{"id":14529,"date":"2019-02-07T10:45:22","date_gmt":"2019-02-07T18:45:22","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/02\/07\/news-8279\/"},"modified":"2019-02-07T10:45:22","modified_gmt":"2019-02-07T18:45:22","slug":"news-8279","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2019\/02\/07\/news-8279\/","title":{"rendered":"Google&#8217;s Making It Easier to Encrypt Even Cheap Android Phones"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5c5b816c85a8a025a0fc4bef\/master\/pass\/Phone-Updates-534984232.jpg\"\/><\/p>\n<p><strong>Credit to Author: Lily Hay Newman| Date: Thu, 07 Feb 2019 17:00:00 +0000<\/strong><\/p>\n<p><span class=\"lede\">One of the <\/span>easiest ways to <a href=\"https:\/\/www.wired.com\/story\/smartphone-security-101\/\">protect your privacy and security on a smartphone<\/a> is to set a passcode or biometric lock <a href=\"https:\/\/www.wired.com\/story\/encrypt-all-of-the-things\/\">to enable disk encryption<\/a>. That way if your phone gets lost or stolen, no one can take data off the device in a readable form. But not all smartphones\u2014and tablets, and smartwatches, and so on\u2014offer that protection. They don\u2019t have the processing power to deal with resource-intensive encryption. So Google researchers have created a <a href=\"https:\/\/security.googleblog.com\/2019\/02\/introducing-adiantum-encryption-for.html\" target=\"_blank\">new encryption approach<\/a> that\u2019s faster and more efficient\u2014and aims to bring data encryption protections to billions of Android users around the world.<\/p>\n<p>The scheme, dubbed Adiantum, takes established cryptographic tools and principles that have been vetted by experts and implements them in a new, more efficient way. It aims to get full disk encryption running seamlessly on embedded devices without the latest and greatest hardware, giving users added security without slowing down apps or making the whole experience buggy.<\/p>\n<p class=\"paywall\">\u201cPrivacy really shouldn\u2019t be a luxury. It\u2019s something that all users for all products of all shapes and sizes should be able to have,\u201d says Dave Kleidermacher, who heads Android security. \u201cThere are many people for whom an expensive flagship phone is not an option, but to protect against an attacker or a thief getting access to your private information you have to encrypt that data.\u201d<\/p>\n<p class=\"paywall\">Since Android is open source and can be adapted for all sorts of devices, the Google researchers who worked on Adiantum say that they\u2019re excited to see where the approach ends up. Google has already released versions of Adiantum in the Android kernel and <a href=\"https:\/\/git.kernel.org\/pub\/scm\/linux\/kernel\/git\/torvalds\/linux.git\/commit\/?id=059c2a4d8e164dccc3078e49e7f286023b019a98\" target=\"_blank\">Linux kernel<\/a> (which Android is based on), plus a tailored version for ARM processors. All of which makes it easy to bake into not just phones but also a multitude of IoT devices that run versions of Android.<\/p>\n<p class=\"paywall\">Android has required that smartphones support storage encryption since Android 6 in 2015, but low-end devices have remained exempt because the demand would significantly impact performance. And while robust encryption for low-resource devices was a largely ignored problem for a long time, standards bodies like the National Institute of Standards and Technology have recently started to <a href=\"https:\/\/csrc.nist.gov\/projects\/lightweight-cryptography\" target=\"_blank\">take an interest<\/a> in codifying new strategies.<\/p>\n<p class=\"paywall\">It will be up to device manufacturers, though, to actually adopt Google&#x27;s solution. The encryption exemption for low-resource IoT devices will remain for now. And manufacturers who implement Adiantum will likely largely focus on new devices going forward, though it could potentially be possible to add it retroactively to existing devices.<\/p>\n<p class=\"paywall\">Adiantum is inspired by the ubiquitous Advanced Encryption Standard but is designed to reimagine some of AES\u2019s labor-intensive aspects. Phone chips that can handle AES encryption currently all have a dedicated coprocessor, or cryptographic accelerator, specifically there for encryption computations. To speed things up, Adiantum largely leans on a different, but still widely known and vetted, encryption algorithm called ChaCha12.<\/p>\n<p class=\"paywall\">Underneath the complicated technical details lie real gains; researchers say that Adiantum has proved to be about five times faster than Android&#x27;s standard AES-256 implementation.<\/p>\n<p class=\"paywall\">\u201cWe started work on this in late 2017 and published an initial paper in August,&quot; says Paul Crowley, a Google senior software engineer who led the development of Adiantum. &quot;We know a lot about how secure these algorithms like ChaCha and AES are. They&#x27;ve been around for decades; they\u2019ve had amazingly intense scrutiny. So we have a mathematical guarantee that if ChaCha is secure and AES is secure, then Adiantum is secure. We don\u2019t have the same sort of worries as if we were designing a new process ourselves.&quot;<\/p>\n<p>&quot;The composition uses a well-understood approach and standard building blocks.&quot;<\/p>\n<p name=\"inset-left\" class=\"inset-left-component__el\">Cryptographer Steve Weis<\/p>\n<p class=\"paywall\">Adiantum has gotten so far already because of Google&#x27;s reputation, influence, and reach, but the work will receive more intense scrutiny and vetting now that it was officially <a href=\"https:\/\/tosc.iacr.org\/index.php\/ToSC\/article\/view\/7360\" target=\"_blank\">published<\/a> in a symmetric cryptology journal in December and will be presented at a major <a href=\"https:\/\/fse.iacr.org\/2019\/index.html\" target=\"_blank\">conference<\/a> in March. Initial reactions to the paper are largely positive, though.<\/p>\n<p class=\"paywall\">&quot;The Google engineers did not reinvent the wheel by creating new low-level algorithms but instead found an efficient way to combine established algorithms in order to address an engineering problem,&quot; says Jean-Philippe Aumasson, CEO of the Swiss IoT encryption company Teserakt AG. &quot;The design is solid, based on trusted components, and likely to adequately protect users of the products integrating this new algorithm.&quot;<\/p>\n<p class=\"paywall\">The Google researchers says that they are confident in Adiantum&#x27;s integrity, and they hope it will help call attention to the importance of storage encryption for IoT and other low-resource devices. In true Google fashion, they call Adiantum &quot;encryption for the next billion users.&quot;<\/p>\n<p class=\"paywall\">&quot;The composition uses a well-understood approach and standard building blocks,&quot; says Steve Weis, an applied cryptographer who formerly worked at Facebook and Google. &quot;I think after some battle testing, it will be a good, performant option.&quot;<\/p>\n<p class=\"related-cne-video-component__dek\">It\u2019s 2017! It\u2019s time to start using an encrypted messaging app. Why? Using end-to-end encryption means that no one can see what you\u2019re sharing back and forth.<\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/android-encryption-cheap-smartphones\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5c5b816c85a8a025a0fc4bef\/master\/pass\/Phone-Updates-534984232.jpg\"\/><\/p>\n<p><strong>Credit to Author: Lily Hay Newman| Date: Thu, 07 Feb 2019 17:00:00 +0000<\/strong><\/p>\n<p>Adiantum will help millions of low-end Android smartphones receive the same encryption protections as flagships. <\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714],"class_list":["post-14529","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/14529","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=14529"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/14529\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=14529"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=14529"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=14529"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}