Family Encyclopedia >> Electronics

How secure is your stolen encrypted data?

Chances are some of your data has been stolen. Have you ever used Yahoo? 3 billion Yahoo accounts were seized in 2013. Visiting a Marriott hotel? 500 million Marriott accounts were stolen four years, 2014 – 2018. Did you somehow manage to hang on to your old Hotmail address and your edgy teenage spirit? 360 million MySpace accounts hacked. Use MyFitnessPal? 150 million accounts.

So what exactly did the hackers get? Every hack is different, but they almost certainly obtained your email address, user information, records of your site activity, and possibly much more damaging stuff. Good news though:a lot of the most sensitive data was probably encrypted. There's also a good chance he wasn't encrypted, but let's take the best data theft scenario:your information was stolen, but the sensitive stuff was encrypted with AES-256. Is it safe?

What does data encryption mean?

How secure is your stolen encrypted data?

The short answer is yes:encryption can be cracked. A brute force approach, which is basically making lots and lots of guesses until you're proven to be right, would certainly find the right answer, given enough time and computing power. Given our current capabilities, brute forcing AES-256 could take up to 3 sexdecillion (3×10 51 ) years, and similar numbers could be associated with many widely used encryption algorithms. In the future, quantum computers and other advancements may significantly reduce the security of encryption, but until then it is effectively impenetrable.

But that doesn't make encryption foolproof. Attackers are well aware that encrypted data is useless without keys, so what are they going after? The keys. The most catastrophic data breach possible is one in which encrypted data and decryption keys are stolen. If data security is properly implemented, the keys (multiple keys for different data, probably per user) will be stored securely in a separate location from the data and should probably be encrypted themselves. Additionally, the keys will need to be decrypted and retrieved securely whenever certain data needs to be decrypted, so that attackers cannot intercept it. On top of all that, the keys should probably be changed regularly.

If the site your information was stolen from did all of this, the attackers probably didn't catch the keys and your data is safe until the sun goes out or we invent much more powerful computers. . But how likely are the sites to actually do this, and how much of your data is encrypted, even in the best-case scenario?

Who encrypts and what is encrypted?

How secure is your stolen encrypted data?

Remember that list of data breaches at the start of this article? Let's check them again.

Breach An Affected Records Encrypted Not encrypted Yahoo2013/20143 billion– Hashed passwords (mostly bcrypt, some MD5)
– Some security questions– Names
– Email addresses
– Phone numbers
– Dates birthMarriott2014-20183 to 500 million– 8.6 million credit card numbers
– 20.3 million passport numbers– Names
– Addresses
– Dates of birth
– Gender
– Loyalty program data
– Booking information
– 5.25 million passport numbersMy space2016400 millionPasswords (SHA-1, no salting)– Addresses mail
– UsernamesMyFitnessPal2018150 millionPasswords (bcrypt, salted and SHA-1)– Usernames
– Email addresses
– Passwords

This list can get very, very long, but you get the idea:basically, the only thing that's encrypted on most sites is your password (which is actually hashed) and payment information. Unless it's a site that deals with a lot of sensitive information or has something high security, your data breach likely exposed a good chunk of your PII (personally identifiable information). This is mainly because encrypting and decrypting things takes a lot more computing power, time, effort and money than just storing them in plain text and serving them directly to you.

Even the encrypted elements of these hacks were not always safe. Yahoo and MyFitnessPal used bcrypt for their passwords, which is a strong encryption standard, but they also used MD-5 and SHA-1 respectively, mainly for older accounts. These are much weaker hashing algorithms. MySpace just used unsalted SHA-1 for everything, which makes sense, but also means your password has almost definitely been leaked. Yahoo also didn't say if they salted their passwords in 2013 (they probably didn't), which makes them quite vulnerable to hacking.

Marriott even lost 5.25 million plaintext passport numbers, which is not good. They clearly knew they would have to put a number on them (20 million others were, after all), but let 20% of their customers down. They also encrypted credit card numbers:but are not sure if the hackers got the key or not.

The moral of the story:most of your data is not encrypted, even what you really think should be.

But my data was encrypted

That's right, so you were using a website with fantastic security that encrypted every last bit of your information. These do exist – many file storage sites (Dropbox, Google Drive) will encrypt your files in their database, for example. If so, as long as their key storage game was solid and their security experts did a good job with the developers, chances are your data will remain intact until the device thermally dies. universe.

The more likely scenario, however, is that much of your information has not been encrypted, and even sensitive information may have been improperly hashed or encrypted with the key somewhere in the database or in the system. of files. There's not much you can do about this, as you need to provide companies with your data to use their services, but you can try to keep it to a minimum – and don't reuse passwords !

And don't forget to check HaveIBeenPwned to see if your data has come up in breaches.

Image Credits:Public Key Encryption Keys, Data Security Breach, Orange Blue Public Key Cryptography