Research
Security News
Threat Actor Exposes Playbook for Exploiting npm to Build Blockchain-Powered Botnets
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
private-box
Advanced tools
an unaddressed box, with a private note-to-self so the sender can remember who it was for.
an unaddressed box, with a private note-to-self so the sender can remember who it was for.
private_box(msg, nonce, recipient_pk, sender_sk, sender_key) => ciphertext
//then, the receiver can open it if they know the sender.
private_unbox(msg, nonce, sender_pk, recipient_sk) => plaintext
//OR, the sender can decrypt.
private_unbox2(msg, nonce, sender_sk, sender_key) => plaintext
In secure scuttlebutt, a potential receiver knows who posted a message, because it has a pk/signature. The envelope is marked with a from field, but there is no to field.
However, sometimes the sender needs to look at a message they sent. If there is no to field, the sender must encrypt a short message to themselves.
generate a onetime keypair, box a message to the receipient with it, and also box a message back to your self, including the onetime secret, so that you can reopen the message if necessary.
//two scalarmult + key_pair
//152 byte overhead
function private_box (msg, nonce, recipient_pk, sender_sk) {
var onetime = box_keypair()
return concat([
nonce, //24 bytes
onetime.publicKey, //32 bytes
box_easy( //32+32+16 = 80 bytes
concat([recipient_pk, onetime.secretKey]),
onetime.publicKey,
sender_sk
),
//msg.length + 16 bytes
box_easy(msg, nonce, recipient_pk, onetime.secretKey)
]
}
this design generates a new key pair on ever write, and then uses two scalarmult operations. there are 152 bytes of overhead.
One interesting benefit is that you could have a oneway write, where the author forgets the onetime secret key, so the box can only be opened by it's recipient.
We have to keep track of another secret key (it could be derived from the private key, though)
function private_box (msg, nonce, recipient_pk, sender_sk, sender_key) {
return concat([
nonce, //24 bytes
secretbox_easy(recipient_pk, nonce, sender_key), //32+16=40 bytes
box_easy(msg, nonce, recipient_pk, sender_sk) //msg.length + 16
])
}
Only 80 bytes overhead (just over half as much) and only one scalarmult. This will be a more performant encrypt operation, but decrypt will be only slightly better.
This construction could be used to store encrypted messages for yourself, by "sending them" to a onetime key.
Also, it would mean that sender_key
is
you could have a box that only the recipient can open.
function oneway_box (msg, nonce, recipient_pk) {
var onetime = keypair()
return concat([
nonce,
onetime.publicKey,
box_easy(msg, nonce, recipient_pk, onetime.secretKey)
])
}
This would have the interesting property that the message
could not be opened by the sender (once they have deleted
onetime.secretKey
)
This doesn't seem very useful for a database.
maybe, a way to generalize this would be to have multiple recipients?
function multibox (msg, nonce, recipients, sender_sk) {
var key = random(32)
return concat([
nonce, //24 bytes
//1 byte
new Buffer([recipients.length & 255]), //MAX 1 byte!
//recipients.length * 16+32
recipients.map(function (r_pk) {
return box(key, nonce, r_pk, sender_sk)
}),
//msg.length + 16
secretbox_easy(msg, nonce, key)
])
}
So, to use this model, you would normally make the first recipient your self. This would support messages to N recipients, and also support one way messages, or messages to yourself.
To decrypt, you would take scalarmult(your_sk, sender_pk)
and then use that to unbox recipients until you get a valid
mac. This could be pretty fast, because there would be only one
curve op, and then the rest is symmetric crypto.
The properties might get a bit cleaner
function multibox2 (msg, nonce, recipients) {
var key = random(32)
//MAX 16 recipients
var _key = concat([new Buffer([(recipients.length-1) && 15]), key)
var onetime = box_keypair()
return concat([
nonce, //24 bytes
onetime.publicKey, //32 bytes
//recipients.length * 16+33
recipients.map(function (r_pk) {
return box(_key, nonce, r_pk, onetime.secretKey)
}),
//msg.length + 16
secretbox_easy(msg, nonce, key)
])
}
An interesting property of this is that the recipient identities are forward secure (though, since I am assuming that the sender encrypts this message back to themself, whoever has their private key can read the message, and those id's are likely written in the message)
Note, here that the recipient length field is encrypted to each recipient! If the number of recipients is not hidden, and I send a group message to a weird number, then someone hits "reply-all" it would suggest it was a reply. By hiding the number of "to" addresses, the messages will be very private.
They will be more expensive to calculate, but since an secretbox_open
attempt is actually very cheap (about 50 make 1 scalarmult
op)
so if you have 1 asym operation, then doing less than say, 50
unboxes won't matter much.
see sodiumperf tests
So this wouldn't be very much slower than any of the above algorithms, but it would be more private, even though it supports multiple recipients. Also, since the encrypted message has a one-off key, you could reveal the key to one message... if you needed to prove someone was harassing you, for example. Or, if you wanted to implement moderated groups, you could post a message to the moderator who would then reveal the key for that message to the group.
Decrypt might look like this:
function multibox2_open (ctxt, sk) {
var nonce = ctxt.slice(0, 24)
var onetime_pk = ctxt.slice(24, 24+32)
var my_key = scalarmult(sk, onetime_pk)
//try a bunch of keys
var _key, start = 24+32, keysize = 16+1+32
for(var i = 0; i < 8 || !key; i++) {
var s = start+(keysize*i), e = s + keysize
_key = secretbox_easy_open(ctxt.slice(s, e), nonce, my_key)
}
if(!key) return //message not addressed to us
var length = key[0]
var rest = ctxt.slice(start + keysize*length, ctxt.length)
return secretbox_easy_open(rest, nonce, key.slice(1, 33))
}
Often we want to communicate not just with individuals, but with groups. Although if more actors know the secret, then it's less secure.
I can see two ways this could work,
an author delegates a read cap (key) to selected peers, and then posts messages that holders of that key can read. The dynamic here is similar to facebook - if I add you as my friend then you can read my posts.
When a peer is decrypting messages, they will try the keys on each message received from that author. In most cases, a given actor will create a handful of groups (friends, family, work, hobby group, etc) and any other peer is probably only a member of one or two of those.
The cost of this would be groups_added*max_groups
,
the max number of groups a message should be broadcast to
should probably be very small, like 2 or 3, then if
A adds B to 3 groups, B will only need to attempt 9 unboxings
to read a message.
In othercases, there are groups of people who do not personally know each other form around a common interest. Facebook groups work like this.
In this situation, it could be quite complicated to know what groups a given actor is in. For example, A creates group G, then adds B, who adds C. C then posts a message to group G. suppose that A sees C's message before she hears from A that C is now a member of G. Either A dosen't know to try G_key on C's message, or A just tries every group key on every message A sees.
As long as A is not a member of more than a few groups, this is not too much of a problem. But, if there are two types of groups, then G that could be many groups to check. Probably the simplest way to mitigate this is prevent cross posting, allow only one shared group per message, then only check for group keys on the first slot!
MIT
FAQs
encrypt a message to a secret number of recipients
The npm package private-box receives a total of 236 weekly downloads. As such, private-box popularity was classified as not popular.
We found that private-box demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
Security News
NVD’s backlog surpasses 20,000 CVEs as analysis slows and NIST announces new system updates to address ongoing delays.
Security News
Research
A malicious npm package disguised as a WhatsApp client is exploiting authentication flows with a remote kill switch to exfiltrate data and destroy files.