27.2.2 Trends
In the cases of counting, summation, or average queries over a large, single table
of data, DP is ready to be used effectively. However, some other settings still have
problems. For example, one key drawback of differential privacy is that it often
trades data accuracy for privacy. Typically, suppose the database size on which
statistics are computed is too small. In that case, the amount of noise that needs to be
added to the statistics is often too high to keep some statistical accuracy. Moreover,
the DP guarantees decrease proportionally to the number of statistical queries made
to the database. Similarly, implementations of queries on multiple tables, synthetic
data generation, and deep learning exist, but they may only sometimes be accurate
enough [4]. These drawbacks are due to the solid adversarial assumptions that are
key to providing formal privacy guarantees against an adversary.
27 Differential Privacy 159
Progress on tools for differential privacy has accelerated rapidly in the past
several years, and we look forward to the availability of accessible tools for these
tasks shortly. Indeed, companies like Apple or Google already use differential to
anonymize their customer data [5, 6]. This is completed by different open-source
libraries, like the one from Google and IBM [7, 8].
The academic field also works on challenges like ensuring correctness and
automatic proofs. Nevertheless, the solutions remain primarily theoretical. Finally,
open-source differential privacy systems have recently started focusing on usability.
The OpenDP [9] and diffprivlib [10] projects both provide notebook-based program-
ming interfaces that will be familiar to many data scientists, as well as extensive
documentation. Researchers are beginning to study the usability of systems like
these, which will likely lead to further improvements [11].
The federal act on data protection should come into effect in September 2023 [12].
Differential privacy could be a great tool to help the government and large
companies better comply with this new law. Big tech companies, like Apple,
Google, Uber, and Facebook, have used different applications of this technology
that could be a source of inspiration for Switzerland [13]. The primary example
remains the United States Census which takes place every ten year [14].
27.4 Conclusion
References
1. Cynthia Dwork. Differential Privacy. In Henk C. A. van Tilborg and Sushil Jajodia, editors,
Encyclopedia of Cryptography and Security, pages 338–340. Springer US, Boston, MA, 2011.
2. Wikipedia, Differential privacy. [Link]
privacy&oldid=1098798710, July 2022.
3. Cynthia Dwork, Frank McSherry, Kobbi Nissim, and Adam Smith. Calibrating Noise to
Sensitivity in Private Data Analysis. In Shai Halevi and Tal Rabin, editors, Theory of
Cryptography, Lecture Notes in Computer Science, pages 265–284, Berlin, Heidelberg, 2006.
Springer.
4. Implémenter la confidentialité différentielle avec TensorFlow Privacy | Responsible AI Toolkit.
5. How Google anonymizes data – Privacy & Terms – Google. [Link]
technologies/anonymization?hl=en, November 2022.
6. Apple. Apple Differential Privacy Technical Overview. [Link]
Differential_Privacy_Overview.pdf, November 2022.
7. Differential Privacy. [Link] November 2022. original-
date: 2019-09-04T[Link]Z.
8. Diffprivlib v0.6. [Link] November 2022.
original-date: 2019-06-18T[Link]Z.
9. OpenDP. ulr[Link] October 2022.
10. Naoise Holohan, Stefano Braghin, Pól Mac Aonghusa, and Killian Levacher. Diffprivlib: The
IBM Differential Privacy Library, July 2019. arXiv:1907.02444 [cs].
11. Joseph Near. Differential Privacy: Future Work & Open Challenges. NIST, January 2022. Last
Modified: 2022-01-24T12:00-05:00 Publisher: Joseph Near.
12. La nouvelle Loi sur la protection des données arrivera plus tard que prévu.
13. Alexandra Wood, Micah Altman, Aaron Bembenek, Mark Bun, Marco Gaboardi, James
Honaker, Kobbi Nissim, David O’Brien, Thomas Steinke, and Salil Vadhan. Differential
Privacy: A Primer for a Non-Technical Audience. SSRN Electronic Journal, 2018.
27 Differential Privacy 161
Open Access This chapter is licensed under the terms of the Creative Commons Attribution 4.0
International License ([Link] which permits use, sharing,
adaptation, distribution and reproduction in any medium or format, as long as you give appropriate
credit to the original author(s) and the source, provide a link to the Creative Commons license and
indicate if changes were made.
The images or other third party material in this chapter are included in the chapter’s Creative
Commons license, unless indicated otherwise in a credit line to the material. If material is not
included in the chapter’s Creative Commons license and your intended use is not permitted by
statutory regulation or exceeds the permitted use, you will need to obtain permission directly from
the copyright holder.
Chapter 28
Digital Rights Management
Sophia Ding
28.1 Introduction
Digital Rights Management (DRM) systems have been used for decades to protect
companies’ intellectual property and ensure the trusted exchange of digital informa-
tion over the internet. DRM systems serve multiple functions, such as access control,
usage control, billing, and the pursuit of legal infringements. These functions are
achieved through various technologies, such as encryption, digital signatures, digital
watermarks, secure authentication, rights expression languages, and product keys.
The section provides a comprehensive overview of the various DRM functions and
technologies, making it an essential resource for anyone interested in understanding
the workings of DRM systems.
28.2 Analysis
Digital Rights Management has been around for decades. However, traditional
systems were designed for something other than the highly interconnected world
where content such as music, movies, and eBooks are just a click away. In addition,
new technologies such as blockchain have the potential to revolutionize the DRM
system. As a result, the importance of DRM is decreasing in some industries, but it
remains an essential part of modern business models in the streaming economy.
S. Ding ()
Eraneos Switzerland AG, Zurich, Switzerland
e-mail: [Link]@[Link]
28.2.1 Definition
28.2.2 Trends
It is important to note that the importance of DRM varies across industries: although
it is diminishing the traditional music industry. Numerous business models for
streaming platforms and eBook providers are based on their role [2]. Key DRM
trends in the coming years are listed in Table 28.2.
28 Digital Rights Management 165
Table 28.1 Technologies on which different digital rights management functions rely
166 S. Ding
As far back as the 1980s, the first commercial DRM software was known as
DigiBox. It had its origins in library software. Xerox and IBM were among the
first large commercial providers of DRM [27]. Intending to create a royalty-free
DRM standard in 2005, Sun Microsystems launched an open-source project (DRM
everywhere/available). Unfortunately, the project was discontinued in 2008 due to
inactivity [28].
control and identity management. Access rights to data are defined by EDRM
systems independent of the application, device, or access point used by the user
or users. Users must authenticate themselves in order to access restricted content.
A typical use case would be to protect highly confidential documents and emails
being exchanged between several parties to which several parties have access.
The rights of access to data can expire or be revoked by the owner of the data [30].
28.4 Conclusion
Although DRM systems have been widely used to protect the copyright of mul-
timedia content, organizations also use DRM systems for security purposes. In
an increasingly interconnected world, DRM systems will become increasingly
important overall, but they will lose their influence in specific industries, such as
the traditional music industry.
References
13. Abba Garba, Ashutosh Dhar Dwivedi, Mohsin Kamal, Gautam Srivastava, Muhammad Tariq,
M. Anwar Hasan, and Zhong Chen. A digital rights management system based on a scalable
blockchain. Peer-to-Peer Networking and Applications, 14(5):2665–2680, September 2021.
14. Andrew Guadamuz. What do you actually own when you buy an NFT? [Link]
org/agenda/2022/02/non-fungible-tokens-nfts-and-copyright/, February 2022.
15. Everything You Need to Know About NFT for Digital Rights Management.
16. Cheng-Chi Lee, Chun-Ta Li, Zhi-Wei Chen, and Yan-Ming Lai. A Biometric-Based
Authentication and Anonymity Scheme for Digital Rights Management System. Information
Technology And Control, 47(2):262 – 274, June 2018.
17. SungJin Yu, KiSung Park, YoHan Park, HyungPyo Kim, and YoungHo Park. A lightweight
three-factor authentication protocol for digital rights management system. Peer-to-Peer
Networking and Applications, 13(5):1340–1356, September 2020.
18. Halbleiterkrise: Canon entfernt Kopierschutz, aber nur auf Bürodruckern.
19. World Intellectual Property Organization. WIPO Copyright Treaty. [Link]
en/text/295166, urldate = 2022-08-05, December 1996.
20. World Intellectual Property Organization. WIPO Performances and Phonograms Treaty
(WPPT). [Link] 1996.
21. Federal Assembly of the Swiss Conferedation. Federal Act on Copyright and Related Rights.
[Link] October 1992.
22. Droit d’auteur: La gestion numérique des droits (DRM). [Link]
droit-dauteur/DRM, June 2022.
23. Dana Mareckova. Blockchain and Collective Rights Management of Copyright and Related
Rights at the Global Level. [Link] August 2022.
24. Marc Fetscherin. Digital Rights Management - Modeling Consumer Acceptance of Protected
Digital Content. [Link] August 2022.
25. ETH Zurich. Intellectual Property Group (Bechtold). [Link] August 2022.
26. ARAMIS. TIRAMISU: The innovative rights and access management inter-platform solution.
[Link]
27. Ernie Smith. The Incredibly Technical History of Digital Rights Management. [Link]
[Link]/en/article/evbgkn/the-incredibly-technical-history-of-digital-rights-management,
October 2017. Vice.
28. John Leyden. Sun pushes open-source DRM scheme. August 2005.
29. Encyclopedia of library and information sciences. 2009. OCLC: 1082244237.
30. Mario de Boer. Deploying Enterprise Digital Rights Management to Control and Monitor
Unstructured Data. August 2017. Gartner Research.
Open Access This chapter is licensed under the terms of the Creative Commons Attribution 4.0
International License ([Link] which permits use, sharing,
adaptation, distribution and reproduction in any medium or format, as long as you give appropriate
credit to the original author(s) and the source, provide a link to the Creative Commons license and
indicate if changes were made.
The images or other third party material in this chapter are included in the chapter’s Creative
Commons license, unless indicated otherwise in a credit line to the material. If material is not
included in the chapter’s Creative Commons license and your intended use is not permitted by
statutory regulation or exceeds the permitted use, you will need to obtain permission directly from
the copyright holder.
Chapter 29
Authentication
Belinda Müller
29.1 Introduction
29.2 Analysis
29.2.1 Definition
B. Müller ()
Eraneos Switzerland AG, Zurich, Switzerland
e-mail: [Link]@[Link]
or a user using such a device. Depending on the number of credentials (or factors)
required, the authentication process is referred to as single-factor authentication
(SFA), two-factor authentication (2FA), or multifactor authentication (MFA). Note
that MFA includes two-factor authentication. Behavior can also be a factor in
behavior-based authentication and continuous authentication systems.
29.2.2 Trends
Security Factors
Password security has inherent weaknesses [4], particularly sensitivity to social
engineering (for example, phishing) and dictionary attacks. However, passwords
remain the most popular authentication method worldwide, according to an Okta
Inc. study conducted in 2021 [5]. According to this study, 5% of organizations
worldwide use passwords as their primary security measure. Moreover, the pass-
word management market revenue is expected to increase from 1.25 billion U.S.
dollars in 2020 to 3.07 billion U.S. dollars by 2025 [6].
Although the knowledge factor is still omnipresent, the opposite trend of
passwordless authentication is emerging. Passwordless authentication eliminates
the knowledge factor and relies on more substantial security factors such as
ownership and biometrics. In 2020, the worldwide market revenue for passwordless
authentication was approximately 10.3 billion U.S. dollars and was expected to
reach 25.2 billion U.S. dollars by 2025 [7]. However, biometrics is often just an
add-on for better usability, especially in the mobile domain. For example, Android
and iPhones still rely on a pin or strong password in the background. A promising
approach to passwordless authentication is the authentication standard FIDO2,
which was developed by the FIDO alliance, an open industry association. FIDO2
is based on public key cryptography, stores credentials on a user’s device, and uses
unique credentials for every website [8]. This makes it not only resistant to replay
attacks and password theft but also against some phishing attacks [8], to which other
forms of MFA are still susceptible. However, this does not prevent online-phishing
attacks where the attacker is the proxy to the actual service.
With the surge of wearables and other IoT devices, biometric factors in the
future as wearables could be the only workable solution. This might be problematic
because these new devices will need a strong password. By 2027, the worldwide
biometric authentication and identification market is expected to reach almost 100
billion U.S. dollars, up from 33 billion U.S. dollars in 2019 [9]. The significant
barriers to large-scale use of passwordless authentication are considered to be legacy
systems and applications: 61% of IT staff and 58% of IT security leaders worldwide
in 2022 reported that legacy systems and applications did not support the technology
as one of the main barriers to using passwordless [10].
29 Authentication 173
Authentication Approaches
Current trends attempt to enhance security and usability. These include:
• Adaptive authentication [11]: The authentication procedure in adaptive or risk-
based authentication is determined by an entity’s context. Contextual factors,
such as a device’s location or the data sensitivity a user requests, are considered
during authentication. Following this, an authentication risk score is calculated,
often utilizing machine-learning techniques. This risk score determines how
many security measures are required. We are staying on top of security by
using adaptive authentication when increasing usability. This approach was
recommended in the NIST Digital Identity Guidelines from 2017 [12].
• Continuous authentication [3]: During continuous or active authentication, the
identity of an entity is recurrently verified based on patterns derived from contin-
uous monitoring of the entity. This is achieved primarily by using behavioral
or biometric factors such as keystroke patterns, mouse movements, or gait
patterns (see also Real-time Biometric Authentication in Chap. 22). With this
approach, impersonation attacks can be prevented more effectively than static
authentication: the perpetrator must continuously mimic the entity’s behavior.
Otherwise, they would be blocked when an untypical behavior is detected [13].
However, the continuous collection of biometric and behavioral data has raised
concerns regarding privacy, which must be addressed.
• Authentication technology for the approval of sensitive user actions: Authen-
tication technology is commonly used to approve financial transactions: the
transaction details are sent to the payer via an independent channel to be
confirmed via a security factor, for example, via 3D Secure (see Chap. 32.1 for
details). This can help secure transactions against the compromise of operating
systems or browsers through malware. However, using authentication technology
to approve sensitive user actions is not limited to financial transactions but can
also be implemented, for example, for changing one’s online account details.
fingerprint authentication was the most secure method for making credit card
payments [17].
Also, authentication is generally well represented in research in Switzerland, e.g.,
at the Idiap Research Institute ([18], biometric authentication), IBM Zurich ([19]
password cryptography). Also, this research has been successfully transferred, lead-
ing to spin-offs like Token2 Sàrl (University of Geneva) and Futurae Technologies
AG (ETH Zurich).
29.4 Conclusion
References
1. EbruCelikel Cankaya. Authentication. In Henk C. A. van Tilborg and Sushil Jajodia, editors,
Encyclopedia of Cryptography and Security, pages 61–62. Springer US, Boston, MA, 2011.
2. Aleksandr Ometov, Sergey Bezzateev, Niko Mäkitalo, Sergey Andreev, Tommi Mikkonen, and
Yevgeni Koucheryavy. Multi-factor authentication: A survey. Cryptography, 2(1):1, 2018.
Publisher: MDPI.
3. Dipankar Dasgupta, Arunava Roy, and Abhijit Nag. Advances in User Authentication. Infosys
Science Foundation Series. Springer International Publishing, Cham, 2017.
4. Passwords — Strengths and Weaknesses. [Link]
5. Okta Inc. The State of Zero Trust Security 2021. Technical report, June 2021.
6. Justina Alexandra Sava. Password management market revenue worldwide in 2020
and 2027. [Link]
revenue/, June 2022. Statista.
7. Justina Alexandra Sava. Passwordless authentication global market size 2030. [Link]
[Link]/statistics/1290586/passwordless-authentication-global-market-size/, August
2022. Statista.
8. FIDO Alliance. FIDO2. [Link] August 2022.
9. Justina Alexandra Sava. Biometric authentication and identification market revenue world-
wide in 2019 and 2027. [Link]
authentication-and-identification-market-value/, February 2022. Statista.
10. Justina Alexandra Sava. Main barriers to adopting passwordless authentication worldwide
2022. [Link]
authentication/, May 2022. Statista.
11. Patricia Arias-Cabarcos, Christian Krupitzer, and Christian Becker. A survey on adaptive
authentication. ACM Computing Surveys (CSUR), 52(4):1–30, 2019. Publisher: ACM New
York, NY, USA.
12. P.A. Grassi, J. L. Fenton, E. M. Newton, R. A. Perlner, A. R. Regenscheid, W. E. Burr, and
M. F. Therfanos. Nist special publication 800-63b. digital identity guidelines: authentication
and lifecycle management. Technical report, NIST, 2017.
13. Lorena Gonzalez-Manzano, Jose M. De Fuentes, and Arturo Ribagorda. Leveraging User-
related Internet of Things for Continuous Authentication: A Survey. ACM Computing Surveys,
52(3):1–38, May 2020.
14. Studie: Die Schweizer Bevölkerung verwaltet ihre digitalen Zugänge und Passwörter ziemlich
schlecht.
176 B. Müller
15. ESET. Deutschland holt auf: Passwort wird für Online-Nutzer zum alten Eisen. https://
[Link]/de/about/presse/pressemitteilungen/pressemitteilungen/deutschland-holt-auf-
passwort-wird-fuer-online-nutzer-zum-alten-eisen-2/, August 2022.
16. National Cyber Security Centre NCSC. Protect your accounts. [Link]
ch/ncsc/en/home/infos-fuer/infos-private/aktuelle-themen/[Link],
February 2021.
17. Visa Studie: Biometrische Authentifizierungsmethoden werden bei Schweizer Karteninhabern
immer beliebter.
18. idiap Research Institute. Biometrics Security & Privacy. [Link]
research/biometrics-security-and-privacy/index_html, August 2022.
19. Jan Camenisch, Anja Lehmann, Gregory Neven, and Kai Samelin. Virtual smart cards: How to
sign with a password and a server. In International Conference on Security and Cryptography
for Networks, pages 353–371. Springer, 2016.
20. Yael Grauer and Thorin Klosowski. The Best Security Key for Multi-Factor Authentication.
July 2022. The New York Times.
21. 1Password. 1Password. [Link] August 2022.
22. Bitwarden. Bitwarden Open Source Password Manager. [Link] August 2022.
23. Twilio Authy. Authy | Two-factor Authentication (2FA) App & Guides. [Link]
August 2022.
24. Microsoft. Microsoft authenticator. [Link]
authenticator-app?rtc=1, August 2022.
25. Cisco. Duo. [Link]
August 2022.
26. Yubico. Yubico | YubiKey Strong Two Factor Authentication. [Link]
August 2022.
27. Titan Security Key - FIDO U2F USB-C NFC Bluetooth - Google Store. [Link]
com/us/product/titan_security_key?hl=en-US, August.
Open Access This chapter is licensed under the terms of the Creative Commons Attribution 4.0
International License ([Link] which permits use, sharing,
adaptation, distribution and reproduction in any medium or format, as long as you give appropriate
credit to the original author(s) and the source, provide a link to the Creative Commons license and
indicate if changes were made.
The images or other third party material in this chapter are included in the chapter’s Creative
Commons license, unless indicated otherwise in a credit line to the material. If material is not
included in the chapter’s Creative Commons license and your intended use is not permitted by
statutory regulation or exceeds the permitted use, you will need to obtain permission directly from
the copyright holder.
Part V
Use-Cases
Chapter 30
Secure Media
Touradj Ebrahimi
30.1 Introduction
30.2 Analysis
T. Ebrahimi ()
EPFL, Lausanne, Switzerland
e-mail: [Link]@[Link]
Radio and TV) have been replaced by social media or user-generated content where
not only professionals but also consumers can now generate content of all sorts in
the form of sound, picture and video and to distribute them widely.
This change has been, in particular, triggered by the wide adoption of mobile
multimedia (e.g. smartphones with high-performance cameras and microphones,
powerful processors, and wideband networks), a growing number of Internet of
Multimedia Things (e.g. security cameras, smart glasses, wearable cameras), access
to affordable cloud computing infrastructure (e.g. ample capacity storage and
processing power and associated software), broadband communication (e.g. high-
speed Internet and 5G), social networks (e.g. Instagram, Snapchat, and TikTok) and
computational imaging and computer vision based on artificial intelligence.
This new paradigm brings considerable advantages and challenges, particularly
regarding security.
Media security is a subset of information security where the information exhibits
several specificities, among which the most important are:
• The information in media has a perceptual dimension, in the sense that it is
destined to be perceived either by humans (in a large majority of cases today)
or analyzed by machines (a growing trend).
• The information in media exhibits a particular underlying structure that can be
leveraged both to secure and attack them.
• The information in media often represents high-value assets either from monetary
(e.g. music and movies) or affective (photos of essential persons or events)
viewpoints.
Many tools and solutions developed in generic information security can be
directly applied to media. For example, one could digitally sign (see Chap. 15)
an image to enable viewers to check its authenticity. This is of limited use to
secure media because media security is about protecting information, not a specific
representation of it. Consequently, to protect the integrity of information in an
image, one would need a technology that is indifferent to converting the image to a
different format or slight change to its resolution. It should also be able to cope with
image artifacts caused by such conversions, such as compression artifacts.
One of the significant differences and the main objective of media security is
to protect the semantic information representing assets in multimedia as opposed
to the protection of the specific representation of such content. For example, when
protecting the integrity of a picture in JPEG format, a good media security solution
will not merely protect the integrity of the bits that represent that picture in that
format but the semantic content behind those bits. This can be done in such a way
that the integrity would still be protected if those bits change (for example, in the
picture is converted to PNG format) without changing the content behind the bits
(as far as the content of the picture has not changed and it is perceived the same).
In addition, several security concepts, such as integrity protection, are different
in the context of media than in generic information. Others, such as watermarking,
have no direct counterparts.
30 Secure Media 181
Media security problems can be divided into two main clusters, creator-centric
and content-centric. The first one is about the problems generated by the content
creator. These also can be divided into two categories: copyright protection, ensur-
ing that the creator has the rights related to the content, and source authentication,
which ensures that the content is related to its creator. The second cluster is about the
content itself. It also can be divided into two categories: conditional access, which
can be linked to digital right management (see Chap. 28), and integrity verification
which is about verifying that the content has not been modified (Fig. 30.1).
30.2.1 Definition
30.2.2 Trends
With the growing reliance on multimedia content in the daily lives of citizens, both
professionally and in their private lives, media security is becoming an essential
technology to include in many applications. The following presents some of the
immediate challenges and trends:
• Privacy protection in pictures and video, particularly for video surveillance and
social networks and especially in the context of GDPR [12].
• Countermeasures to fight the growing use of deepfakes to spread misinformation.
• Media security standardization to create interoperable, secure ecosystems, par-
ticularly those developed by International Standardization Organizations such as
JPEG [13].
30 Secure Media 183
It is only possible to decide abstractly and by knowing the precise application and
context, if media security tools should be made, tailored, or bought from third
parties. However, some guidelines can provide help to find the answer on a case-
by-case basis:
• Proprietary and closed solutions in media security should be avoided. In a
security context, it has been demonstrated multiple times that security tools and
systems whose specifications are kept secret are weaker and more vulnerable to
attacks when compared to open and publicly accessible specifications [14].
• Media security tools and solutions based on international standards where
multiple suppliers can be identified as providers of tools and solutions are mainly
preferable.
• In mission-sensitive contexts, including in applications relevant to national
security, design, and validation, in particular, the security analysis of tools and
solutions should be performed internally and externally by relying on trusted
third parties.
Media security is no longer a niche; many applications need media security tools and
solutions in addition to more general security tools and solutions such as symmetric
or asymmetric encryption. Therefore, Switzerland needs to strengthen its skills and
know-how in media security through initiatives to encourage education and public-
private collaborations. In most cases, media security tools and solutions can result
in successful business opportunities for those involved.
184 T. Ebrahimi
30.4 Conclusion
Media security refers to a large spectrum of tools and solutions that often need to
be sufficiently and optimally addressed through generic information security tools
and solutions. At the same time, media security tools and solutions are increasingly
essential elements in many professional and private applications that have become
multimedia-rich. Breach of security in applications where multimedia information
is used can have devastating and irreversible consequences. This can go from impact
on the privacy of citizens to manipulation of public opinion through misinformation,
which is particularly dangerous in the Swiss context where direct democracy is
a foundational principle, requiring well-informed citizens who need to depend
on reliable information. Because of these reasons, media security must have a
prominent position in the Swiss strategy in cybersecurity in the years to come.
References
1. Xiao Jin, Yuting Su, Liang Zou, Chengqian Zhang, Peiguang Jing, and Xuemeng Song. Video
logo removal detection based on sparse representation. Multimedia Tools and Applications,
77(22):29303–29322, November 2018.
2. Lijun Xiao, Weihong Huang, Yong Xie, Weidong Xiao, and Kuan-Ching Li. A Blockchain-
Based Traceable IP Copyright Protection Algorithm. IEEE Access, 8:49532–49542, 2020.
3. Xiushan Nie, Xiaoyu Li, Yane Chai, Chaoran Cui, Xiaoming Xi, and Yilong Yin. Robust
Image Fingerprinting Based on Feature Point Relationship Mining. IEEE Transactions on
Information Forensics and Security, 13(6):1509–1523, June 2018.
4. Kratika Bhagtani, Amit Kumar Singh Yadav, Emily R. Bartusiak, Ziyue Xiang, Ruiting Shao,
Sriram Baireddy, and Edward J. Delp. An Overview of Recent Work in Media Forensics:
Methods and Threats, May 2022. arXiv:2204.12067 [cs].
5. Wenbo Wan, Jun Wang, Yunming Zhang, Jing Li, Hui Yu, and Jiande Sun. A comprehensive
survey on robust image watermarking. Neurocomputing, 488:226–247, June 2022.
6. Mandeep Kaur, Surender Singh, and Manjit Kaur. Computational Image Encryption Tech-
niques: A Comprehensive Review. Mathematical Problems in Engineering, 2021:e5012496,
July 2021. Publisher: Hindawi.
7. Hany Farid. An Overview of Perceptual Hashing. Journal of Online Trust and Safety, 1(1),
October 2021. Number: 1.
8. Inas Jawad Kadhim, Prashan Premaratne, Peter Vial, and Brendan Halloran. Comprehensive
survey of image steganography: Techniques, Evaluations, and trends in future research. Faculty
of Engineering and Information Sciences - Papers: Part B, pages 299–326, January 2019.
9. Imani N. Sherman, J. W. Stokes, and Elissa M. Redmiles. Designing Media Provenance
Indicators to Combat Fake Media. RAID, 2021.
10. Alia Madain, Abdel Abu Dalhoum, Hazem Hiary, Alfonso De la Puente, and Manuel
Alfonseca. Audio scrambling technique based on cellular automata. Multimedia Tools and
Applications, 71, August 2012.
11. Md Shohel Rana, Mohammad Nur Nobi, Beddhu Murali, and Andrew H. Sung. Deepfake
Detection: A Systematic Literature Review. IEEE Access, 10:25494–25513, 2022.
12. General Data Protection Regulation (GDPR) Compliance Guidelines. [Link] August
2022.
30 Secure Media 185
Open Access This chapter is licensed under the terms of the Creative Commons Attribution 4.0
International License ([Link] which permits use, sharing,
adaptation, distribution and reproduction in any medium or format, as long as you give appropriate
credit to the original author(s) and the source, provide a link to the Creative Commons license and
indicate if changes were made.
The images or other third party material in this chapter are included in the chapter’s Creative
Commons license, unless indicated otherwise in a credit line to the material. If material is not
included in the chapter’s Creative Commons license and your intended use is not permitted by
statutory regulation or exceeds the permitted use, you will need to obtain permission directly from
the copyright holder.
Chapter 31
Secure Positioning and Localization
Martin Strohmeier
31.1 Introduction
31.2 Analysis
31.2.1 Definition
M. Strohmeier ()
Cyber-Defence Campus, Thun, Switzerland
e-mail: [Link]@[Link]
one can thus prove that a car key is not further than a certain distance away
from the car it wants to open. Additionally, the prover node can use distance
bounding to determine its correct position even under spoofing/wireless interference
by an attacker. Furthermore, distance bounding can also enable secure position
verification where a verifier verifies the position claim of an (untrusted) prover
node [4].
The TESLA protocol and its derivatives/further developments enable the crypto-
graphic authentication of broadcast communication such as those used in GNSS. It
uses symmetric cryptography in connection with time as its asymmetric property to
enable the receiver of the GNSS messages to verify the authenticity of the navigation
content.
Finally, these methods compete with and complement many non-cryptographic
methods using physical properties (think classical radar) to verify location claims
and positions. An overview is given in [4].
31.2.2 Trends
The general expectation is that known secure solutions for navigation, positioning,
and localization systems will mature and be deployed more widely. This will
affect many important sectors in the industry, the government, and the military. For
example, the GNSS market alone is growing steadily over the next decade, reaching
cumulative revenues of e3860 bn [5]. Furthermore, with autonomous vehicles
becoming increasingly essential and utilized in all domains (land, water, air), secure
and robust positioning and navigation capabilities will be crucial. Nevertheless,
many other growth segments will rely on secure navigation systems besides
traditional navigation-dependent sectors such as shipping, aviation, cars, and rail.
These include, but are not limited to, industrial automation, agriculture, climate
services, infrastructure, insurance and finance, space, and urban development.
Actors developing and integrating such solutions range from startups and
university spinouts such as 3db [6] to the major defense contractors and suppliers
in the GNSS market (e.g., Garmin, car manufacturers, and tech companies such as
Alphabet). We also expect disruption through the new Low Earth Orbit (LEO) mega-
constellations such as Starlink and OneWeb, which could be used for navigation [7].
Last but not least, the major global powers behind the GNSS systems will be pushing
for secure and robust solutions, exemplified by the recent addition of TESLA to
Galileo, the European GNSS. [8].
and/or conducted by Swiss academics. However, without its space missions and
satellite constellation, Switzerland depends on the major global powers and their
GNSS constellations, particularly GPS (US) and Galileo (Europe).
For smaller products such as keyless entry systems, the current startup ecosystem
can provide the expertise for secure positioning solutions and their integration into
consumer products and other dependent systems.
This section presents the pros and cons of buying or making secure localization
products (Table 31.1).
We discuss three different options for secure localization. The differences between
actors are relatively minor, particularly since control of crucial space-based global
positioning and navigation technologies remains viable only for a handful of major
state and supranational actors. The first option is the Timed Efficient Stream Loss-
tolerant Authentication (TESLA) broadcast authentication protocol [3]. It has the
advantage of being a practical option that can be fitted retroactively to GNSS.
Nevertheless, on the other hand, it is costly and needs systemic changes. The second
option is Distance Bounding [1, 2]. It has two main advantages for the military:
flexible technology and proven applications. For civil society and the economy, it
is available in consumer technology. On the other hand, it has the disadvantage of
being primarily applicable for short distances. The last option is non-cryptographic
solutions. The military they have the advantage (Table 31.2).
31.4 Conclusion
References
1. Stefan Brands and David Chaum. Distance-Bounding Protocols. In Tor Helleseth, editor,
Advances in Cryptology — EUROCRYPT ’93, Lecture Notes in Computer Science, pages 344–
359, Berlin, Heidelberg, 1994. Springer.
2. Kasper Bonne Rasmussen and Srdjan Cǎpkun. Realization of RF Distance Bounding. page 13.
3. Adrian Perrig and J. D. Tygar. TESLA Broadcast Authentication. In Adrian Perrig and J. D.
Tygar, editors, Secure Broadcast Communication: In Wired and Wireless Networks, pages 29–
53. Springer US, Boston, MA, 2003.
4. Srdjan Čapkun. The Cyber Security Body of Knowledge v1.0, 2019. University of Bristol,
2019. Section: Physical Layer & Telecommunications Security.
5. The European Commission and The European Union Agency for the Space Programme. EUSPA
EO and GNSS Market Report. Technical report, Luxembourg, 2022.
6. 3db Access. [Link] August 2022.
7. SpaceX’s Starlink broadband satellites could be used for GPS navigation | Space. [Link]
[Link]/spacex-starlink-gps-navigation, August 2022.
8. Galileo Open Service Navigation Message Authentication - Navipedia. [Link]
int/navipedia/[Link]/Galileo_Open_Service_Navigation_Message_Authentication, August
2022.
192 M. Strohmeier
Open Access This chapter is licensed under the terms of the Creative Commons Attribution 4.0
International License ([Link] which permits use, sharing,
adaptation, distribution and reproduction in any medium or format, as long as you give appropriate
credit to the original author(s) and the source, provide a link to the Creative Commons license and
indicate if changes were made.
The images or other third party material in this chapter are included in the chapter’s Creative
Commons license, unless indicated otherwise in a credit line to the material. If material is not
included in the chapter’s Creative Commons license and your intended use is not permitted by
statutory regulation or exceeds the permitted use, you will need to obtain permission directly from
the copyright holder.
Chapter 32
Secure Payment
Sophia Ding
32.1 Introduction
The shift towards a digital economy has led to an increase in electronic payment
methods, from credit cards to online and mobile contactless payments. Secure
payment is crucial in verifying and protecting transactions and customers. Despite
implementing security measures such as data encryption and strong customer
authentication, online fraud continues to be a concern in the industry. Standards
such as the EMV Integrated Circuit Card Specification, Payment Card Industry Data
Security Standard, and Revised Payment Services Directive regulate the payment
services and providers, mandating various security measures to be in place.
32.2 Analysis
S. Ding ()
Eraneos Switzerland AG, Zurich, Switzerland
e-mail: [Link]@[Link]
32.2.1 Definition
card companies. With the exception of U.S. and U.K. card issuers, AVS and
CVV2 participation is optional [16, 17].
32.2.2 Trends
It is estimated that the total value of digital payments will reach $8.49 trillion in
2022. By 2026, it is forecast that the market will reach $13.75 trillion with an annual
growth rate of 12.82% [18]. Table 32.1 provides a summary of key trends in secure
payments in the coming years. As a prerequisite to the use case trends listed in the
table, secure payment is necessary, emphasizing the importance of secure payment
for the development of new applications in retail.
house (ACH) payment (e.g., OpenACH), which is used to transfer money from
one bank account to another [37]. Additionally, there are open-source payment
gateways (e.g., Open-Source Payment Gateway), which facilitate the transfer of
payment information. The providers of these open-source solutions claim that their
products facilitate integration with existing systems on the client side and provide
better customization due to their modularity and adaptability. It is important to note
that while the source code is available, open source does not necessarily mean that
the solution is free. In addition to PCI compliance, it still requires an underlying
infrastructure and computing power.
32.4 Conclusion
References
1. Visa. 3-D Secure 2.0: Improving security and increasing authorizations for digital transac-
tions. [Link]
July 2022.
2. T. Editors of Encyclopaedia Britannica. Credit Card. [Link]
card, March 2021.
3. Huffington Post. Pizza Hut Tells Twitter It Made The First Online Sale In 1994. Huffington
Post, December 2014.
4. Europol. Payment Fraud. [Link]
areas/forgery-of-money-and-means-of-payment/payment-fraud, July 2022.
5. Marc Pasquet, Joan Reynaud, and Christophe Rosenberger. Secure payment with NFC
mobile phone in the SmartTouch project. In 2008 International Symposium on Collaborative
Technologies and Systems, pages 121–126, Irvine, CA, USA, May 2008. IEEE.
6. Hui et al. MOBILE PAYMENTSYSTEM. [Link]
1a/16e48f1cd942e9/[Link], June 2002.
7. Anna Oleksyuk. The Rise of Voice Payment Technology in Banking. [Link]
@annoleksyuk/the-rise-of-voice-payment-technology-in-banking-96f94cb2211f, February
2019.
198 S. Ding
8. Yang Bao, Gilles Hilary, and Bin Ke. Artificial Intelligence and Fraud Detection. In Volodymyr
Babich, John R. Birge, and Gilles Hilary, editors, Innovative Technology at the Interface of
Finance and Operations, volume 11, pages 223–247. Springer International Publishing, Cham,
2022. Series Title: Springer Series in Supply Chain Management.
9. Michael H. Meissner. Accountability of senior compliance management for compliance
failures in a credit institution. Journal of Financial Crime, 25(1):131–139, January 2018.
10. Wordline. Sichere Zahlungen leicht gemacht - Eine kurze Einführung in die neuen Anforderun-
gen Europas für eine starke Kundenauthentifizierung. [Link]
dam/download/flyers/e-commerce/[Link], July 2022.
11. Michael Ward and Anita Ochieano. EMV. In Henk C. A. van Tilborg and Sushil Jajodia,
editors, Encyclopedia of Cryptography and Security, pages 412–416. Springer US, Boston,
MA, 2011.
12. Laura K. Gray. Webinar: SSL and Early TLS Migration: Preparing for 30 June Dead-
line. [Link]
30-june-deadline, March 2018.
13. European Union. Directive (EU) 2015/2366 of the European parliament and of the
council of 25 November 2015 on payment services in the internal market, amending
directives 2002/65/ec, 2009/110/ec and 2013/36/eu and regulation (EU) no 1093/2010, and
repealing directive 2007/64/ec. [Link]
%3A32015L2366, July 2022.
14. EMVCo. EMV®3-D Secure. [Link] August
2022.
15. Worldline. 3-D Secure 2.0. [Link]
2019/[Link], July 2022.
16. Visa. Getting Started with Payment Account Validation. [Link]
capabilities/pav/docs, July 2022.
17. SIX Payment Services. Increased security with the CVV2/CVC2/CID card verifica-
tion value for distance payments with Visa, MasterCard, Diners Club, Discover and
Maestro1. [Link]
ErhoehteSicherheit_CHE_EN_opt.pdf.
18. Digital Payments. [Link]
month = Jul, year = 2022, urldate = 2022-07-27, note = Statista,.
19. Ransome Epie Bawack, Samuel Fosso Wamba, and Kevin Daniel André Carillo. Exploring
the role of personality, trust, and privacy in customer experience performance during voice
shopping: Evidence from SEM and fuzzy set qualitative comparative analysis. International
Journal of Information Management, 58:102309, June 2021.
20. Monitor Deloitte. Beyond Touch – Voice Commerce 2030: Wie Voice-assisted Interfaces den
Handel in Europa revolutionieren werden. [Link]
8031/Beyond_Touch__Voice_Commerce_2030.pdf.
21. Sudipta Ranjan Subudhi and R. N. Ponnalagu. An Intelligent Shopping Cart with Automatic
Product Detection and Secure Payment System. In 2019 IEEE 16th India Council International
Conference (INDICON), pages 1–4, Rajkot, India, December 2019. IEEE.
22. BNP Paribas. Means of payment. [Link]
clients-and-society/innovative-solutions/means-of-payment, July 2022.
23. Barclaycard. Shopping online becomes even safer from today: The big change to how we pay
that all Brits need to know about. [Link]
online-becomes-even-safer/#:~:text=Rob%20Cameron%2C%20CEO%20of%20Barclaycard,
all%20the%20safer%20for%20it., July 2022.
24. Payment Fraud: Why banks need a smarter approach to AI. [Link]
payment-fraud/, July 2022. NetGuardians.
25. John O. Awoyemi, Adebayo O. Adetunmbi, and Samuel A. Oluwadare. Credit card fraud
detection using machine learning techniques: A comparative analysis. In 2017 International
Conference on Computing Networking and Informatics (ICCNI), pages 1–9, Lagos, October
2017. IEEE.
32 Secure Payment 199
Open Access This chapter is licensed under the terms of the Creative Commons Attribution 4.0
International License ([Link] which permits use, sharing,
adaptation, distribution and reproduction in any medium or format, as long as you give appropriate
credit to the original author(s) and the source, provide a link to the Creative Commons license and
indicate if changes were made.
The images or other third party material in this chapter are included in the chapter’s Creative
Commons license, unless indicated otherwise in a credit line to the material. If material is not
included in the chapter’s Creative Commons license and your intended use is not permitted by
statutory regulation or exceeds the permitted use, you will need to obtain permission directly from
the copyright holder.
Chapter 33
Disk, File and Database Encryption
33.1 Introduction
Disk, file, and database encryption are technologies used to protect data confiden-
tiality when stored. Full disk encryption (FDE) encrypts all data on a disk except
the part containing the code to unlock the rest of the disk, which is usually not
encrypted. File-based encryption (FBE) operates at the file level and can be done
by the operating system or an application. Manual file encryption requires user
intervention and is not transparent. Database encryption (DBE) can be done using
transparent DBE, column-level encryption, or field-level encryption. The goal of
DBE is to encrypt the whole database or specific columns or fields to ensure that the
data on physical storage cannot be read if stolen.
33.2 Analysis
To make use of the data, for example, to make computations with it, the data must be
decrypted to be processed, unless one makes use of technologies like homomorphic
Encryption (see Chap. 8). Whether or not the user of a turned-on and unlocked
device must provide an additional secret to working on an encrypted file, disk, or
database, the key material needed to do so must already be available on the system.
When no additional secret needs to be provided, decryption and Encryption are
transparent to the user, and the key material is usually entered or made available
during a device’s startup or unlocking phase. Consequently, the data is only secure
when the device is turned off or locked.
33.3 Definition
As the name suggests, FDE [1] encrypts all data on a disk unless it is the disk from
which the system boots. In this case, the part containing the code to unlock/get
the critical material needed to access the rest of the disk is not encrypted. This
code usually does something like (1) reading encrypted key material from the
unencrypted part of the disk, (2) having a user enter the password needed to decrypt
it, and (3) starting booting the operating system as the data on the disk containing
it can now be decrypted. Once the operating system has been booted, access to
the disk is through the encryption driver and transparent to the user and any other
person/attacker that gets her hands on such a system. This is mainly a problem when
using FDE in a server environment, as it is difficult to guarantee that nobody else
has access to the system while it is running. In addition, when using FDE in a server
environment, care must be taken about how the password/secret key is input into the
server’s system [2]. Another problem is that if the unencrypted part of the disk is
not protected against manipulation, for example, with secure boot technologies, an
attacker could efficiently execute attacks like the evil maid attack [3]. A particular
case of FDE is external harddisks that include the encryption algorithm and a PIN
pad directly in the enclosure. This allows for easy usage with different systems since
they do not need any support for FDE. FDE is fully transparent to them in this case.
1A disk is usually partitioned into a large number of blocks of the same size.
33 Disk, File and Database Encryption 203
on Apple devices running iOS. There, files accessible in a locked state are encrypted
with different key material than files accessible only in an unlocked state. When the
device is locked, the latter protection level’s key material is no longer available. It
can only be restored by unlocking the phone again. On the negative side, however,
is that most of the FBE systems today leave one or more of the following metadata
for an attacker to explore:
• Access times and size of the file—revealing if a file has been used recently and
what type of file it might be
• Entry type (file or directory)—revealing applications used
• For password-protected zip files, even the filenames are in cleartext
In contrast to FDE and FBE, manual file encryption requires intervention by the
user and is not transparent. The most well-known system is to provide a password
to create a .zip file. This password will encrypt most, but not all, of the data in the zip
file. More elaborate tools like PGP exist, but they pose a fundamental management
problem, as the sender needs access to the receiver’s public key.
DBE is usually done with one of the following approaches: Transparent DBE,
column-level Encryption, or field-level Encryption. The whole database is encrypted
with the same symmetric key with transparent DBE. This ensures that data on
the physical storage cannot be read if stolen. The other two approaches exploit
how relational databases are structured. They consist of tables, tables consist of
columns, and a column entry is called a field. With column-Level Encryption, one
can use different encryption keys for different columns. This adds, for example, the
ability to encrypt only parts of the data and/or bind key material to specific roles
preventing users with a different role that manage to query such a column can read
the data. However, encrypting columns individually can come at the cost of reduced
speed, depending on whether just one or many columns are encrypted. Field-level
Encryption is also possible. It allows users to search the DB without decrypting each
field since one can encrypt the field content (only exact matches) and then search for
this value. However, when Encryption is randomized, for example, by prepending
a fixed-size random value to the content before encrypting it, a different result is
generated for equal fields. This provides more security at the cost of jeopardizing
encrypted searches.
204 L. Gasser and I. Aad
The symmetric key used for Encryption is derived, in the simplest case, from a
password given by the user. It is essential that the password is long enough and has
enough entropy to be secure. This simple system cannot recover a lost password and
cannot allow more than one user access to the same data.
More elaborate systems use asymmetric Encryption to protect the symmetric
key. This additional, asymmetric key can be stored in a hardware element like
a smartcard, a TPM, or another. These systems can also include two-factor
authentication.
In all systems, there needs to be a way to recover the data in an emergency. For
example, if the user needs to remember her password or private key. Nevertheless,
this needs to be done so that the emergency procedure cannot be abused. Indeed, if
this emergency option can be used to access unauthorized data, it can become more
of a problem than a solution. Therefore there is a proper balance to find between
confidentiality and availability.
33.4.3 Coercion
To access encrypted data, be it data protected by FDE, FBE, or DBE, some user-
provided secret/key material is needed. An attacker might force the user to enter the
password through coercion to get it. This might be violence, the threat of jail, or any
other type of coercion [7]. To defeat this attack, some systems allow users to provide
different passwords. Depending on the password, the system will open one of two
containers. One password opens the standard system, file, or database, while another
33 Disk, File and Database Encryption 205
opens a different one that does not contain sensitive data. For an external observer,
it is nearly impossible to know which of the two systems they are currently looking
at. One example of a solution that does this at the level of disks is VeraCrypt [8].
33.5 OS Examples
33.6 Trends
The essential features of FDE and FBE are now readily available in popular
operating systems like Windows, MacOSX, and Linux. However, it is still rare to
see Encryption on the server side, except for servers from big players. For example,
Google uses several layers of encryption. This also has to do with the fact that the
users need to influence whether the data behind the cloud services is encrypted.
Two features of Encryption that can increase the user experience might get more
traction until 2025. Both involve managing the secret key: delegated (custodial) key
management and threshold encryption.
The Delegated (Custodial) Key Management means that the key resides on a
third-party server. This allows recovery of the key if the primary owner loses the
key. Microsoft and Apple offer this service when installing FDE. While this system
guarantees that the key will still be available even in the case of password loss, you
Table 33.1 Softwares used in different operating systems to add FDE or FBE
206 L. Gasser and I. Aad
now have to trust the keeper of the key, in this case, Microsoft and Apple, not to
give it away.
A more secure method is Threshold Encryption which shares the key with several
parties. It requires a minimum of those parties to participate in recovering the key.
In such a way, a single participant cannot leak the key. Several systems are working
on this scheme. One is [9], developed at the EPFL by prof. Bryan Ford.
From a user perspective, FDE and FBE are great tools to keep data privacy on the
computer. No unauthorized person can access the data, even in the case of theft or
loss of the device. On the other hand, from a law enforcement perspective, these
tools make it more challenging to get the data necessary to convict a felon.
The department of computer science at ETH Zurich has two laboratories, the
Applied Cryptography Group and the Information Security and Cryptography
group, working on different cryptography applications. Their publications cover
FDE, FBE, and DBE.
33.8 Conclusion
Both FDE and FBE allow good protection against data leakage in the case of device
theft or loss. However, due to their nature, they cannot protect against an attacker
who gets her hands on a device turned on (and unlocked) or any other intruders
who can run programs on the computer. This might be somebody using phishing to
access the computer or malware getting access to your computer through a bug in
the operating system.
References
Open Access This chapter is licensed under the terms of the Creative Commons Attribution 4.0
International License ([Link] which permits use, sharing,
adaptation, distribution and reproduction in any medium or format, as long as you give appropriate
credit to the original author(s) and the source, provide a link to the Creative Commons license and
indicate if changes were made.
The images or other third party material in this chapter are included in the chapter’s Creative
Commons license, unless indicated otherwise in a credit line to the material. If material is not
included in the chapter’s Creative Commons license and your intended use is not permitted by
statutory regulation or exceeds the permitted use, you will need to obtain permission directly from
the copyright holder.
Chapter 34
WEB3
Linus Gasser
34.1 Introduction
Web3 is the next generation of the internet, often referred to as the decentralized
or blockchain web. It aims to address the shortcomings of the current centralized
web, such as privacy concerns and lack of control over personal data, by leveraging
decentralized technologies like blockchain and peer-to-peer networks. The vision of
Web3 is to create a more open, secure, and democratic internet where users have full
control over their data and interactions. The goal of Web3 is to build a new internet
infrastructure that is more secure, user-centric, and decentralized than the current
web, making it easier for individuals to own and control their data.
34.2 Analysis
Since its invention by Tim Berners Lee in 1989, the Web has undergone a major
transformation, and depending on whom you talk to, another one, Web3, is on the
horizon. The original internet, Web 1.0, allowed for static web pages with links to
other web pages. Anything beyond that, for example, programming user interactions
with these pages to implement web applications, was complicated. With the first
transformation of Web 1.0 to Web 2.0, the Web became much more dynamic.
Technologies like javascript and cascading style sheets offer myriad ways to interact
with users and implement complex web applications. The possibilities of the Web
2.0 sparked services like Facebook and TikTok whose primary business is to engage
L. Gasser ()
EPFL, Lausanne, Switzerland
e-mail: [Link]@[Link]
users to interact with content and to exploit these interactions for marketing and
advertisement purposes. The user, or more precisely, the data collected about a user,
became the new currency; in exchange for their data, users can use most services
for “free”. With Web 2.0 dominated by a few companies only, the “Big Tech”
companies like Meta or Alphabet, some people wished for a less centralized Web.
Web3 might become a more decentralized Web as it incorporates concepts such as
decentralization, blockchain technologies, and token-based economics.
34.2.1 Definition
When discussing the next generation of the internet, two terms are often heard and
sometimes also confused: Web3 and Web 3.0. Even though they both designate the
future of the internet and decentralization, they are not the same [1]:
Web 3.0 has been coined by Tim Berners Lee as the Semantic Web, where the
pages are machine-readable. In his implementation, Solid, people store their data
securely in decentralized data stores called Pods. In Web3, decentralization is not
achieved by the concept of Pods owned by the users, and can be hosted anywhere
and moved around quickly but by using blockchain technology. With the blockchain
as a basis, Web3 wants to be a platform that goes far beyond being a platform for
Web content only. It leaves the Semantic Web focus aside and strives to become the
future technical, legal, and payment infrastructure for the world. Web3 also wants
to “cut out the middlemen” by directly contacting producers and consumers. This
allows the producers to receive more money for their work while the consumer needs
to pay less.
It is, therefore, confusing that Time Berners Lee stated that: Web3 has been
coined by Gavin Wood and is the name of his company that develops Web 3.0: Users
own their data, not corporations; Global digital transactions are secure; Online
exchanges of information and value are decentralized.
34.2.2 Technologies
The technology for Tim Berner Lee’s Web 3.0 revolves around the possibility of
each internet user managing their Pods. Pods are like secure personal web servers
for one’s data. The Solid projects write the following about Pods:
(Pods) can be hosted by the same Pod Provider or by different Providers or be self-hosted
or any combination thereof. The number of Pods you have, as well as which Solid Server or
Servers you use, is effectively transparent to your applications and services. This is because,
in the Solid ecosystem, data is linked through your identity and not through the specifics of
your Pod. This is true for your data and those that others have shared with you.
34 WEB3 211
The user has complete control over who sees which part of her Pod. This allows
the implementation of self-sovereign identities, which can free internet users from
the need to depend on big companies like Google, Facebook, or TikTok for their
identity [2].
Web3 goes much further in its decentralization and wants to promote a self-
sovereign internet. This self-sovereign internet is based on a decentralized (peer-to-
peer) infrastructure, currently embodied using blockchains. The goal is to replace a
big part of the current infrastructure provided by the government through services
based on blockchains and smart contracts [3].
In Web3, Cryptocurrencies and other financial assets like Non-Fungible Tokens
(NFTs) replace the government’s fiat money. In addition, smart contracts enable
the creation of Digital Autonomous Organizations (DAOs), which reflect real-world
structures in the Web3 world. Using DAOs, decisions can be made with less friction
than with real-world organizations. Another component, Decentralized Finance
(DeFi) allows the exchange of the different crypto-tokens directly on the blockchain
without going through a centralized exchange [3].
Some also include the approaching Metaverse in Web3 and propose that
exchanges between different Metaverse platforms can be done using NFTs. This
allows things bought in one Metaverse to be used in another Metaverse [3].
34.2.3 Risks
As has been shown in 2021 and 2022, significant parts of the blockchain infrastruc-
ture for Web3 are not ready for prime time yet: systems are slow, they break, and the
smart contracts contain many bugs which hackers exploit to steal the funds stored
in these smart contracts [4].
Another risk needs to be considered concerning the societal effects of removing
parts of the government: how can Web3 make sure that the social aspects of
today’s governments are kept so that people are not excluded? One unsolved
question regarding decentralized finance is how to recover stolen or lost funds when
blockchains are decentralized and immutable.
Finally, another hidden risk of WEB3 is that it is less decentralized and open
than its advocates might say. Indeed, blockchain-based activity depends on services
that are only possible with the cooperation of a handful of private, centralized
companies [5].
34.2.4 Trends
Over the next few years, Web3 will mature, and its components will merge
with current technologies. This might include upcoming Central Bank Digital
212 L. Gasser
Currencies [6], which could remove some of the problems linked to the high
volatility of cryptocurrencies.
There is an attempt to work on the privacy problem of blockchains through the
use of Zero-Knowledge proofs, which can hide the actions of a user. While this
technology currently is very limited due to its low speed, it might very well mature
to the point of being usable in a broader context [7].
As there is very little research on how to implement theft and fraud protection in
Web3, it is expected that these problems will persist for many years to come. One of
the problems is that this protection can be solved quite easily in a centralized setup,
but a decentralized setup makes it very hard to make the right decisions.
Switzerland was one of the first countries to have a legal framework for blockchain
applications [8]. This made it attractive and attracted many companies to Zug and
other places [9]. There is also an ongoing effort for digital identity that should be
self-sovereign [10]. This puts Switzerland in a good place to profit from the positive
effects of Web3.
The current adoption of Web3 is low, mainly because the technology needs to be
more mature and widely used. In addition, the underlying blockchains are too slow
and too difficult to use [4]. Also, they are currently incompatible with the “free
through ads” internet, as they all need financial implications to participate.
From an efficacy point of view, some of the underlying services start to evolve
into a usable form: [11] has a decentralized cloud management system, and [12] is
running a fast and decentralized generic blockchain.
34.4 Conclusion
Web3 promises more power to the users and the removal of intermediaries between
the users and the services. This can bring more privacy and better remuneration
for the service providers on the internet. Furthermore, most Web3 propositions
are based on blockchains, which allow increasing trust by removing power from
some controllers, like Google or Facebook. Switzerland is in an excellent position
to participate in the upcoming Web3, as it already has legal regulations that allow
innovation and growth. However, this dream might not come true as a new big player
could control this new infrastructure.
34 WEB3 213
So far, current Web3 systems still need to scale to the many billions of users on
the internet. Once Web3 scales, it may deliver on its promise of a more user-driven
experience.
References
1. Web3 vs. Web 3.0: Key Differentiators and Why It’s Important. [Link]
information-management/why-web3-and-web-30-are-not-the-same/. [Link].
2. Tim Berners-Lee: Screw Web3 — my decentralized web has no blockchain.
3. San Gilbert. Crypto, web3, and the Metaverse, March 2022.
4. Molly White. Web3 Is Going Just Great. [Link] August 2022.
5. Web3 is not the decentralized utopia you’ve been promised, January 2022. Quartz.
6. Central Bank Digital Currency (CBDC). [Link]
[Link], August 2022. Investopedia.
7. Overview Of Zero-Knowledge Blockchain Projects | Chainlink. [Link]
knowledge-projects/, July 2022.
8. Blockchain / dlt State Secretariat for International Finance Swiss. [Link]
sif/en/home/finanzmarktpolitik/digitalisation-financial-sector/[Link], January 2022.
SIF.
9. Bank Julius Raphael Nikola Züger Baer, Legal Counsel. Swiss regulations give greater cer-
tainty to digital tokens. [Link]
regulations-give-greater-certainty-to-digital-tokens/, August 2022.
10. Building a Swiss Digital Trust Ecosystem – Perspectives around an e-ID ecosystem in
Switzerland. [Link] April
2022. digitalswitzerland.
11. Dominic Williams. The Decentralized Cloud Vision of the DFINITY Blockchain.
[Link]
f68449c49be2, June 2021.
12. Emin Gun Sirer, Founder Of The Avalanche Blockchain, Is Not Sweating A 76% Drop In
Token Price.
Open Access This chapter is licensed under the terms of the Creative Commons Attribution 4.0
International License ([Link] which permits use, sharing,
adaptation, distribution and reproduction in any medium or format, as long as you give appropriate
credit to the original author(s) and the source, provide a link to the Creative Commons license and
indicate if changes were made.
The images or other third party material in this chapter are included in the chapter’s Creative
Commons license, unless indicated otherwise in a credit line to the material. If material is not
included in the chapter’s Creative Commons license and your intended use is not permitted by
statutory regulation or exceeds the permitted use, you will need to obtain permission directly from
the copyright holder.
Chapter 35
5G
Weyde Lin
35.1 Introduction
35.2 Analysis
W. Lin ()
Eraneos Switzerland AG, Zurich, Switzerland
e-mail: [Link]@[Link]
Industry 4.0 and mobile gaming [5]). The 5th generation technology standard for
broadband cellular networks (5G) [6] is meant to address these challenges [7].
35.2.1 Definition
In 2018 the first air interface standard for 5G was defined by the 3rd Generation
Partnership Project (3GPP) as the radio access technology 5G NR (New Radio) [8].
5G NR can use the frequency ranges 410 MHz–7125 MHz (Frequency Range 1 [9])
and 24.25 GHz–71.0 GHz (Frequency Range 2 [10]). Frequency Range 2 (FR2),
also known as the millimeter wave spectrum, is new in 5G and has not been used
in previous cellular network standards (i.e., 1G–4G). As a result, FR2 offers very
high data speeds. However, the range is limited as the signal cannot travel far and is
easily blocked by buildings or trees [11]. Therefore, the millimeter wave spectrum is
primarily used in an urban environment to provide high network capacity in crowded
environments [12].
From a security point of view, 5G is based on the previously existing security
controls. Nevertheless, it adds some new security features. Indeed, this new
generation now contains an asymmetric key. Some other improvements are the
authentication of the local to-home network, even if using an untrusted serving
network, and the network slicing to provide differentiated handling of service
requirements for different applications [13].
35.2.2 Trends
Global 5G rollout by mobile operators started in 2019 [7]. In 2021, the global
population 5G coverage already reached 25%, which is significantly faster than
the 4G rollout that took 18 months longer to reach the same global population
coverage [14]. This is partly driven by the fact that the mobile data traffic roughly
doubles every 2 years [15]. GSMA predicts that in 2025, 44% of all mobile
connections in Europe will be with 5G [16].
Securing 5G networks is crucial for the success of its adoption, especially for its
business users. The European Commission, therefore, endorsed the EU 5G toolbox
in 2020 [17], the toolbox outlines mitigation measures to address the security risk
related to the 5G networks.
In network evolution and the 5G rollout especially, the increased virtualization
of network elements is a growing trend [18]. This allows hardware and software
network resources to be maintained and configured by a single software-based
administrative entity called virtual network [19]. This increases the operator’s
flexibility and reduces costs as no physical changes to the network are required
in case of network reconfiguration (See also Network Slicing and Multi-access edge
35 5G 217
Since the start of the 5G rollout in 2019, the installation of 5G capable equipment
in Switzerland has been fast-paced. As a result, the largest Swiss mobile operator
(Swisscom) already had a population coverage (i.e., “the percentage of inhabitants
living within range of a mobile-cellular signal” [22]) of 90% by the end of 2019 [23].
At the end of 2021, Swisscom had a population coverage of 98% while Sunrise
reached 96% of the population [15].
There is a small but vocal minority of the Swiss population that is very critical of
the 5G technologies and tries to block the construction of new 5G antennas [24] or
even destroys them [25]. On the other hand, the Swiss mobile operators warn that
with the blockage of new 5G antennas, the network capability will not be able to
keep up with the yearly increase in mobile data usage [26].
The largest vendors for 5G equipment are Ericsson, Nokia, Huawei and ZTE [27].
Multiple countries (US, Canada, UK) have banned the Chinese 5G vendors Huawei
and ZTE from supplying equipment for their countries’ 5G mobile network
infrastructure [28]. They cite security concerns for the ban. The Chinese government
dismisses these claims and argues that the ban is politically motivated.
Private Networks
These are 5G networks that are nonpublic and isolated from the public network.
Compared to Wi-Fi, they offer extended coverage and speed. Private 5G networks
are especially interesting for industrial applications [29] due to their low latency
(e.g., for IoT devices in a factory) [30]. Private networks offer privacy and greater
control since network operation can assign different priority levels for different
devices [31].
218 W. Lin
Network Slicing
This method allows multiple virtual networks to be defined on top of the physical
network. This allows mobile operators to tailor them to the needs of individual
customers. The GSMA (Global System for Mobile Communications, an industry
organization representing the worldwide mobile communications industry) esti-
mates that network slicing will generate a revenue of $300 billion by 2025 [32].
Network slicing is part of the 5G standard set by 3GPP [33].
Multi-Access Edge Computing (MEC)
MEC (sometimes known as mobile edge computing or mobile edge cloud) brings
cloud computing capacity close to the edge of the cellular network, i.e., closer
to the mobile device user. This results in lower latency and higher bandwidth
uninhibited by network congestion. This allows for novel real-time applications
(e.g., augmented reality headsets in construction sites). A standardization effort by
ETSI is in progress (European Telecommunications Standards Institute) [34].
Fixed Wireless
Mobile operators offer 5G router-based “fixed” access for stationary internet access
as an alternative to fixed line broadband [35]. This is needed mainly in rural areas
where the fixed broadband coverage might not be complete.
35.4 Conclusion
5G is a further development of the cellular network standard that allows for higher
bandwidth, throughput, and lower latency. The improved performance in 5G and the
addition to the network standard enable novel uses cases such as private networking
or MEC. Due to the increased reliance on mobile connectivity for business and
industrial customers, securing the mobile cellular network is indispensable. The 5G
network standard was designed to address security shortcomings of the previous
network standard (i.e., 2G/3G/4G) directly [36]. The only drawback is that most of
the new security features will not be available until the 5G network is fully deployed
(5G standalone (SA)), i.e., 5G end-to-end with 5G core and 5G antennas.
References
4. Caroline Frost. How 5G will banish awkward video conference calls when you’re out of
the office, and cut your commute time. [Link]
awkward-conference-calls-and-cut-commute-2019-8. Business Insider.
5. Ericsson. 5G for gaming. [Link] July 2021.
6. CSRC Content Editor. 5G - Glossary | CSRC. [Link]
7. Qualcomm. What is 5G | Everything You Need to Know About 5G. [Link]
com/5g/what-is-5g, September 2022.
8. 3GPP. 3GPP specification series: 38series. [Link]
August 2022.
9. 3GPP. Specification # 38.101-1. [Link]
[Link]?specificationId=3283, September 2022.
10. 3GPP. Specification # 38.101-2. [Link]
[Link]?specificationId=3284, September 2022.
11. Nokia. 5G spectrum bands explained — low, mid and high band. [Link]
networks/insights/spectrum-bands-5g-world/, September 2022.
12. Ericsson. Leveraging the potential of 5G millimeter wave. [Link]
en/reports-and-papers/further-insights/leveraging-the-potential-of-5g-millimeter-wave,
February 2021.
13. Gerrit Holtrup, William Lacube, Dimitri Percia David, Alain Mermoud, Gérôme Bovet, and
Vincent Lenders. 5G System Security Analysis, August 2021. arXiv:2108.08700 [cs].
14. Ericsson. Network coverage forecast – Mobility Report. [Link]
and-papers/mobility-report/dataforecasts/network-coverage, November 2020.
15. Federal Communications Commission ComCom. Mobile coverage. [Link]
[Link]/comcom/en/home/dokumentation/zahlen-und-fakten/mobilfunkmarkt/
[Link], August 2022.
16. GSMA. The Mobile Economy 2022. page 48, 2022.
17. European Commission. Commission endorses EU toolbox to secure 5G networks. [Link]
[Link]/commission/presscorner/detail/en/ip_20_123, September 2022. European Commis-
sion - European Commission.
18. Qualcomm. 5G network virtualization and interoperability: Why the time is now. [Link]
[Link]/news/onq/2020/10/5g-network-virtualization-and-interoperability-why-time-
now, September 2022.
19. Red Hat. What is network virtualization? [Link]
what-is-network-virtualization, September 2022.
20. Vuilleumier Philippe. 5G and Beyond: Security of future Mobile Infrastructures, October 2022.
21. Shuping Dang, Osama Amin, Basem Shihada, and Mohamed-Slim Alouini. What should 6G
be? Nature Electronics, 3(1):20–29, January 2020. Number: 1 Publisher: Nature Publishing
Group.
22. Proportion of population covered by at least 4G mobile network - Sustainable Development
Goals - United Nations Economic Commission for Europe. [Link]
Indicator?id=133, September 2022.
23. Interview with Urs Schaeppi on the 5g rollout. [Link]
12/[Link], September 2022.
24. 5G-Netz - Swisscom beklagt: 3000 Einsprachen gefährden Netzausbau. [Link]
news/wirtschaft/5g-netz-swisscom-beklagt-3000-einsprachen-gefaehrden-netzausbau, Octo-
ber 2021. Schweizer Radio und Fernsehen (SRF).
25. Anschlagsserie im Kanton Bern - Militanter Kampf gegen 5G: Die Attacken nehmen zu.
26. Sunrise-Chef im Interview – “Frau Sommaruga hätte sich mehr gegen Fake News engagieren
können”.
27. Claudia Eckert, Thomas Magedanz, Manfred Hauswirth, Martin Schell, Albert Heuberger,
Bernhard Niemann, Haya Shulman, and Michael Waidner. 5G-Netze und Sicherheit. page 11.
28. Annabelle Liang. Canada to ban China’s Huawei and ZTE from its 5G networks. May 2022.
BBC News.
220 W. Lin
29. Adnan Aijaz. Private 5G: The Future of Industrial Wireless. IEEE Industrial Electronics
Magazine, 14(4):136–145, December 2020. Conference Name: IEEE Industrial Electronics
Magazine.
30. Toby McClean. Council Post: Private 5G Networks Are On The Rise, Fueling The Industry
4.0 Drive. [Link]
are-on-the-rise-fueling-the-industry-40-drive/, September 2022. Forbes.
31. RedHat. What is private 5G? [Link]
5g, September 2022.
32. GSMA. Network Slicing Use Case Requirements. Technical report, September 2022.
33. Nokia. Network Slicing explained. [Link]
network-slicing-explained/, September 2022.
34. Sabine Dahmen-Lhuissier. ETSI - Multi-access Edge Computing - Standards for MEC. https://
[Link]/technologies/multi-access-edge-computing, August 2022. ETSI.
35. Jürg Müller. Mobilfunkstandard 5G droht ein lukratives Geschäft zu untergraben. June 2018.
Neue Zürcher Zeitung.
36. GSMA. Securing the 5G Era. [Link] Septem-
ber 2022. Security.
Open Access This chapter is licensed under the terms of the Creative Commons Attribution 4.0
International License ([Link] which permits use, sharing,
adaptation, distribution and reproduction in any medium or format, as long as you give appropriate
credit to the original author(s) and the source, provide a link to the Creative Commons license and
indicate if changes were made.
The images or other third party material in this chapter are included in the chapter’s Creative
Commons license, unless indicated otherwise in a credit line to the material. If material is not
included in the chapter’s Creative Commons license and your intended use is not permitted by
statutory regulation or exceeds the permitted use, you will need to obtain permission directly from
the copyright holder.
Chapter 36
Email Security
Emilia Nunes
36.1 Introduction
In 2020, approximately 306 billion emails were sent and received daily, and this
number is expected to rise to over 376 billion by 2025. A standard attack vector is
phishing, a type of social engineering where a fraudulent message is sent to trick
a person. Emails were not designed with cyber-attack protection in mind, making
them an attractive target for cybercriminals. 83% of companies have been attacked
by phishing, according to a study conducted in 2021. End-to-end encryption
(E2EE) or transport layer security (TLS) can be used to secure emails. E2EE
standards include Pretty Good Privacy (PGP) and Secure/Multipurpose Internet
Mail Exchange (S/MIME). The use of E2EE in email is still rare; many emails
are sent an as plain, unencrypted text. Nevertheless, the market for encrypted email
revenue has tripled from $0.5 billion to $1.5 billion from 2015 to 2020. Technical
developments in email security include cloud-based email services, artificial intelli-
gence, blockchain, multi-factor authentication, and security extensions.
36.2 Analysis
Ray Tomlinson sent the first email in 1971 [1]. Since then, the number of email
users has steadily increased. In 2020, approximately 306 billion emails were sent
and received worldwide every day, and this number is expected to increase to over
376 billion by 2025 [2]. A primary attack vector is phishing, a type of social
E. Nunes ()
Eraneos Switzerland AG, Zurich, Switzerland
e-mail: [Link]@[Link]
36.2.1 Definition
Email is usually used to refer to one of the following: (1) a means or system
for transmitting messages between computers on a network or (2) a message sent
and received electronically through an email system. Here, we focus on securing
the messages rather than the email system. Email messages can be secured using
cryptography. For example, end-to-end encryption (E2EE) could be used to protect
them in transit and at rest. In addition, transport Layer Security (TLS) [8] is used to
protect emails in transit between email servers and clients. TLS uses a combination
of asymmetric (see Chap. 3) and symmetric cryptography (see Chap. 2). Common
standards used for E2EE email encryption are:
• Pretty Good Privacy (PGP): One of the most widely used standards [9] is
OpenPGP, which provides message encryption and digital signatures as security
services (see Chap. 15). OpenPGP encryption software is an open standard that
employs a combination of asymmetric (see Chap. 3) and symmetric encryption
(see Chap. 2) [10].
• Secure/Multipurpose Internet Mail Exchange (S/MIME): Another widely used
standard is S/MIME, which is also based on asymmetric and symmetric encryp-
tion. The system provides authentication, message integrity (i.e., the message
was not modified during transmission), non-repudiation of origin (using digital
signatures), and data confidentiality (using encryption). The certification process
to verify the signatures is carried out by certified authorities [11].
36.2.2 Trends
End-to-end email encryption today is a rare, partial, and often perceived impractical
solution. So most emails are sent as plain, easy-to-read, unencrypted text [3, 12].
Nevertheless, over 2015–2020, encrypted email revenue tripled from $0.5 billion
to $1.5 billion [13]. Several factors drive growth, including an increase in fraud
36 Email Security 223
In 2021, Switzerland reported twice as many cyber incidents as the previous year.
The most frequent reports [18] came from emails sent by perpetrators masquerading
as law enforcement agencies. In recent years, more and more Swiss providers
have entered the market with solutions that enable automated email encryption
and signing, as email remains the most common means of communication in the
public and private sectors. For example, IncaMail (Swiss Post) [19], HIN Mail
(Health Info Net AG) [20], and SEPPmail (SEPPmail AG) [21] offer an integrated,
comprehensive solution for their clients. The Federal Department of Justice and
Police (FDJP) has recognized these solutions as secure delivery platforms in the
context of proceedings. Therefore, these solutions can be utilized following the
“ordinance concerning electronic communication in civil and criminal proceedings,
as well as school proceedings and competitions” [22, 23]. Lawyers, for example,
may receive court submissions or send court decisions in compliance with the law
(see Chap. 37).
In Switzerland, email security is also actively researched, although more as
part of fundamental research in cyber security (see Chap. 37). Protonmail is also
a remarkable Swiss success story in email security. Indeed this company brings a
service like no other to the table [24].
224 E. Nunes
A secure email security solution should include strong encryption and address
network vulnerabilities when purchased or built. Various solutions have now been
established on the market, including SEPPmail [21], IncaMail [19], and HIN [20],
which meet the legal requirements of the federal government and can be considered
to be easy to use [25]. These solutions may also be used to exchange messages
securely with communication partners that are not themselves subscribers to those
solutions.
36.4 Conclusion
According to trends, email security is moving towards scalable, faster, safer, and
more convenient solutions. As a result, system offerings that provide end-to-end
encryption and are more user-friendly are taking up an increasing amount of
the market. Since the email system was originally not designed to be secure,
considerable effort had to be made to ensure the security of emails. Nevertheless,
emails may never be as secure as newly designed solutions with solid end-to-end
encryption and robust architecture (see Chap. 37).
References
11. Internet Engineering Task Force and (IETF). Secure/Multipurpose Internet Mail Extensions
(S/MIME) Version 3.2 Message Specification. [Link]
January 2010.
12. Geoff Duncan. Here’s why your email is insecure and likely to stay that way. [Link]
[Link]/computing/can-email-ever-be-secure/, August 2013. digitaltrends.
13. Global e-mail encryption market 2015-2020. [Link]
worldwide-email-encryption-market-revenue/. Statista.
14. Raktim Dey, Sandip Roy, Rajesh Bose, and Debabrata Sarddar. ASSESSING COMMERCIAL
VIABILITY OF MIGRATING ON-PREMISE MAILING INFRASTRUCTURE TO CLOUD.
International Journal of Grid and Distributed Computing, 14:1–10, March 2021.
15. Justina Alexandra Sava. Cloud-based email security market size worldwide in 2020 and 2026.
Technical report, July 2022. Statista.
16. Jonathan Weinberg. The rise of phishing as a service (PhaaS) and how to tackle it. [Link]
[Link]/security/cyber-security/368284/what-is-phishing-as-a-service-phaas, June 2022.
17. MIT Technology Review. Preparing for AI-enabled cyberattacks. [Link]
[Link]/2021/04/08/1021696/preparing-for-ai-enabled-cyberattacks/.
18. Nationales Zentrum für Cybersicherheit NCSC. Halbjahresbericht 2021/II (Juli – Dezember).
Technical report.
19. Die Schweizerische Post. IncaMail – sending sensitive information. [Link]
business-solutions/e-mail-encryption, August 2022. Swiss Post.
20. Health Info Net AG (HIN). HIN Mail: So versenden Sie sichere E-Mails. [Link]
services/hin-mail/, April 2020.
21. SEPPmail AG. SEPPmail - Secure E-Mail Communication. [Link]
August 2022.
22. Philipp Bachmann. Sichere E-Mail-Kommunikation im E-Government. October 2021.
23. Verordnung über die elektronische Übermittlung im Rahmen von Zivil- und Strafprozessen
sowie von Schuldbetreibungs- und Konkursverfahren. [Link]
2010/413/de, January 2011.
24. Professor Kumkum Saxena, Dev Rajdev, Divesh Bhatia, and Manav Bahl. ProtonMail:
Advance Encryption and Security. In 2021 International Conference on Communication
information and Computing Technology (ICCICT), pages 1–6, June 2021.
25. Stefan Klein. SEPPmail – Nummer 1 für die sichere E-Mail-Kommunikation. September 2021.
Computerworld.
Open Access This chapter is licensed under the terms of the Creative Commons Attribution 4.0
International License ([Link] which permits use, sharing,
adaptation, distribution and reproduction in any medium or format, as long as you give appropriate
credit to the original author(s) and the source, provide a link to the Creative Commons license and
indicate if changes were made.
The images or other third party material in this chapter are included in the chapter’s Creative
Commons license, unless indicated otherwise in a credit line to the material. If material is not
included in the chapter’s Creative Commons license and your intended use is not permitted by
statutory regulation or exceeds the permitted use, you will need to obtain permission directly from
the copyright holder.
Chapter 37
Secure Messaging
Emilia Nunes
37.1 Introduction
In today’s digital world, instant messaging and social networking have become
ubiquitous. The widespread use of these communication channels, especially in the
workplace, has raised security concerns for individuals and organizations. Secure
messaging refers to protecting and safeguarding communication infrastructure,
such as emails, messaging apps, and instant messaging platforms, through various
security mechanisms like end-to-end encryption (E2EE). E2EE uses encryption
and decryption keys to ensure the privacy of messages and the authenticity of the
sender and recipient. With the increasing number of mobile messaging users, the
need for secure messaging systems is rising. Technological advancements, such as
cloud-based and blockchain-based platforms, drive growth in the secure messaging
market. However, risks like phishing and cyberattacks remain persistent and are
projected to continue targeting messages in the future.
37.2 Analysis
37.2.1 Definition
E. Nunes ()
Eraneos Switzerland AG, Zurich, Switzerland
e-mail: [Link]@[Link]
infrastructure [1]. Among the communication channels are emails, messaging apps,
and social networking platforms for instant messaging (e.g., WhatsApp). Access to
these channels is possible from various systems, such as mobile phones and com-
puter messaging applications. In addition to preventing cyberattacks, appropriate
security mechanisms can also enhance confidentiality (i.e., only intended recipients
can view messages) and authenticity (i.e., verifying the identity of senders and
recipients) [2].
E2EE (end-to-end encryption) can be used to secure messages while transferring
them from one system or device to another. E2EE is intended to secure communi-
cation in a way that prevents third parties from accessing information. A message
in E2EE is encrypted on the system or device of the sender, and only the intended
recipient is permitted to decrypt it. The encryption and decryption keys are stored
on each endpoint of the communication system. To facilitate key management (see
Chap. 4), most systems make use of Public Key Cryptography (see Chap. 3).
37.2.2 Trends
It is anticipated that the number of mobile messaging users will increase from
2.9 billion users in 2020 to 3.5 billion in 2025 [3]. The increasing need for organiza-
tions to secure their messaging infrastructure is a key driver for growth, especially
as businesses increasingly use mobile messaging applications to communicate. A
list of key trends in the coming years is presented in Table 37.1.
In response to increased public attention, more and more solutions for secure
messaging have emerged. However, many of these solutions do not provide strong
and well-defined security features [7]. Many of the secure messaging solutions have
no answer to the problem of protecting the metadata [7].
230 E. Nunes
37.4 Conclusion
The demand for secure messaging solutions is growing, and the solutions are
becoming more convenient and secure. However, if solutions exist, choosing them
and implementing them in a efficient way remains a big challenge.
References
1. Justin Engler and Cara Marie. Secure Messaging for Normal People. Technical report, NCC
Group, August 2022.
2. Benjamin Dowling and Britta Hale. Secure Messaging Authentication against Active Man-in-
the-Middle Attacks. In 2021 IEEE European Symposium on Security and Privacy (EuroS&P),
pages 54–70, Vienna, Austria, September 2021. IEEE.
3. Mobile messaging users worldwide 2025. [Link]
of-mobile-messaging-users-worldwide/, August 2022. Statista.
4. Council Post: The CPaaS Industry Is In Hyper Growth: A Blueprint Of CPaaS And Its Future.
5. Session | Send Messages, Not Metadata. | Private Messenger. [Link] August
2022. Session.
6. Global Relay. Engineered Anonymity: How Blockchain is Disrupting Secure Messaging.
[Link] May 2022.
7. Nik Unger, Sergej Dechand, Joseph Bonneau, Sascha Fahl, Henning Perl, Ian Goldberg, and
Matthew Smith. SoK: Secure Messaging. In 2015 IEEE Symposium on Security and Privacy,
pages 232–249, May 2015. ISSN: 2375-1207.
8. NIST. Back to Basics: What’s multi-factor authentication - and why should
I care? [Link]
authentication-and-why-should-i-care, August 2022.
9. MIT Technology Review Insights. Preparing for AI-enabled cyberattacks. Technical report,
April 2021.
10. Expert Insights. What Does AI Mean For The Future Of Email Security? [Link]
com/insights/ai-and-the-future-of-cyber-security-for-business/#:~:text=AI%20is%20helping
%20businesses%20achieve,before%20it%20can%20take%20place, March 2022.
11. IBM. What is a cyberattack? [Link] August 2022.
12. Threema – Maximum Security Chat App. For Companies and Individuals.–Overview. https://
[Link]/en, December 2022.
13. Vulnerabilities in secure messenger Threema discovered. [Link]
spotlights/infk-news-channel/2023/01/[Link].
14. ZISC – Zurich Information Security and Privacy Center. [Link] August 2022.
15. Identity and Access Management (IAM). [Link]
identity-access-management-iam/, August 2022.
16. Center for Intelligent Systems (CIS). [Link] August 2022.
EPFL.
17. Security Research, IBM Research Europe Zurich. [Link]
August 2022.
37 Secure Messaging 231
Open Access This chapter is licensed under the terms of the Creative Commons Attribution 4.0
International License ([Link] which permits use, sharing,
adaptation, distribution and reproduction in any medium or format, as long as you give appropriate
credit to the original author(s) and the source, provide a link to the Creative Commons license and
indicate if changes were made.
The images or other third party material in this chapter are included in the chapter’s Creative
Commons license, unless indicated otherwise in a credit line to the material. If material is not
included in the chapter’s Creative Commons license and your intended use is not permitted by
statutory regulation or exceeds the permitted use, you will need to obtain permission directly from
the copyright holder.
Chapter 38
Secure Smartphone
38.1 Introduction
Secure smartphones highlight the privacy and data safety issues in off-the-shelf
smartphones and the need for secure smartphones to address these concerns. The
article focuses on several key features of secure smartphones, including trusted
hardware, secure boot, encryption, and mobile network. These features play a
critical role in ensuring the security of a smartphone and protecting users and
organizations against data leaks and cyberattacks. The section also briefly discusses
the challenges in implementing these features and the importance of using trusted
sources, dedicated encryption engines, and high-quality entropy sources to design
secure smartphones.
38.2 Analysis
Off-the-shelf (OTS) smartphones are known to present data safety and privacy
issues [1]. These devices often change location with their user and are notably
vulnerable to theft, malicious access points, or malware [2, 3]. To face these risks,
secure smartphones are being developed. They are designed to have increased
resistance against cyberattacks and to protect users and organizations against data
leaks while aiming to maintain the practicality of smartphones.
38.3 Definition
Secure boot is key to bringing a device into a certain operational state. It aims at
securing the consistency and integrity of the firmware and operating system (OS).
Would the device be compromised at this level, it would leave the whole system
vulnerable [9]. Implementation of secure boot takes advantage of a hardware root
of trust—the public key of a vendor. The public key is immutable—stored in ROM.
The boot process verifies the signature of loaded images against the vendor key.
Some vendors allow the use of user-supplied public keys during the later stages of
the boot process. The location of the storage of these keys is critical. In the ideal
case, the keys are stored in a dedicated module to prevent alteration. During the
secure boot, the device performs an additional security function called downgrade
check. In order to effectively preventing the downgrading of the operating system
to a version with known security exploits [10].
38 Secure Smartphone 235
38.3.3 Encryption
The ability to control the connection to the carrier network may protect from
connecting to unsafe, intrusive, or compromised service providers. However, most
off-the-shelve devices maintain some degree of connectivity with network providers
at all times and states as long as the battery lasts. Therefore, removing the phone’s
main antennas and replacing them with ones that can be physically connected
or disconnected (e.g., with a switch) might offer some protection from unwanted
connectivity. However, in general, this is insufficient to prevent all forms of wireless
communication as the phone might have components capable of sensing and sending
signals independently from this antenna (e.g., electromagnetic emissions from the
devices’ screen [14]). The difficulty of controlling connectivity is that support for
standard IPv4 and IPv6 protocol stack is usually built-in and ready for use with
all wireless and non-wireless network technologies like carrier networks, Wi-Fi,
Bluetooth, USB, or even Ethernet with the help of USB-Ethernet adapter.
236 Y. Donon et al.
Open source designates disclosing source code and permitting modification and
redistribution of source code [15]. Disclosing the source code is generally beneficial
for security since it makes it possible for any interested party to review the source
code for security problems. However, it is crucial that disclosure processes for vul-
nerabilities in open source are carefully designed to prevent leakage of information
around reported vulnerabilities since exploiting them might be more straightforward
than when the source code is not available [16]. It is important to note that providing
access to source code to some entities only is different from a healthy open source-
based security ecosystem. The complexity and cost of performing code reviews and
vulnerability analysis by a few entities are prohibitive, especially considering that
new software releases are provided and need to be reviewed frequently. A trend
that might increase trust in open source-based systems further is the introduction
of reproducible builds. With reproducible builds, independent third parties can
reconstruct all OS components and compare them (e.g., using their hashes (see
Chap. 5) with the images provided by a vendor. This can confirm that the code
published is indeed the one running on a device without compromising secure boot
integrity [17].
Mobile applications are software designed to run on mobile devices. They provide
functionality but are also a potential threat since they may contain vulnerabilities
and are usually provided by untrusted third parties. While some applications are
created to deceive users and gain access to information available on the phone,
others do this without trying to hide it. After all, many benign applications out there
collect information about the user as part of their business model [18]. Because of
this, special care has to be taken to limit access and capabilities of applications by
following a need-to-know and principle of least privilege approach. In practice, the
combination of the user and the operating system is often responsible for deciding
what an application is allowed to do. The operating system uses sandboxing tech-
niques and a permissions framework to restrict and control them [19]. However, the
user (or risk owner in the case of managed devices) decides whether the requested
access and capabilities are appropriate for a given application. Unsurprisingly,
breaches or unintended use of features are numerous [20].
38 Secure Smartphone 237
38.4 Trends
While convenient, bring your own device (BYOD) models put organizations at
increased risk of privacy and data security breaches from smartphones [27].
Malicious apps may access sensitive and private information. This includes but is
not limited to the phone number, calendar, contact list, usernames and passwords,
messages, the camera, the microphone, or GPS information [28]. Smartphones are
also regularly used in unsecured networks. As a result, users may inadvertently
download malicious software [29] or apps, even through official stores [30, 31]. In
addition, Advanced Persistent Threats have been able to breach security on multiple
occasions [2]. Such attacks are more sophisticated and targeted, often against large
corporations, governments, or the military. In this context, the secure smartphone
may become a necessity as it is a valuable tool to address the security risks in our
evolving workspace.
238 Y. Donon et al.
38.7 Conclusion
Smartphones are a use case that integrates numerous technologies described in this
book. Technologies like hardware security modules (see Chap. 16) or full-disk-
or file-based encryption (see Chap. 33) play an essential role in implementing or
securing the key components outlined in this article. Since those technologies are
not perfect, it is logical that smartphones also suffer from those imperfections. While
it is unrealistic to proactively protect ourselves from all the threats they may imply,
more secure smartphone options will become available. To what extent this privacy
and security are to be leveraged by each individual or organization, taking into
account operational needs, threat models, and the degree of convenience.
References
1. O. Ugus, D. Westhoff, and H. Rajasekaran. A leaky bucket called smartphone. pages 374–380,
2012.
2. Mahinderjit Singh M. Jabar T. Exploration of mobile device behavior for mitigating advanced
persistent threats (apt): A systematic literature review and conceptual framework. 2022.
3. Sandeep B. Vanjale, P. B. Mane, and Sandip V. Patil. Wireless lan intrusion detection and
prevention system for malicious access point. In 2015 2nd International Conference on
Computing for Sustainable Global Development (INDIACom), pages 487–490, 2015.
4. CSRC Content Editor. Hardening - Glossary | CSRC. [Link]
hardening.
5. Yier Jin. Introduction to hardware security. Electronics, 4(4):763–784, 2015.
6. Moritz Schneider, Ramya Jayaram Masti, Shweta Shinde, Srdjan Capkun, and Ronald Perez.
Sok: Hardware-supported trusted execution environments. arXiv preprint arXiv:2205.12742,
2022.
7. Nicolas Sklavos, Ricardo Chaves, Giorgio Di Natale, and Francesco Regazzoni. Hardware
security and trust. Cham, Switzerland: Springer, 2017.
8. David Kohlbrenner, Shweta Shinde, Dayeol Lee, Krste Asanovic, and Dawn Song. Building
open trusted execution environments. IEEE Security & Privacy, 18(5):47–56, 2020.
38 Secure Smartphone 239
9. Richard Wilkins and Brian Richardson. Uefi secure boot in modern computer security
solutions. In UEFI forum, pages 1–10, 2013.
10. Rashmi R.V. and Karthikeyan A. Secure boot of embedded applications - a review. In 2018
Second International Conference on Electronics, Communication and Aerospace Technology
(ICECA), pages 291–298, 2018.
11. GrapheneOS. Faq : Security and privacy. [Link] September
2022.
12. Apple Inc. Secure enclave. [Link]
sec59b0b31ff/1/web/1, September 2022.
13. Fatemeh Tehranipoor, Wei Yan, and John A. Chandy. Robust hardware true random number
generators using dram remanence effects. In 2016 IEEE International Symposium on Hardware
Oriented Security and Trust (HOST), pages 79–84, 2016.
14. Zhuoran Liu, Niels Samwel, Leo Weissbart, Zhengyu Zhao, Dirk Lauret, Lejla Batina, and
Martha A. Larson. Screen gleaning: A screen reading TEMPEST attack on mobile devices
exploiting an electromagnetic side channel. In 28th Annual Network and Distributed System
Security Symposium, NDSS 2021, virtually, February 21-25, 2021. The Internet Society, 2021.
15. Bruce Perens et al. The open source definition. Open sources: voices from the open source
revolution, 1:171–188, 1999.
16. Jaap-Henk Hoepman and Bart Jacobs. Increased security through open source. Communica-
tions of the ACM, 50, 02 2008.
17. Manuel Pöll and Michael Roland. Analyzing the Reproducibility of System Image Builds from
the Android Open Source Project. page 27.
18. Kim Doyle. Facebook, whatsapp and the commodification of affective labour. 2015.
19. Wenna Song, Jiang Ming, Lin Jiang, Yi Xiang, Xuanchen Pan, Jianming Fu, and Guojun
Peng. Towards transparent and stealthy android os sandboxing via customizable container-
based virtualization. New York, NY, USA, 2021. Association for Computing Machinery.
20. Wasiq Waqar, Yuanzhu Chen, Andrew Vardy, et al. Exploiting smartphone sensors for indoor
positioning: A survey. In Proceedings of the Newfoundland Conference on Electrical and
Computer Engineering, 2011.
21. Ali Balapour, Hamid Reza Nikkhah, and Rajiv Sabherwal. Mobile application security: Role of
perceived privacy as the predictor of security perceptions. International Journal of Information
Management, 52:102063, 2020.
22. JD Rudie, Zach Katz, Sam Kuhbander, and Suman Bhunia. Technical analysis of the nso
group’s pegasus spyware. In 2021 International Conference on Computational Science and
Computational Intelligence (CSCI), 2021.
23. Shinelle Hutchinson, Bing Zhou, and Umit Karabiyik. Are we really protected? an investiga-
tion into the play protect service. In 2019 IEEE International Conference on Big Data (Big
Data), 2019.
24. Rizaldi Wahaz, Rakha Nadhifa Harmana, Amiruddin Amiruddin, and Ardya Suryadinata. Is
whatsapp plus malicious? a review using static analysis. In 2021 6th International Workshop
on Big Data and Information Security (IWBIS), 2021.
25. Carolina Lituma and Teresa Guarda. Whatsapp in the judicial processes. In 2019 14th Iberian
Conference on Information Systems and Technologies (CISTI), 2019.
26. Vineet Kumar Kanhaiya Ramesh Kathoke, Pradeep Ravi. Mobile security market research,
2030. [Link] September 2022.
27. Wang P. Sbeit R.O. Ratchford, M. Byod security risks and mitigations. volume 558. Springer,
2018.
28. et al. Wang, Yuanda. Ghosttalk: Interactive attack on smartphone voice system through power
line. In The Network and Distributed System Security (NDSS) Symposium 2022, 2022.
29. Adrienne Porter Felt, Matthew Finifter, Erika Chin, Steve Hanna, and David Wagner. A survey
of mobile malware in the wild. New York, NY, USA, 2011. Association for Computing
Machinery.
240 Y. Donon et al.
30. Xuetao Wei, Lorenzo Gomez, Iulian Neamtiu, and Michalis Faloutsos. Malicious android
applications in the enterprise: What do they do and how do we fix it? In 2012 IEEE 28th
International Conference on Data Engineering Workshops, pages 251–254, 2012.
31. Nisreen Ameen, Ali Tarhini, Mahmood Hussain Shah, and Nnamdi O. Madichie. Employees’
behavioural intention to smartphone security: A gender-based, cross-national study. Computers
in Human Behavior, 104:106184, 2020.
Open Access This chapter is licensed under the terms of the Creative Commons Attribution 4.0
International License ([Link] which permits use, sharing,
adaptation, distribution and reproduction in any medium or format, as long as you give appropriate
credit to the original author(s) and the source, provide a link to the Creative Commons license and
indicate if changes were made.
The images or other third party material in this chapter are included in the chapter’s Creative
Commons license, unless indicated otherwise in a credit line to the material. If material is not
included in the chapter’s Creative Commons license and your intended use is not permitted by
statutory regulation or exceeds the permitted use, you will need to obtain permission directly from
the copyright holder.
Part VI
Analysis and Conclusion
Chapter 39
Scientometric and Wikipedia Pageview
Analysis
39.1 Introduction
This chapter explores trends in data protection and encryption technologies across
different technologies. The technologies analyzed are taken from the previous
chapters.
Any trend assessment concerning data protection and encryption technologies
constitutes a challenging task for various reasons. The swift development of the
security technologies brings a myriad of novel protocols, tools, and procedures,
whose technological readiness levels (TRL) also evolve rapidly [1]. Also, while
some technologies thrive, others stagnate or vanish in favour of more market-
adapted technologies or enhanced operational implementation [2]. Moreover, in
such a fast-paced and growing environment, opportunities and threats evolve
quickly, making it difficult to evaluate the whole spectrum of technologies available
on the market [3]. Consequently, evaluations of the security consequences of the
arrival and evolution of such technologies on data protection are complex.
Following the previous individual analysis of the data protection and encryption
technologies, we evaluate these technologies through time by benchmarking a
development indicator—the attention paid by different communities [4].
A. Glavackij · S. Ismail
Cyber-Defence Campus, Thun, Switzerland
e-mail: [Link]@[Link]; [Link]@[Link]
P. D. Dimitri ()
HES-SO Valais-Wallis, Sion, Switzerland
e-mail: [Link]@[Link]
39.2 Analysis
1 [Link]
39 Scientometric and Wikipedia Pageview Analysis 245
Table 39.1 Selected technologies of this book assorted into a two-dimensional matrix, created by
clustering the technologies by their past growth and interest in the research community
(a) (b)
(c)
Fig. 39.1 Number of monthly scientific works established between 2000 and 2022, taken from OpenAlex, for three samples from each growth pattern cluster.
The No Growth technologies in (a) have already achieved their peak of maximal interest, i.e., interest in those technologies is waning. For the Moderate Growth
technologies (b), growth has been slowing recently. If researchers do not discover new research areas in those fields, interest will decrease further, and these
technologies will shrink soon. The fast-growing technologies (c) are fairly recently established technologies and can be expected to be further developed. (a)
No growth. (b) Moderate growth. (c) Strong growth
A. Glavackij et al.
39 Scientometric and Wikipedia Pageview Analysis 247
Table 39.2 Technologies of this book assorted to a two-dimensional matrix created by clustering
the technologies by their past growth and public interest
of the last 3 months by the average pageviews of the last 3 months from 6 years
ago. We refer to the resulting ratio as growth ratio. If .growth ratio < 1.05, we
deem the technology as not growing. The technology exhibits moderate growth if
.1.05 < growth ratio < 2. The technology thrives if .2 <growth ratio. We also cluster
(a) (b)
(c)
Fig. 39.2 Number of monthly pageviews of Wikipedia between 2015 and 2022 for three samples from each growth pattern cluster. The No Growth technologies
in (a) are already at their peak of maximal interest, i.e., interest in those technologies is waning. For the Moderate Growth technologies (b), growth has been
slowing recently. If researchers do not discover new research areas in those fields, interest will decrease further, and these technologies are expected to shrink
soon. The fast-growing technologies (c) are fairly recently established technologies and can be expected to be further developed. (a) No growth. (b) Moderate
growth. (c) Strong growth
A. Glavackij et al.
39 Scientometric and Wikipedia Pageview Analysis 249
Fig. 39.3 Correlation between pageviews of technologies in Wikipedia from July 2015 to April
2022
In order to proceed to an exploratory data analysis and get an idea of the potential
existing relationships between these technologies, we display a correlation matrix
of Wikipedia’s monthly pageviews. However, these correlations can potentially
contain confounding factors and spurious relationships (as time series are not
stationary). Figure 39.4 shows positive or negative correlations between page views.
For instance, we notice that “Identity-based encryption” and “Searchable symmetric
encryption” highly correlate. On the other hand, “Quantum Key Distribution” has
no or a very weak correlation with all the other technologies.
The relationship between these proxies for the two types of attention diverges over
time. However, graphically, we observe that expert attention follows public attention
by a few months. For instance, in the case of Random Number generation, public
Asymmetric Encryption (Public key cryptography) Authentication Biometrics Blockchain Confidential Computing (Trusted Computing)
250
5.0
2.5
0.0
-2.5
-5.0
Differential privacy Digital rights management Digital signature Disk encryption Electronic voting
5.0
2.5
0.0
-2.5
-5.0
Functional encryption Hardware acceleration Hardware security module Hash function Homomorphic encryption
5.0
2.5
0.0
value
-2.5
-5.0
Identity management Key management Post-quantum cryptography Quantum cryptography Quantum key distribution
5.0
2.5
0.0
-2.5
-5.0
2016 2018 2020 2022 2016 2018 2020 2022
Random number generation Symmetric-key algorithm Zero-knowledge proof
5.0
2.5
0.0
-2.5
-5.0
2016 2018 2020 2022 2016 2018 2020 2022 2016 2018 2020 2022
date
Fig. 39.4 These plots compare public attention from Wikipedia page views (blue line) and expert attention from the number of publications on OpenAlex (red
line). We discard outliers, and the study period is from July 2015 to April 2022. Data is provided on a monthly frequency. The method used on the data is the
robust z-score with a scale from −5 to 5 to have a better view and eliminate large outliers
A. Glavackij et al.
39 Scientometric and Wikipedia Pageview Analysis 251
attention increased around 2019, while expert attention started to pick up 1 year
later.
39.3 Conclusion
References
1. Yu-Wei Chang and Jiahe Chen. What motivates customers to shop in smart shops? the impacts
of smart technology and technology readiness. Journal of Retailing and Consumer Services,
58:102325, 2021.
2. Bram Faber. A tale of three technologies: A survival analysis of municipal adoption of websites,
twitter, and youtube. Digital Government: Research and Practice, 2022.
3. Alessandro Merendino, Sally Dibb, Maureen Meadows, Lee Quinn, David Wilson, Lyndon
Simkin, and Ana Canhoto. Big data, big decisions: The impact of big data on board level
decision-making. Journal of Business Research, 93:67–78, 2018.
4. JooYoung Lee, Siqi Wu, Ali Mert Ertugrul, Yu-Ru Lin, and Lexing Xie. Whose advantage?
measuring attention dynamics across youtube and twitter on controversial topics. In Proceedings
of the International AAAI Conference on Web and Social Media, volume 16, pages 573–583,
2022.
5. Tugrul U Daim. Digital Transformation: Evaluating Emerging Technologies, volume 6. World
Scientific, 2020.
6. Zhihong Shen, Hao Ma, and Kuansan Wang. A web-scale system for scientific knowledge
exploration.
7. Yujia Yang, Shi Lu, Huan Zhao, and Xiaoqian Ju. Predicting monthly pageview of wikipedia
pages by neighbor pages. In Proceedings of the 2020 3rd International Conference on Big Data
Technologies, pages 112–115, 2020.
252 A. Glavackij et al.
Open Access This chapter is licensed under the terms of the Creative Commons Attribution 4.0
International License ([Link] which permits use, sharing,
adaptation, distribution and reproduction in any medium or format, as long as you give appropriate
credit to the original author(s) and the source, provide a link to the Creative Commons license and
indicate if changes were made.
The images or other third party material in this chapter are included in the chapter’s Creative
Commons license, unless indicated otherwise in a credit line to the material. If material is not
included in the chapter’s Creative Commons license and your intended use is not permitted by
statutory regulation or exceeds the permitted use, you will need to obtain permission directly from
the copyright holder.
Chapter 40
Trends in Open Source Software for Data
Protection and Encryption Technologies
40.1 Introduction
Software editors and practitioners have increasingly developed and used open-
source software tools to implement their cybersecurity strategies. By its unique
intellectual property regime, open-source software fosters transparency and sharing
values, which have been recognized as important to finding and fixing vulnerabilities
and quickly avoiding threats. By selecting 41 technologies related to the one
presented in the book, we show that open-source software for cybersecurity is a
rapidly growing complex ecosystem of 3456 GitHub repositories with .5000+ users.
While some repositories are prominent, many have evolved under the radar, serving
niche or emergent needs. Here, we provide the first account of trends in open-source
software for cybersecurity and develop a non-parametric forecasting approach to
provide an outlook of its development towards 2025.
Following Eric Raymond’s adage, “Given enough eyeballs, all bugs are shallow" [1],
key promises of open source software (OSS) have been transparency, task self-
selection, and peer-review [2]. In times of increasing economic, social, and political
challenges in cyberspace, securing full access to software code has become a
critical aspect of digital sovereignty [3]. Organizations face numerous dangers using
software they do not control, such as forced technology obsolescence, product
discontinuity, and cybersecurity risks. For organizations with short business cycles,
such risks are limited compared to the opportunity to use somewhat highly efficient
closed-source solutions. However, for critical infrastructures built over decades or
more, the risk of not having control over software or hardware code is serious.
For instance, the European Organization for Nuclear Research (CERN) has been
at the forefront of open-source software and open hardware strategy developments
precisely because their research infrastructures take more time to build and operate
than the expected lifespan of most technology providers [4].
OSS development, as a community of collective action [5], carries numerous
benefits associated with the power of collective intelligence [6, 7]. Those benefits are
highly desirable in many cyber-security applications (e.g., hunting vulnerabilities
through bug bounty programs) [8]. Moreover, given its short reaction overhead,
collective action appears to be a rational response to increasingly time-critical
cybersecurity challenges [9].
With an increasing need for transparency and the pressure to ensure continuously
reliable systems, OSS for cybersecurity is expected to keep developing as a
complement and an alternative to closed source.
GitHub was established in 2008 [10] as a social coding platform based on git
technology, a distributed software version control system initiated by Linus Torvalds
to efficiently track changes in software source code in the decentralized setting
compatible with Linux Kernel development [11]. Nowadays, GitHub has become
the primary online platform for collaborative OSS development. Here, we studied
GitHub repositories associated with data protection and encryption.1 We found that
the number of created repositories increases exponentially (c.f., Fig. 40.1).
The exponential growth of the repository creation rate is expected for data
protection and encryption, given that it is a relatively new GitHub platform. In
addition, as more OSS code accumulates, the marginal cost of repository creation
decreases. Indeed, previous software artifacts can be reused as a complex adaptive
network of package dependencies [12], git forks, or simply through code copy-paste.
1 We investigated 9003 GitHub repositories created since 2008 relating to the 41 data protection
and encryption technologies. We collected descriptive data for each repository (description,
keywords, [Link]) and creation date.
40 Trends in Open Source Software for Data Protection and Encryption Technologies 255
Fig. 40.1 (upper panel) Evolution of repository creations with a color-coded continuous measure
of inflection. Repository creation is best fitted by an exponential model (blue curve) with rate
.k = 1/τ = 0.88 (.p < 0.001 and .R = 0.88). (lower panel) inflection score captures the velocity
2
2 Text was processed for term frequency-inverse document frequency (tf-idf) word embedding and
reduced into a 2D Uniform Manifold Approximation and Projection for Dimension Reduction
(UMAP). Communities were detected using Louvain clustering.
256
Fig. 40.2 Natural language processing (NLP) embedding and clustering on repository description feature across the data protection and encryption
technologies covered in this book. As queried on the GitHub topic search, those categories differ significantly from description clusters generated using
NLP. Some categories robustly match specific clusters (e.g., RNG and blockchain), while others spread across several clusters (e.g., 0,1,2), thus being less
specific
L. G. Teijeiro and T. Maillart
40 Trends in Open Source Software for Data Protection and Encryption Technologies 257
Monitoring OSS repositories for data protection and encryption technologies is like
investigating a hidden giant finally emerging to the light of day: the number of
repositories being created has been growing exponentially until now. Some became
successful commercial products (e.g., Threema in Switzerland), others became
central components of Web security architectures (e.g., OpenSSL), while many
are still addressing niche needs. Notably, some of these niches will eventually turn
mainstream. Therefore, detecting and monitoring current and future repositories that
count, respectively will count, for cybersecurity is critical to identify and harness
development opportunities for data protection and encryption technologies, digital
sovereignty, and sound business.
Combining long-term exponential growth rates, inflection dynamics, and growth
density for each data protection and encryption category, we forecasted their
development until 2025. Figure 40.3 shows that forecast until 2025, combined with
their historic growth dynamics.3
Improving OSS monitoring for data protection and encryption is critical for Switzer-
land. As a small country with limited ability to see domestic tech giants emerge and
yet a reputation of safety and reliability, Switzerland’s researchers and entrepreneurs
have an edge in leveraging OSS ecosystems. One example is Threema, which
has built an authoritative secure messaging OSS app. In addition, having full
access to software code is crucial for the accountability of solutions provided by
the industry and hence, for the cybersecurity of critical infrastructures. Finally,
understanding and forecasting future trends in OSS cybersecurity ecosystems is key
to assessing and anticipating the evolution of critical data protection and encryption
technologies.
3 Specifically, we fitted and cross-penalized three TES models over creation date dynamics: density
Fig. 40.3 (left panel) Exponential growth rate of repository creation per technology. (middle panel) Evolution of inflection velocity on repository creations
over the history of categories. (right panel) Inflection velocity forecast until the end of 2024
L. G. Teijeiro and T. Maillart
40 Trends in Open Source Software for Data Protection and Encryption Technologies 259
References
1. Eric Raymond. The cathedral and the bazaar. Knowledge, Technology & Policy, 12(3):23–49,
September 1999.
2. Yochai Benkler. Coase’s Penguin, or, Linux and "The Nature of the Firm". The Yale Law
Journal, 112(3):369+, December 2002.
3. Julia Pohle and Thorsten Thiel. Digital sovereignty. Internet Policy Review, 9(4), December
2020.
4. Pietari Matti Veikko Kauttu. Open hardware as an experimental commercialization strategy:
challenges and potentialities | CERN IdeaSquare Journal of Experimental Innovation. July
2019.
5. Elinor Ostrom. Governing the Commons: The Evolution of Institutions for Collective Action
(Political Economy of Institutions and Decisions). Cambridge University Press, November
1990. Published: Paperback.
6. Didier Sornette, Thomas Maillart, and Giacomo Ghezzi. How Much Is the Whole Really More
than the Sum of Its Parts? 1 1 = 2.5: Superlinear Productivity in Collective Group Actions.
PLoS ONE, 9(8):e103023, August 2014.
7. Thomas Maillart and Didier Sornette. Aristotle vs. Ringelmann: On superlinear production in
open source software. Physica A: Statistical Mechanics and its Applications, 523:964–972,
June 2019.
8. Thomas Maillart, Mingyi Zhao, Jens Grossklags, and John Chuang. Given enough eyeballs,
all bugs are shallow? Revisiting Eric Raymond with bug bounty programs. Journal of
Cybersecurity, 3(2):81–90, June 2017.
9. Sébastien Gillard, Dimitri Percia David, Alain Mermoud, and Thomas Maillart. Effi-
cient Collective Action for Tackling Time-Critical Cybersecurity Threats, October 2022.
arXiv:2206.15055 [physics].
10. GitHub, October 2022. Page Version ID: 1115484009.
11. Git, October 2022. Page Version ID: 1116314204.
12. T. Maillart, D. Sornette, S. Spaeth, and G. von Krogh. Empirical Tests of Zipf’s Law
Mechanism in Open Source Linux Distribution. Physical Review Letters, 101(21):218701+,
2008.
Open Access This chapter is licensed under the terms of the Creative Commons Attribution 4.0
International License ([Link] which permits use, sharing,
adaptation, distribution and reproduction in any medium or format, as long as you give appropriate
credit to the original author(s) and the source, provide a link to the Creative Commons license and
indicate if changes were made.
The images or other third party material in this chapter are included in the chapter’s Creative
Commons license, unless indicated otherwise in a credit line to the material. If material is not
included in the chapter’s Creative Commons license and your intended use is not permitted by
statutory regulation or exceeds the permitted use, you will need to obtain permission directly from
the copyright holder.
Chapter 41
Conclusion
Valentin Mulder
41.1 Summary
The qualitative analysis performed in Chap. 39 has found that the technologies in the
field are either ready for use or will be ready soon, with no signs of being outdated.
The specialist also highlights the tremendous academic research opportunities in
Switzerland and the attractive economic prospects in this sector. On the other hand,
a quantitative analysis, which analyzed research through various metrics such as
publications, public attention, Wikipedia page views, open source software, and
GitHub repositories, supports the findings of the qualitative analysis, with only some
minor differences observed.
41.2 Limitation
The limitations of this study include the static nature of the information presented,
as the data and research used are limited to the time of conducting this research.
Therefore the results may not accurately reflect any changes or developments
in the field since it was completed. The challenges faced when defining and
accurately categorizing the data protection and encryption technologies discussed
were numerous. Finally, the field is constantly evolving, and new technologies may
emerge that require to be adequately addressed in the study.
These limits should be considered when interpreting the results and conclusions
investigated in this study. It is important to note that the projections and predictions
V. Mulder ()
Cyber-Defence Campus, Thun, Switzerland
e-mail: [Link]@[Link]
are based on the most relevant and available information. However, they may not
necessarily reflect the actual outcomes. The analysis and conclusions presented
are subject to change as the domain continues to evolve and new technologies are
explored and developed. In summary, this book delivered a snapshot of the current
state of data protection and encryption technologies in 2022, but it needs to be more
exhaustive and definitive.
41.3 Outlook
Conducting research and gathering more data will enhance the accuracy and
relevance of the findings.
It is also important to reevaluate the findings in 2025. The world of data protec-
tion and encryption technologies is constantly evolving, and new technologies and
developments may need to be adequately addressed. In addition, this reevaluation
will provide an opportunity to assess the accuracy of the predictions and projections.
This better understanding of these technologies will make updating or correcting the
final results necessary.
This study provides an expansive overview of data protection and encryption
technologies. There is still a lot to be discovered and understood. Therefore, the
following steps are future reevaluations of the results to provide a more complete
and accurate panorama of the trends and developments in data protection and
encryption technologies.
Open Access This chapter is licensed under the terms of the Creative Commons Attribution 4.0
International License ([Link] which permits use, sharing,
adaptation, distribution and reproduction in any medium or format, as long as you give appropriate
credit to the original author(s) and the source, provide a link to the Creative Commons license and
indicate if changes were made.
The images or other third party material in this chapter are included in the chapter’s Creative
Commons license, unless indicated otherwise in a credit line to the material. If material is not
included in the chapter’s Creative Commons license and your intended use is not permitted by
statutory regulation or exceeds the permitted use, you will need to obtain permission directly from
the copyright holder.
File-based encryption enhances smartphone security by using distinct encryption keys for different applications, which restricts unauthorized application access to files not related to it . This method provides granular security, enabling more precise control over which files can be accessed by certain applications, thereby protecting application-specific data more effectively than full-disc encryption alone . The use of trusted execution environments further isolates the encryption keys from the operating system, enhancing data protection at the application level .
The advancement of hardware components such as high-bandwidth HRNGs and low-cost FPGA-based versions, along with the competitive market of hardware security modules (HSMs), is decreasing costs and enhancing the security of PKI systems by ensuring better randomness in key generation and secure storage of keys . Moreover, key management systems tailored for personal use, employing smart cards and ubiquitous devices like smartphones, are foreseen to provide robust and cost-effective digital identity solutions . These developments aid in tackling key distribution challenges and revocation issues, while HSMs' decreasing costs may further drive down the expense of maintaining PKI security .
Randomized encryption in database systems improves security by ensuring that even identical data entries result in different encrypted outputs, thus complicating potential pattern recognition attacks . However, this security enhancement comes at the cost of search efficiency because randomized encryption prevents exact-match searches on encrypted data, which can degrade the performance of search operations . As a result, organizations need to balance the security benefits with the operational impact on search functionalities .
Asymmetric encryption enhances the security of symmetric keys by encrypting them with a public key, ensuring that only the holder of the corresponding private key can decrypt them . This dual-layer encryption system protects symmetric keys even if other components of the system become compromised because access to the private key is necessary to decrypt the symmetric key . Additionally, using asymmetric encryption allows more secure key distribution among multiple users, enhancing overall data security .
The strategic implementation of the Keyed-Hash Message Authentication Code (HMAC) is critical for ensuring message integrity by using a combination of a cryptographic hash function and a secret key . This mechanism provides a way to verify the authenticity and integrity of a message, ensuring that modifications during transmission are detectable . HMAC prevents attackers from altering messages without access to the secret key, thus maintaining secure communications in network protocols .
Smart card-based key management systems present significant potential for personal digital identities by offering a physical, secure element for storing cryptographic keys that can authenticate users in various applications . These systems integrate seamlessly with smartphones and ubiquitous devices, enabling scalable and cost-effective identity solutions that can be adopted widely among citizens, such as for national identity programs or secure online authentication . Future deployments will increasingly leverage these flexible systems, amplifying personal data protection while simplifying the digital identity process .
The increased complexity and cost of producing secure system-on-chip (SoC) hardware challenges manufacturers by limiting access to trustworthy foundries, thereby complicating the verification of secure hardware components . This scarcity raises issues of supply chain security, often forcing manufacturers to rely on less known sources, which might introduce vulnerabilities or compromised components . To mitigate these risks, the industry is exploring methods to review hardware or execute secure operations on untrusted hardware, but current capabilities are limited, posing substantial security concerns .
The rapid evolution of data protection technologies, characterized by swift development and diverse adaptation, presents significant challenges in identifying and evaluating security vulnerabilities . As new protocols and tools emerge, their readiness levels change quickly, making it difficult to maintain comprehensive assessments of potential security issues . These technologies' continuous changes often outpace the creation of analysis frameworks, leading to potential unknown vulnerabilities that could be exploited before they are formally recognized or addressed .
Secure boot implementations face challenges in maintaining firmware and OS integrity because any compromises can leave the entire system vulnerable . A hardware root of trust, typically an immutable public key stored in ROM, helps address these challenges by verifying the signatures of loaded images during the boot process, ensuring only trusted firmware is executed . This approach minimizes risks associated with software-based verification and offers a more controlled and secure environment for the initial stages of device operation, thereby safeguarding against potential downgrades and exploits .
Zero-knowledge proofs (ZKP) enable a prover to validate the accuracy of a claim to a verifier without disclosing any underlying sensitive information . In non-interactive ZKPs like zkSNARKs, one proof can be verified with a common reference value effectively, which replaces the verifier's random challenges in interactive ZKPs . These proofs maintain privacy while ensuring data authenticity, thus facilitating secure information exchange in sensitive contexts .