by andrewbarba on 6/7/22, 1:09 PM with 67 comments
by SkyPuncher on 6/7/22, 2:50 PM
"In use" implies that you have a need to process that data. It doesn't matter if the end client is submitting queries in plain text (protected in transit) or this fancy encryption, the client (or server) still needs to be authorized to query that data. Translating from plain-text to encryption does not add additional protections from a compliance perspective.
by dandraper on 6/7/22, 3:18 PM
CipherStash works with any Database and also supports Range queries and sorting/ordering. We do it in the application layer. Only supports Ruby so far but C#, Java, Python, Rust are in the works.
by throwaway2016a on 6/7/22, 5:27 PM
It says it will support prefix search, substring search, and the like. Can anyone point me in the right direction on what the algorithm may be here? I don't get how you could do those things without making the encryption less secure and/or decrypting every record the fly.
Another interesting use case I found that isn't mentioned here is sort. I've had customers ask me to be able to sort the results by PII and we tell them... no, we can't do that because the field is encrypted.
by bincyber on 6/7/22, 10:40 PM
[0]: https://en.wikipedia.org/wiki/Column_Level_Encryption
[1]: https://github.com/bincyber/go-sqlcrypter
[2]: https://www.vaultproject.io/docs/secrets/transit#convergent-...
by eknkc on 6/7/22, 2:43 PM
by GTP on 6/7/22, 4:40 PM
Unfortunately I don't seem too be able to find this again, but a quick search turned out two papers that say that just encrypting your db isn't enough: [0], [1]. In particualr [1] doesn't seem to go into the details of how you could recover the data, but mentions that many operations as performed by "normal" databases leak information if performed over encrypted data. Maybe someone that is more familiar with Queryable Encryption can comment on this?
[0] https://www.cs.cornell.edu/~shmat/shmat_hotos17.pdf [1] https://www.microsoft.com/en-us/research/wp-content/uploads/...
by winrid on 6/8/22, 6:44 AM
(their pagination is implemented just by increasing the limit parameter).
by api on 6/7/22, 3:00 PM
by rafaelturk on 6/7/22, 2:32 PM
by bawolff on 6/8/22, 3:32 AM
So let me get this right - its encrypted but you cansearch prefix and suffix?
So all the attacker has to do is do it one letter at a time, see if it starts with A, B, C, once they figure that out, go to the next letter and so on. (I presume that the DB is not supposed to be trusted since they make such a big fuss about only being decryptable on the client side)
Also there doesn't seem to be a whitepaper detailing algorithms or their threat model. Bitcoin scams try harder then this.
by Redsquare on 6/7/22, 4:28 PM
by claudiug on 6/7/22, 2:42 PM
by uberdru on 6/7/22, 2:44 PM