secure storage in the cloud using property preserving encryption · 2017. 7. 18. · secure storage...

48
Secure storage in the cloud using property preserving encryption Kenny Paterson Information Security Group

Upload: others

Post on 21-Jan-2021

4 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Secure storage in the cloud using property preserving encryption · 2017. 7. 18. · Secure storage in the cloud using property preserving encryption Kenny Paterson Information Security

SecurestorageinthecloudusingpropertypreservingencryptionKennyPaterson

InformationSecurityGroup

Page 2: Secure storage in the cloud using property preserving encryption · 2017. 7. 18. · Secure storage in the cloud using property preserving encryption Kenny Paterson Information Security

Overview

1.  Applicationscenarios.2.  Deterministicencryptionandsearch.

3.  OPE/OREandrangequeries.

4.  Analysingaccesspatternleakagefromrangequeries.

2

Page 3: Secure storage in the cloud using property preserving encryption · 2017. 7. 18. · Secure storage in the cloud using property preserving encryption Kenny Paterson Information Security

Applicationscenarios

Page 4: Secure storage in the cloud using property preserving encryption · 2017. 7. 18. · Secure storage in the cloud using property preserving encryption Kenny Paterson Information Security

ApplicationScenarios

4

•  Dataownerswishtosecurelyoutsourcestoragetocloudproviderswhilstpreservingcapabilityforuserstoquerydatainvariousways.

•  Whatkindsofqueries?

•  Whatkindsofusers?

•  Whatkindsofdata?

•  Whatkindsofquery?

•  Whatkindsofadversary?

•  Meta:WhynotjustuseFHEandbedone?

Page 5: Secure storage in the cloud using property preserving encryption · 2017. 7. 18. · Secure storage in the cloud using property preserving encryption Kenny Paterson Information Security

Twoscenarios,onepicture

5

Page 6: Secure storage in the cloud using property preserving encryption · 2017. 7. 18. · Secure storage in the cloud using property preserving encryption Kenny Paterson Information Security

Scenario1:SearchableFileStorage

6

•  Ownerhaslargecollectionoffiles,indexedbykeywords.

•  Ownerencryptsfilesandstorestheseonremoteserver.

•  Ownerencodeskeywordsinsuchawaythatkeywordsearchescanstillbecarriedout.

•  Encodedkeywordsalsostoredonserver,asanencodedindex.

•  Ownersendssearchtokentoserver;serverusestokenandindextofindidentifiersformatchingfiles.

•  Matchingfileidentifiersarereturnedtoowner.

Page 7: Secure storage in the cloud using property preserving encryption · 2017. 7. 18. · Secure storage in the cloud using property preserving encryption Kenny Paterson Information Security

Scenario2:DatabaseEncryption

7

•  Dataownerhasalargedatabaseofrecords;eachrecordhasmultiplefields.

•  Ownerencryptsdataineachfieldinsuchawaythatstandarddatabasequeriescanstillbecarriedout.

•  Basic:simplesearches.-“Givemeallrecordsinwhichsurname=Dubois”.

•  Advanced:compoundsearches.•  Moreadvanced:rangequeries

-“Givemeallrecordswithagesbetween21and30”.•  Finally:arbitrarySQLqueries.*

*Otherdbquerylanguagesareavailable.

Page 8: Secure storage in the cloud using property preserving encryption · 2017. 7. 18. · Secure storage in the cloud using property preserving encryption Kenny Paterson Information Security

SearchableEncryption

8

SolutionforScenario1:SearchableEncryption.

•  Naïvescheme:ownerusesIND-CPAsymmetricencryptionforfilesandPRFK(kw)asencodingofkeywordkw.

•  Storeencryptedfilesandencodedkeywordsperfileonserver.

•  Ownersendstok=PRFK(kw)toserver;servermatchestokagainstencodedkeywords;returnsmatchingfiles.

•  Canuseaninvertedindexandfileidentifiers:serverstoresdatabaseoftuples(tok,(fid1,fid2,….)).

Page 9: Secure storage in the cloud using property preserving encryption · 2017. 7. 18. · Secure storage in the cloud using property preserving encryption Kenny Paterson Information Security

SecurityAnalysis

9

•  Adversarialobjectives?-  Keywordrecovery,recoveryoffilecontents,…?

•  Adversarialcapabilities?-  “Snapshot”,“Honest-but-curious”,“Fullymalicious”.-  Can/cannotobservequeries;can/cannotmakequeries;can/cannotinjectfiles.

•  Whataboutauxiliaryinformation?

-  Whatiftheadversaryhasarepresentativedatasampleorkeywordsample?•  Cashetal.(CCS15):detailedanalysisofdifferentattacksmodels,leakage

profiles,etc.againstSEschemesingeneral:LeakageAbuseAttacks.•  Fulleretal.(S&P17):SoKpaperoncryptographicallyprotecteddatabase

search.

Page 10: Secure storage in the cloud using property preserving encryption · 2017. 7. 18. · Secure storage in the cloud using property preserving encryption Kenny Paterson Information Security

Twoscenarios,onepicture

10

Page 11: Secure storage in the cloud using property preserving encryption · 2017. 7. 18. · Secure storage in the cloud using property preserving encryption Kenny Paterson Information Security

DeterministicEncryption

11

PartialsolutionforScenario2:DE

•  Simplestpossiblescheme:ownerusesdeterministicencryptionscheme(KGen,Enc,Dec)toencrypteachcolumnofthedatabaseusingaper-columnkeyK.

•  Servercanstoretheencrypteddataonserverinatraditionaldatabase.

•  Tofindmatcheswithvaluexinacolumn,sendsearchqueryfory=EncK(x)toserver.

•  Serverfindsmatchesonyandreturnsfullencryptedrecordstoclient.

•  Clientdecryptsreturnedrecordsusingpercolumnkeys.

•  UseofDEpreservesequalityofplaintextsandallowssimplesearches.

•  (VerysimilartonaïveSE,withPRFreplacedbyEnc/Dec).

Page 12: Secure storage in the cloud using property preserving encryption · 2017. 7. 18. · Secure storage in the cloud using property preserving encryption Kenny Paterson Information Security

PropertyPreserving/RevealingEncryption(PPE/PRE)

12

MoregeneralsolutionforScenario2:PPE/PRE

•  Generalisesideaof“equalitypreserving/revealing”propertyofDE.

•  Mainexample:OrderPreserving/RevealingEncrypion(OPE/ORE).

•  OPE:ifx<ythenEnc(x)<Enc(y).

•  ORE:thereexistsa(public)efficientlycomputablefunction“Order”suchthat: x<yiffOrder(Enc(x),Enc(y))=1

•  OPE/OREallowsrangequeries!

•  Clientwhowishestoqueryonrange[a,b]insteadsendsqueryforrange[Enc(a),Enc(b)]toserver.

Page 13: Secure storage in the cloud using property preserving encryption · 2017. 7. 18. · Secure storage in the cloud using property preserving encryption Kenny Paterson Information Security

AnalysisofDeterministicEncryption

Page 14: Secure storage in the cloud using property preserving encryption · 2017. 7. 18. · Secure storage in the cloud using property preserving encryption Kenny Paterson Information Security

14

Reminder:ECBinformationleakage

TuxthePenguin,theLinuxmascot.Createdin1996byLarryEwing

[email protected]

ECB-Tux

Page 15: Secure storage in the cloud using property preserving encryption · 2017. 7. 18. · Secure storage in the cloud using property preserving encryption Kenny Paterson Information Security

AnalysisofDeterministicEncryption

•  DEisequalitypreserving,bydesign.

•  DEthereforepreservesfrequenciesofplaintextsintheciphertexts,cf.monoalphabeticsubstitutioncipher.

•  Naveed-Kamara-Wright(CCS15):let’sapplyfrequencyanalysis!(al-Kindi,9thcentury.)

•  Assumption1:attackerhasauxiliaryinformation–areasonablyaccurateestimatefortheplaintextdistribution.

•  Assumption2:attackerhasasnapshotoftheencrypteddatabase.

15

Page 16: Secure storage in the cloud using property preserving encryption · 2017. 7. 18. · Secure storage in the cloud using property preserving encryption Kenny Paterson Information Security

AnalysisofDeterministicEncryption

16

Page 17: Secure storage in the cloud using property preserving encryption · 2017. 7. 18. · Secure storage in the cloud using property preserving encryption Kenny Paterson Information Security

FrequencyAnalysisisMaximumLikelihood!

•  Givenacolumnofciphertextsy,frequencyanalysismatches:-  Mostfrequentiteminywithmostfrequentiteminaux.dist.

-  Secondmostfrequentiteminywithsecondmostfrequentiteminaux.dist.

-  etc.•  Definesapermutationπmappingplaintextsxtociphertextsy.•  Thisprocedureismaximumlikelihood,thatis,itmaximisesthelikelihood L(π|y):=Pr(y|π).

•  Proof:funexercise,seealsoeprint2015/1158.17

Page 18: Secure storage in the cloud using property preserving encryption · 2017. 7. 18. · Secure storage in the cloud using property preserving encryption Kenny Paterson Information Security

PerformanceofFrequencyAnalysisAgainstDE

•  Naveed-Kamara-Wright[CCS15]performedanempiricalinvestigationoftheperformanceoffrequencyanalysisagainstDE.

•  Usingalargemedicaldataset:per-patientdatain12categoriesfor200largesthospitalsinthe2009NationwideInpatientSample(NIS),fromtheHealthcareCostandUtilizationProject(HCUP),runbytheUSAgencyforHealthcareResearchandQuality.

•  DEencryptdataperhospitalforeachcategory.•  Use2004aggregatedHCUPdataastheauxiliarydata.•  Runfrequencyanalysisandmeasurepercentageofdataitems

correctlyrecoveredperhospital.

18

Page 19: Secure storage in the cloud using property preserving encryption · 2017. 7. 18. · Secure storage in the cloud using property preserving encryption Kenny Paterson Information Security

PerformanceofFrequencyAnalysisAgainstDE

19

Page 20: Secure storage in the cloud using property preserving encryption · 2017. 7. 18. · Secure storage in the cloud using property preserving encryption Kenny Paterson Information Security

PerformanceofFrequencyAnalysisAgainstDE

20

Page 21: Secure storage in the cloud using property preserving encryption · 2017. 7. 18. · Secure storage in the cloud using property preserving encryption Kenny Paterson Information Security

PerformanceofFrequencyAnalysisAgainstDE

21

Page 22: Secure storage in the cloud using property preserving encryption · 2017. 7. 18. · Secure storage in the cloud using property preserving encryption Kenny Paterson Information Security

FrequencyAnalysisMakesHeadlines!

22

Page 23: Secure storage in the cloud using property preserving encryption · 2017. 7. 18. · Secure storage in the cloud using property preserving encryption Kenny Paterson Information Security

CombattingFrequencyAnalysis

•  Wewanttosmoothoutfrequencydistributionsothatfrequencyanalysisbecomesineffective.•  Performingworsethanrandomguessingofplaintext.

•  Wealsowanttopreserveabilitytoefficientlyperformsearchqueriesonastandarddatabase.•  Rulesoutfullyrandomised/IND-CPAsecureencryption.

•  Whataboutaddingalimitedamountofrandomness?

•  LeadstoideaofapplyinghomophonicencodingtoproduceFrequencySmoothingEncryption(FSE)schemes(Lacharité-Paterson,forthcoming).

23

Page 24: Secure storage in the cloud using property preserving encryption · 2017. 7. 18. · Secure storage in the cloud using property preserving encryption Kenny Paterson Information Security

pDE

e0

e1e2

e3

c1c3

c2

c0

HE

FrequencySmoothingEncryption–CombattingFrequencyAnalysis

24

Plaintext Encodings Ciphertext

•  HomophonicEncoding(HE)consumessmallamountofrandomness.

•  Makenumberofencodingsproportionaltofrequencyofpforgoodfrequencysmoothing.

•  DE=DeterministicEncryption.

•  Matchon{c1,c2,c3,c4}insteadofasingleciphertext.

•  Querycomplexityblow-upbymax.numberofencodingsinworstcase.

Page 25: Secure storage in the cloud using property preserving encryption · 2017. 7. 18. · Secure storage in the cloud using property preserving encryption Kenny Paterson Information Security

Interval-basedHomophonicEncoding(IBHE)

•  Encodingspace=r-bitstrings/interval[0,2r).

•  Representencodingsofphavingfrequencyfbyanintervalofsizeapproximatelyfx2r.

•  Selectuniformlyatrandomfromintervaltoencodep.

•  Needsanencodingtabletostoreanintervalforeachplaintextitem;|p|x2rbits.

•  Alsoneedsadecodingtablemappingbitsbacktoplaintexts.

25

0

p0 p1 p2 p3 ….

2r-1

Page 26: Secure storage in the cloud using property preserving encryption · 2017. 7. 18. · Secure storage in the cloud using property preserving encryption Kenny Paterson Information Security

EffectivenessofFSEfromIBHE+DE

•  Canprovethatasrgoesto∞,nodistinguishercantellapartciphertextsfromuniformlyrandomstrings.

•  Butevenformoderater,IBHE+DEsmoothswellforallbutveryskeweddata.

•  Rapidlylimits(generalised)frequencyanalysistobeingworsethanapureguessingattack.•  Suchanattackisalwayspossibleforlimiteddomainofplaintexts.

•  WeusedsameevaluationframeworkasNaveed-Kamara-Wright(CCS15).•  Exceptthatwegavetheadversarytheexact,per-hospital

distributionastheauxiliarydistribution!

26

Page 27: Secure storage in the cloud using property preserving encryption · 2017. 7. 18. · Secure storage in the cloud using property preserving encryption Kenny Paterson Information Security

EffectivenessofFSEfromIBHE+DE

27

Page 28: Secure storage in the cloud using property preserving encryption · 2017. 7. 18. · Secure storage in the cloud using property preserving encryption Kenny Paterson Information Security

EffectivenessofFSEfromIBHE+DE

28

Page 29: Secure storage in the cloud using property preserving encryption · 2017. 7. 18. · Secure storage in the cloud using property preserving encryption Kenny Paterson Information Security

EffectivenessofFSEfromIBHE+DE

• Warning:FSEonlyprotectsagainstabasicsnapshotattacker.

•  RecentworkofGrubbs-Ristenpart-Shmatikov(HotOS17)questionslegitimacyofsnapshotattackmodel.

•  Columnsaretreatedinisolation.

• Morepowerfuladversarycouldperformfrequencyanalysisonthesetsofresponsestoqueries.

•  Schemedoesnotprotectagainstanactiveattackerwhocaninjecthisownqueries.

29

Page 30: Secure storage in the cloud using property preserving encryption · 2017. 7. 18. · Secure storage in the cloud using property preserving encryption Kenny Paterson Information Security

AnalysisofOPE/ORE

Page 31: Secure storage in the cloud using property preserving encryption · 2017. 7. 18. · Secure storage in the cloud using property preserving encryption Kenny Paterson Information Security

OrderPreserving/RevealingEncryption

31

•  OPE:ifx<ythenEnc(x)<Enc(y).

•  ORE:thereexistsa(public)efficientlycomputablefunction“Order”suchthat: x<yiffOrder(Enc(x),Enc(y))=1

•  OPE/OREallowsrangequeries.

•  Clientwhowishestoqueryonrange[a,b]insteadsendsqueryforrange[Enc(a),Enc(b)]toserver.

Page 32: Secure storage in the cloud using property preserving encryption · 2017. 7. 18. · Secure storage in the cloud using property preserving encryption Kenny Paterson Information Security

OrderPreserving/RevealingEncryption

32

•  Q:IfDEleaksbadly,doesOPE/OREleakevenmore?

•  A:Often,yes.

•  Folklore:ifOPEschemeisdeterministicandplaintextdataisdense(everypossibleplaintextoccurs)thenasnapshotadversarycanlearnwhichplaintextiswhich.

•  Simplyordertheciphertextsandthenreadofftheplaintexts.

•  Take-away:bewareofformalsecuritymodelsforOPE/ORE.

•  Thiscansometimesbegeneralisedtothenon-densecase…

Page 33: Secure storage in the cloud using property preserving encryption · 2017. 7. 18. · Secure storage in the cloud using property preserving encryption Kenny Paterson Information Security

TheSchemeofChenette-Lewi-Weis-Wu(FSE16)

33

•  CLWW(FSE16)presentedacleverandpracticalOREschemebuiltusingonlyPRFs.

•  CLWWgaveaprecisecharacterisationofleakageinasimulation-basedsecuritymodel:

•  GiventwociphertextsEnc(x)andEnc(y),theschemeleaksexactlythefirstindexatwhichbitsofxandydiffer(andwhichisbigger).

•  Example:givenEnc(x=11012)andEnc(y=10012),theschemewouldleakthatthetwoplaintextsareequalinMSB(bit0)butthatthefirstonehas1inbit1andtheother0inbit1.

•  LeakageisgreaterthaninanidealOPEscheme,whichwouldleakonlyorder.

Page 34: Secure storage in the cloud using property preserving encryption · 2017. 7. 18. · Secure storage in the cloud using property preserving encryption Kenny Paterson Information Security

AnAttackontheCLWWScheme

34

•  Inthedensecase,thefolkloreanalysisapplies.•  Whataboutthenon-densecase?

•  Assumption1:snapshotattacker.

•  Assumption2:Nplaintexts,closetouniformlyrandomonthesMSBs,whereN>s2s.

Then,withhighprobability,theattackercanlearnthesmostsignificantbitsofeveryplaintext.

Page 35: Secure storage in the cloud using property preserving encryption · 2017. 7. 18. · Secure storage in the cloud using property preserving encryption Kenny Paterson Information Security

AnAttackontheCLWWScheme

35

•  Assumption1:snapshotattacker.

•  Assumption2:Nplaintexts,closetouniformlyrandomonthesMSBs,whereN>s2s.

•  Secondassumptionimpliesthat,withhighprobability,everypossibles-bitprefixoccursinatleastoneplaintext:

Prob≈1–2-s/2^(s+1).

•  UsetheCLWWscheme’sleakagetoordertheNciphertextsonthe2sdistincts-bitprefixes.

•  Nowreadoffthesmostsignificantbitsofeachplaintext.

Page 36: Secure storage in the cloud using property preserving encryption · 2017. 7. 18. · Secure storage in the cloud using property preserving encryption Kenny Paterson Information Security

ImplicationsoftheAttack

36

•  Supposeacompanyhas10,000employeeswithsalariesthatare20-bitnumbers(between$0and$220-1).

•  Wecansets=10(10x210≈10,000).

•  Attackyields10MSBsofeverysalary.

•  Thisisenoughtoidentifyeachsalaryuptoaccuracyof$1k.

•  Examplegeneralisesto,say,32-bitsalariesthatareallzerointhefirst12bitpositions.

•  Sufficientthatdatabedenseinsomepositions(andconstantinleadingpositions).

Page 37: Secure storage in the cloud using property preserving encryption · 2017. 7. 18. · Secure storage in the cloud using property preserving encryption Kenny Paterson Information Security

FurtherResearchonOPE/ORELeakage

37

Severalattackrecentpapersexaminethereal-worldimplicationsoftheleakageofOPE/OREschemesforsnapshotattackers:

•  Durak-DuBuisson-Cash(CCS16):attacksoncorrelatedcolumnsofOPE/ORE-encrypteddata,especiallylongitude/latitudedata.

•  Grubbs-Sekniqi-Bindschaedler-Naveed-Ristenpart(S&P17):revisitNaveed-Kamara-WrightforOPE/ORE;recastptxt/ctxtmatchingproblemasmin-weight,non-crossingbipartitematchingproblem,solveitefficientlyformanytypesofdata,reliesonauxiliarydistributions.

Page 38: Secure storage in the cloud using property preserving encryption · 2017. 7. 18. · Secure storage in the cloud using property preserving encryption Kenny Paterson Information Security

AccessPatternLeakageforRangeQueries

Page 39: Secure storage in the cloud using property preserving encryption · 2017. 7. 18. · Secure storage in the cloud using property preserving encryption Kenny Paterson Information Security

AnalysisofAccessPatternLeakageforRangeQueries

39

Kellaris-Kollios-Nissim-O’Neill(CCS16):analysisofaccesspatternleakageforSE;applicabletoOPE/OREschemestoo.

•  Honest-but-curiousattacksetting,strongerthansnapshotadversary.

•  Assumption:adversarycanseewhichdatabaserowsarereturnedinresponsetoanyrangequery.

•  ForN-valueddatabase,completereconstructioninO(N4)queries.

•  Fordensecase:O(N2logN)queriessuffice.

Page 40: Secure storage in the cloud using property preserving encryption · 2017. 7. 18. · Secure storage in the cloud using property preserving encryption Kenny Paterson Information Security

AnalysisofAccessPatternLeakageforRangeQueries

40

•  AdversaryinKKNO(CCS16)doesnotneedtodirectlyseetheactualrangesqueried.-  InOPE/ORE,adversarywouldseeonlyciphertextsEnc(x),Enc(y)

correspondingtorangeendpoints.

-  ButinOPE/OREsetting,andinsomeSEschemes*,therankalsoleaks.

-  Therankofaciphertextisitspositioninanorderedlistofalltheciphertexts.

*e.g.ArxschemeofPoddar-Boelter-PopaandFH-OPEschemeofKerschbaum.

Page 41: Secure storage in the cloud using property preserving encryption · 2017. 7. 18. · Secure storage in the cloud using property preserving encryption Kenny Paterson Information Security

ExploitingRankinAnalysisofAccessPatternLeakge

41

•  Canweusetherankleakagetoimproveattackcomplexity?

•  Lacharité-Minaud-Paterson(forthcoming):

•  Yes!•  Andmuchmorebesides…

Page 42: Secure storage in the cloud using property preserving encryption · 2017. 7. 18. · Secure storage in the cloud using property preserving encryption Kenny Paterson Information Security

ExploitingRankinAnalysisofAccessPatternLeakge

42

Simplemotivatingexample:considerrangequeries[a,b]inwhichaisuniformlyrandom.

•  Thenwithprobability1–1/N,after2NlogNqueries,allNpossiblevaluesforawillhavearisen.•  Followsfromstandardanalysisofthecouponcollectorproblem.

•  Easytoidentifyandorderdifferentavaluesbasedonrankleakage.

•  Allvaluesofainqueriesarenowknown.

•  PickoutNquerieswithdistinctvaluesofa;eachsuchqueryproducesasetofresponsesYa(recordsindatabase).

•  Thenthesetofrecordswithvalueais:Ya–Ui>aYi.

Page 43: Secure storage in the cloud using property preserving encryption · 2017. 7. 18. · Secure storage in the cloud using property preserving encryption Kenny Paterson Information Security

ExploitingRankinAnalysisofAccessPatternLeakge

43

Y0

Y1

Y2

0 1 2 N

….

a: N-1N-2

Y0–Ui>0Yi

Y1–Ui>1Yi

YN-1–YN

YN-2–Ui>1Yi

YN

Page 44: Secure storage in the cloud using property preserving encryption · 2017. 7. 18. · Secure storage in the cloud using property preserving encryption Kenny Paterson Information Security

ImprovedAnalysisofAccessPatternLeakge

44

•  Oursimpleexampleappearstoshowthatrankleakagehelpstheadversary.

•  Infact,wecandispensewithrankleakageandobtainanNlogN+O(N)attackinthegeneral“dense”case!

-  ImprovingonKKNO’sO(N2logN)attack.

•  Wealsoconsidertheproblemofapproximatereconstruction.

•  WecanefficientlyreconstructvaluesinrecordsuptoanabsoluteerrorofεNafterseeingonlyO(N)queries!

- Withaconstantof2log(1/ε).

Page 45: Secure storage in the cloud using property preserving encryption · 2017. 7. 18. · Secure storage in the cloud using property preserving encryption Kenny Paterson Information Security

ImprovedAnalysisofAccessPatternLeakge

45

Finally,westudyalgorithmsforapproximatereconstructionwiththeassistanceofrankandanauxiliarydistribution.

•  Significantreductioninnumberofqueriesrequiredforaccuratereconstruction.

•  Performsetintersectionsandthenmapbacktounderlyingdatausingrank+auxiliarydistribution.

•  ExperimentswithaggregatedHCUPdata…

Page 46: Secure storage in the cloud using property preserving encryption · 2017. 7. 18. · Secure storage in the cloud using property preserving encryption Kenny Paterson Information Security

ApproximateReconstructionwithAuxiliaryDistribution

46

Page 47: Secure storage in the cloud using property preserving encryption · 2017. 7. 18. · Secure storage in the cloud using property preserving encryption Kenny Paterson Information Security

ConcludingRemarks

Page 48: Secure storage in the cloud using property preserving encryption · 2017. 7. 18. · Secure storage in the cloud using property preserving encryption Kenny Paterson Information Security

ConcludingRemarks

•  UseDE/OPE/OREwithextremecareifatall.

• Wearecurrentlyinapropose/break/patchcycle.

•  Despitetheprovisionofsecuritymodelsandproofs.

•  Justidentifyingandprovingleakageisnotenough;weneedtoalsoidentifyreal-worldimplicationsofthatleakage.

•  DoesPPEprovideaddedsecurityorafalsesenseofsecurity?

48