Securing sensitive data.

If I steal your web server how secure is all that encrypted data on the drive? The answer is usually "not at all". That's because the all-too-common method for encryption in web applications also stores the decryption key, unsecured, on the same server. Get the server, get the key. Get the key, get the data. It's that simple. The argument in favor of this method says that the key has to be there for the server to encrypt the data. Perhaps it's a coincidence that it's also a lot easier, and, speaking from personal experience, programmers are lazy by nature.

So that begs the question, "Is there a way that would keep the data secure even if the attacker has full access to the server?" Yes - and it's not new. It's just harder than the one-key-fits-all method. You have to blend one-key (Symmetric) encryption with two-key (Public Key) encryption.

Encryption:
  1. random 256-bit AES key generated - 128-bit is plenty strong enough, but hey, why not?
  2. random key used to encrypt the data
  3. RSA Public Key is used to encrypt the Random Key
  4. both the encrypted data and the encrypted key are stored in the database.

Decryption:
  1. login pass-phrase is strengthened into a 256-bit AES key
  2. strengthened key is used to decrypt that user's RSA Private Key
  3. RSA Private Key is used to decrypt the AES (Random) Key
  4. AES Key is used to decrypt the data.

Note that although the encryption key is stored on the server, it is encrypted and, more importantly, cannot be decrypted using anything on the server.

Since the whole decryption phase is kicked off with the user's login pass-phrase, an attacker would have to have that in addition to the encrypted data in order to get anywhere.


Most new PHP installations have everything you need:

If you're collecting sensitive information on your wesite (or websites that you've developed), you should be securing it properly. If you are not, or are not sure, give us a call. Let us discuss with you how Dialogs can empower you to securely work the web.

Recent Articles

Buy vs. Build
Business process software has never been more accessible.

How Secure is Secure?
Using two factor authentication is a critical step in protecting data.

What's to Love About Responsive Design?
It’s not about making it fit. It’s about making it right.

(i)Beacons are Your Business
Big Brother is not watching, but he would like to meet you.

The Mind of a Developer
Don't be scared! Take a peek inside.

Work Apps That Work
Software should make your life easier, not harder.

Put On Your Glasses
It's important now or it's not important.

The Story of Stone Soup with a New Twist
Announcing a new grant program from Dialogs.

The Mind of a Strategist
This is your invitation to learn how I see things.

I Know What I’m Doing! Don’t Confuse Me with Facts!
Allowing experts to question your assumptions often results in good advice.

Our customers say it best

Dialogs keeps our site in line with my expectations and those of my managers - making us all very happy.

Nicki N.