Research
Security News
Threat Actor Exposes Playbook for Exploiting npm to Build Blockchain-Powered Botnets
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
private-box
Advanced tools
A format for encrypting a private message to many parties.
private-box
is designed according to the auditdrivencrypto design process
Takes a plaintext
Buffer of the message you want to encrypt,
and an array of recipient public keys.
Returns a message that is encrypted to all recipients
and openable by them with PrivateBox.decrypt
.
The recipients
must be between 1 and 7 items long.
The encrypted length will be 56 + (recipients.length * 33) + plaintext.length
bytes long,
between 89 and 287 bytes longer than the plaintext.
Attempt to decrypt a private-box message, using your secret key.
If you where an intended recipient then the plaintext will be returned.
If it was not for you, then undefined
will be returned.
private-box
generates an ephemeral curve25519 keypair that will only be used with this message (ephemeral
),
and a random key that will be used to encrypt the plaintext body (body_key
).
First, private-box outputs the ephemeral public key, then multiplies each recipient public key
with its secret to produce ephemeral shared keys (shared_keys[1..n]
).
Then, private-box concatenates body_key
with the number of recipients,
encrypts that to each shared key, and concatenates the encrypted body.
function encrypt (plaintext, recipients) {
var ephemeral = keypair()
var nonce = random(24)
var body_key = random(32)
var body_key_with_length = concat([body_key, recipients.length])
return concat([
nonce,
ephemeral.publicKey,
concat(recipients.map(function (publicKey) {
return secretbox(
body_key_with_length,
nonce,
scalarmult(publicKey, ephemeral.secretKey)
)
}),
secretbox(plaintext, nonce, body_key)
])
}
private-box
takes the nonce and ephemeral public key,
multiplies that with your secret key, then tests each possible
recipient slot until it either decrypts a key or runs out of slots.
If it runs out of slots, the message was not addressed to you,
so undefined
is returned. Else, the message is found and the body
is decrypted.
function decrypt (cyphertext, secretKey) {
var next = reader(cyphertext) // next() will read the passed N bytes
var nonce = next(24)
var publicKey = next(32)
var sharedKey = salarmult(publicKey, secretKey)
for(var i = 0; i < 7; i++) {
var maybe_key = next(33)
var key_with_length = secretbox_open(maybe_key, nonce, sharedKey)
if (key_with_length) { // decrypted!
var key = key_with_length.slice(0, 32)
var length = key_with_length[32]
return secretbox_open(
key,
cyphertext.slice(56 + 33*(length+1), cyphertext.length),
)
}
}
// this message was not addressed to the owner of secretKey
return undefined
}
Messages will be posted in public, so that the sender is likely to be known, and everyone can read the messages. (This makes it possible to hide the recipient, but probably not the sender.)
Resisting traffic analysis of the timing or size of messages is out of scope of this spec.
In PGP the recipient, the sender, and the subject are sent as plaintext. If the recipient is known, then the metadata graph of who is communicating with who can be read, which, since it is easier to analyze than the content, is important to protect.
The Sodium library provides a seal function that generates an ephemeral keypair, derives a shared key to encrypt a message, and then sends the ephemeral public key and the message. The recipient is hidden, and it is forward secure if the sender throws out the ephemeral key. However, it's only possible to have one recipient.
Minilock uses a similar approach to private-box
but does not hide the
number of recipients. In the case of a group discussion where multiple rounds
of messages are sent to everyone, this may enable an eavesdropper to deanonymize
the participiants of a discussion if the sender of each message is known.
This protocol was designed for use with secure-scuttlebutt. In this place, messages are placed in public, and the sender is known via a signature, but we can hide the recipient and the content.
An eaves-dropper cannot know the recipients or their number. Since the message is encrypted to each recipient, and then placed in public, to receive a message you will have to decrypt every message posted. This would not be scalable if you had to decrypt every message on the internet, but if you can restrict the number of messages you might have to decrypt, then it's reasonable. For example, if you frequented a forum which contained these messages, then it would only be a reasonable number of messages, and posting a message would only reveal that you where talking to some other member of that forum.
Hiding access to such a forum is another problem that's out of the current scope.
If the number of recipients was not hidden, then sometimes it would be possible to deanonymise the recipients, if there was a large group discussion with an unusual number of recipients. Encrypting the number of recipients means that when you fail to decrypt a message you must attempt to decrypt same number of times as the maximum recipients.
A valid recipient knows the number of recipients but now who they are. This is more a sideeffect of the design than an intentional design element.
key
for a message a outside party could decrypt the message.When you tell someone a secret you must trust them not to reveal it.
Anyone who knows the key
could reveal that to some other party who could then read the message content,
but not the recipients (unless the sender revealed the ephemeral secret key).
MIT
FAQs
encrypt a message to a secret number of recipients
The npm package private-box receives a total of 236 weekly downloads. As such, private-box popularity was classified as not popular.
We found that private-box demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
Security News
NVD’s backlog surpasses 20,000 CVEs as analysis slows and NIST announces new system updates to address ongoing delays.
Security News
Research
A malicious npm package disguised as a WhatsApp client is exploiting authentication flows with a remote kill switch to exfiltrate data and destroy files.