Be a crypto hero in the market by logging in

Don't you have an account? Sign in

Token price

  • BTC

    8,707,569.0KRW

    -0.7%

  • ETH

    174,972.9KRW

    -0.5%

  • XRP

    266.7KRW

    0.2%

  • USDT

    1,230.8KRW

    3.1%

  • BCH

    249,481.8KRW

    0.3%

  • LTC

    54,759.1KRW

    -0.5%

  • EOS

    3,144.0KRW

    -0.7%

  • BNB

    17,901.2KRW

    -1.0%

  • BSV

    114,759.5KRW

    -0.2%

  • XLM

    64.8KRW

    0.4%

  • XTZ

    1,839.8KRW

    5.7%

  • ADA

    44.2KRW

    0.2%

  • TRX

    17.0KRW

    -0.2%

  • XMR

    64,100.2KRW

    -0.1%

  • HT

    3,279.5KRW

    0.6%

  • NEO

    10,335.4KRW

    -0.3%

  • MKR

    590,393.4KRW

    -2.0%

  • USDC

    1,202.7KRW

    0.7%

  • DASH

    60,449.1KRW

    -0.3%

  • ETC

    4,553.0KRW

    1.1%

  • ONT

    721.3KRW

    0.6%

  • VET

    7.6KRW

    -1.0%

  • XEM

    42.8KRW

    2.4%

  • DOGE

    2.7KRW

    0.6%

  • BAT

    213.2KRW

    -0.7%

  • ZEC

    37,377.0KRW

    3.9%

  • PAX

    1,203.7KRW

    0.7%

  • DCR

    23,875.3KRW

    1.7%

  • INB

    629.2KRW

    -0.2%

  • QTUM

    2,098.8KRW

    1.6%

  • TUSD

    1,202.2KRW

    0.8%

  • LINK

    485.1KRW

    2.0%

  • ZRX

    267.9KRW

    -0.4%

  • RVN

    31.1KRW

    2.4%

  • REP

    12,258.1KRW

    1.4%

  • NANO

    976.2KRW

    2.9%

  • CNX

    2,291.0KRW

    -0.0%

  • OMG

    882.6KRW

    0.3%

  • XIN

    258,807.1KRW

    0.5%

  • XIN

    258,807.1KRW

    0.5%

  • BTG

    6,867.6KRW

    -0.2%

  • DGB

    7.8KRW

    0.4%

  • LSK

    785.2KRW

    -1.0%

  • KCS

    1,132.2KRW

    0.1%

  • BTM

    90.6KRW

    -0.4%

  • BTM

    90.6KRW

    -0.4%

  • KMD

    712.5KRW

    -0.9%

  • XVG

    5.1KRW

    2.0%

  • BCD

    440.7KRW

    0.4%

  • THETA

    94.0KRW

    -0.4%

  • MCO

    5,000.2KRW

    0.5%

  • ICX

    152.7KRW

    -0.6%

  • ENJ

    98.6KRW

    12.5%

  • IOST

    6.4KRW

    -1.5%

  • SC

    1.7KRW

    0.1%

  • MONA

    1,059.3KRW

    -0.7%

  • WAVES

    677.3KRW

    4.8%

  • ZIL

    6.9KRW

    -1.2%

  • BCN

    0.4KRW

    0.1%

  • DAI

    1,198.2KRW

    -0.0%

  • NEXO

    113.5KRW

    -1.1%

  • QNT

    5,232.9KRW

    -5.2%

  • BTS

    23.0KRW

    -2.5%

  • HC

    1,414.7KRW

    -0.9%

  • MAID

    134.2KRW

    0.1%

  • STEEM

    159.5KRW

    2.7%

  • AE

    185.3KRW

    -1.4%

  • ARDR

    54.5KRW

    -2.0%

  • ETN

    4.4KRW

    -2.3%

  • SNT

    12.3KRW

    -2.4%

  • NPXS

    0.2KRW

    -0.2%

  • GNT

    40.9KRW

    -1.8%

  • ELF

    69.7KRW

    -0.8%

  • AOA

    5.6KRW

    -0.8%

  • XZC

    3,988.9KRW

    -3.3%

  • STRAT

    336.0KRW

    -0.3%

  • ELA

    1,870.2KRW

    1.4%

  • PPT

    578.2KRW

    1.6%

  • FCT

    3,345.5KRW

    -4.5%

  • AION

    71.5KRW

    2.4%

  • LRC

    28.3KRW

    -0.6%

  • WTC

    598.7KRW

    2.0%

  • R

    49.7KRW

    0.8%

  • ARK

    204.1KRW

    -3.7%

  • WAX

    23.5KRW

    2.1%

  • LOOM

    21.8KRW

    -2.5%

  • MOAC

    328.2KRW

    -0.2%

  • RDD

    0.7KRW

    -8.4%

  • POWR

    46.5KRW

    0.2%

  • BNT

    311.0KRW

    0.1%

  • PAI

    13.4KRW

    -0.5%

  • PAI

    13.4KRW

    -0.5%

  • ANT

    596.1KRW

    -2.2%

  • DENT

    0.2KRW

    -1.9%

  • ODE

    70.4KRW

    0.6%

  • POLY

    32.9KRW

    1.6%

  • CET

    16.5KRW

    -1.3%

  • PIVX

    253.1KRW

    -0.4%

  • TTC

    30.0KRW

    -3.8%

  • PAY

    64.7KRW

    -1.6%

  • MBL

    2.3KRW

    6.8%

  • BAAS

    1.8KRW

    -0.2%

  • REPO

    70.8KRW

    0.6%

  • EOSC

    6.9KRW

    -4.2%

  • BORA

    8.9KRW

    3.3%

  • CPT

    1.9KRW

    1.2%

  • APIX

    0.6KRW

    -1.7%

  • GUSD

    1,191.5KRW

    0.1%

  • FNB

    3.7KRW

    -1.0%

  • COSM

    6.7KRW

    -0.2%

  • HUM

    8.3KRW

    -2.6%

  • AERGO

    37.2KRW

    -0.5%

  • FLETA

    9.1KRW

    -0.7%

  • UPP

    11.1KRW

    -2.8%

  • MVL

    0.4KRW

    -2.4%

  • RBG

    1.2KRW

    -11.2%

  • VRA

    0.9KRW

    -6.7%

  • DCC

    0.9KRW

    0.1%

  • LKY

    51.1KRW

    0.1%

  • eDEL

    2.4KRW

    -0.7%

  • MEETONE

    1.0KRW

    -0.1%

  • TEMCO

    0.6KRW

    -3.8%

  • ABL

    6.7KRW

    11.0%

  • AMON

    2.4KRW

    -2.6%

  • AKRO

    1.6KRW

    -2.0%

  • AID

    2.3KRW

    0.0%

  • WET

    5.7KRW

    2.2%

  • PXL

    22.3KRW

    8.3%

  • CLB

    1.5KRW

    -3.7%

  • HORUS

    0.7KRW

    7.8%

  • KARMA

    0.1KRW

    0.3%

  • PTON

    0.0KRW

    -33.6%

  • SEAL

    1.0KRW

    31.3%

  • XRA

    4.9KRW

    -0.5%

  • RBTC

    8,542,659.8KRW

    0.0%

  • WIKEN

    1.7KRW

    -17.3%

  • NEWS

    1.2KRW

    1.4%

  • PUB

    0.2KRW

    4.9%

  • NPER

    3.5KRW

    0.1%

  • CCH

    0.1KRW

    -25.0%

  • PUT

    1.4KRW

    23.7%

  • KNT

    0.0KRW

    37.2%

  • IQ

    3.0KRW

    -6.2%

  • BLACK

    0.6KRW

    -7.2%

  • RCD

    3.0KRW

    --%

  • MCC

    4.1KRW

    96.7%

  • INC

    0.2KRW

    -1.8%

  • BZKY

    0.1KRW

    0.1%

  • CRE

    1.8KRW

    -0.6%

Community

The New Age of (Self) Encryption

MaidSafeCoin | 04.09| 271

Photo by Matt Antonioli on Unsplash

Data breaches happen daily around the globe and third parties either have no legal duty, or worse, just don’t care about making sure your data is securely encrypted. Here at MaidSafe, our core values are privacy and security and as a result, these principles are central in how we design and build the SAFE Network. And self-encryption is no different.

First things first, what is self-encryption?

It is a version of convergent encryption with an additional obfuscation step….what?!

Let’s take a few steps back. If we remove the prefix ’self’ for the moment, you have encryption — a way of concealing information using a mathematical approach to obfuscate, so that only those intended to see the files can gain access. Sounds good right?

This is already a common practice by cloud-based solutions such as Dropbox. They encrypt all data in transit using Secure Sockets Layer (SSL)/Transport Layer Security (TLS) between Dropbox apps and its servers. Once it reaches Dropbox servers, it is then encrypted with 256-bit AES, which is an industry recognised standard and (almost) impossible to crack without the encryption key.

So you might be thinking, “surely these solutions already encrypt my data so why do I need anything else?”. However they don’t provide client-side encryption which means you, the client, encrypts the file before it leaves your computer (although with Dropbox you can add your own encryption) they, the third party, manage the encryption keys along with your data. There are a couple of issues with this. First, the way data is stored on some cloud solutions means that your files are decrypted as soon as you log in. Why is this a problem, surely this makes the user experience more seamless as you don’t need to take any extra steps? The problem arises if someone has access to your password. They can access your files — the encryption is now pointless and doesn’t offer you any protection.

However, a second more sinister issue is Man in the Cloud attacks. Here, a hacker doesn’t need your passwords. They simply access your computer, steal the synchronization tokens which are provided by the company to identify you as a user, and then place them on different computers. Because these cloud solutions cannot identify if the token is being used on another machine, this will go unseen. Therefore the hacker will then not only have access to the documents but also control your entire drive. Yikes!!

And last but not least, anyone who grants a third party responsibility for managing the safety and security of your data is troublesome, and we don’t need to tell you why.

So we earlier mentioned that Self-encryption is a version of convergent encryption, which is also known as a content hash keying which creates identical ciphertext from an identical plaintext file. It contains some applications in cloud computing to eliminate all duplicate files from storage services, without a provider needing to have access to encryption keys.

Self-encryption is something new because it has no keys. A file is encrypted using its own contents as keys for encryption. After encryption, a Data Map is generated and this Data Map is used for decryption. And why is this so important? Because crucially, it ensures that all of your private data stored on the Network is unrecognisable and only those with the correct credentials and the relevant Data Map can fetch the chunks, decrypt them and put them together. And even if an encryption algorithm is compromised, a hacker won’t be able to decipher the data. Cool huh?!

Let’s Take An Example

Right so how does this work? Things are always easier with an example, so let’s say Bob has a Word doc he’d like to store on the Network. The Network takes this file and divides this up into a minimum of three chunks; Chunk 1, Chunk 2, Chunk 3. From this, the system creates a Data Map. A Data Map lays out the pre and post encryption details and the location of each chunk to enable Bob to retrieve his files whenever he likes. And, the Data Map can be run through the self-encryption process too.

So once each chunk has been hashed and documented on the Data Map it goes through the encryption process. To do this, the Network encrypts using the algorithm AES 256 encryption protocol and hashes each chunk. And this is where the additional obfuscation step comes in. So the hash of C1 is encrypted with the hash of C2, C2 is encrypted using the hash of C3 and C3 is encrypted using the hash of C1. To further obfuscate the data, every chunk is passed through an XOR function using the hashes of other chunks. So C1 would be XOR’ed with the hash of C2, and C3. And the hash of C2 would be encrypted with the XOR of C3 and C1 and…you’ve probably worked out how C3 would be encrypted. The output is then documented on the Data Map, which also can be run through the Self-encryption process.

All this happens on Bob’s computer so that his data is already encrypted before it hits the Network and only Bob with his Data Map can access and decrypt his file. And this happened instantaneously, with no disruption to how Bob would normally store a file.

If Bob had bigger files (for example a file full of photography), this would automatically split into chunks and distributed autonomously across the decentralised network. This means larger data files are not stored in one central place, adding another level of security.

So there we have it. Self — encryption, the way the SAFE Network will solve issues with existing encryption solutions, based on trusted cryptography and a way for you to truly take control of your data.

If you are new to SAFE and are interested in understanding more about what we’re doing to make the world a better place, join us on the Forum.


The New Age of (Self) Encryption was originally published in safenetwork on Medium, where people are continuing the conversation by highlighting and responding to this story.

Comment 0

delete

Are you sure you want to delete this post?