[Infowarrior] - Make Digital Data Self-Destruct

Richard Forno rforno at infowarrior.org
Fri Aug 21 00:14:09 UTC 2009


(Paper being presented @ USENIX -  http://vanish.cs.washington.edu/research.html)


  New Technology to Make Digital Data Self-Destruct

By JOHN MARKOFF
Published: July 20, 2009
http://www.nytimes.com/2009/07/21/science/21crypto.html?_r=1
A group of computer scientists at the University of Washington has  
developed a way to make electronic messages “self destruct” after a  
certain period of time, like messages in sand lost to the surf. The  
researchers said they think the new software, called Vanish, which  
requires encrypting messages, will be needed more and more as personal  
and business information is stored not on personal computers, but on  
centralized machines, or servers. In the term of the moment this is  
called cloud computing, and the cloud consists of the data — including  
e-mail and Web-based documents and calendars — stored on numerous  
servers.

The idea of developing technology to make digital data disappear after  
a specified period of time is not new. A number of services that  
perform this function exist on the World Wide Web, and some electronic  
devices like FLASH memory chips have added this capability for  
protecting stored data by automatically erasing it after a specified  
period of time.

But the researchers said they had struck upon a unique approach that  
relies on “shattering” an encryption key that is held by neither party  
in an e-mail exchange but is widely scattered across a peer-to-peer  
file sharing system.

Public key cryptography makes it possible for two parties who have  
never physically met to share a digital secret and as a result engage  
in a secure electronic conversation sheltered from potential  
eavesdroppers. The technology is at the heart of most modern  
electronic commerce systems.

Vanish uses a key-based encryption system in a different way, making  
it possible for a decrypted message to be automatically re-encrypted  
at a specified point in the future without fear that a third party  
will be able to gain access to the key needed to read the message.

The pieces of the key, small numbers, tend to “erode” over time as  
they gradually fall out of use. To make keys erode, or timeout, Vanish  
takes advantage of the structure of a peer-to-peer file system. Such  
networks are based on millions of personal computers whose Internet  
addresses change as they come and go from the network. This would make  
it exceedingly difficult for an eavesdropper or spy to reassemble the  
pieces of the key because the key is never held in a single location.  
The Vanish technology is applicable to more than just e-mail or other  
electronic messages. Tadayoshi Kohno, a University of Washington  
assistant professor who is one of Vanish’s designers, said Vanish  
makes it possible to control the “lifetime” of any type of data stored  
in the cloud, including information on Facebook, Google documents or  
blogs. In addition to Mr. Kohno, the authors of the paper, "Vanish:  
Increasing Data Privacy with Self-Destructing Data," include Roxana  
Geambasu, Amit A. Levy and Henry M. Levy.

The potential value of such technology was brought into stark relief  
last week when a computer hacker stole data belonging to the social  
media company Twitter and e-mailed it to Web publishing companies in  
the United States and France.

The significance of the advance is that the Vanish “trust model” does  
not depend on the integrity of third parties, as other systems do. The  
researchers cite an incident in which a commercial provider of  
encrypted e-mail services revealed the contents of digital  
communication when served with a subpoena by a Canadian law  
enforcement agency.

The researchers acknowledged that there are unexplored legal issues  
surrounding the use of their technology. For example, certain laws  
require that corporations archive e-mails and make them accessible.

The researchers have developed a prototype of the Vanish system based  
on a plug-in module for the Mozilla Firefox Web browser. Using the  
system requires that both parties of the communication have a copy of  
the module, which is one of the limits of the technology. Mr. Kohno  
said that he did not envision Vanish being used for all  
communications, but only for sensitive ones.


More information about the Infowarrior mailing list