HOME

TheInfoList



OR:

In security engineering, security through obscurity is the practice of concealing the details or mechanisms of a system to enhance its security. This approach relies on the principle of hiding something in plain sight, akin to a magician's
sleight of hand Sleight of hand (also known as prestidigitation or ''legerdemain'' () comprises fine motor skills used by performing artists in different art forms to entertain or manipulate. It is closely associated with close-up magic, card magic, card fl ...
or the use of
camouflage Camouflage is the use of any combination of materials, coloration, or illumination for concealment, either by making animals or objects hard to see, or by disguising them as something else. Examples include the leopard's spotted coat, the b ...
. It diverges from traditional security methods, such as physical locks, and is more about obscuring information or characteristics to deter potential threats. Examples of this practice include disguising sensitive information within commonplace items, like a piece of paper in a book, or altering digital footprints, such as spoofing a web browser's version number. While not a standalone solution, security through obscurity can complement other security measures in certain scenarios. Obscurity in the context of security engineering is the notion that information can be protected, to a certain extent, when it is difficult to access or comprehend. This concept hinges on the principle of making the details or workings of a system less visible or understandable, thereby reducing the likelihood of unauthorized access or manipulation. Security by obscurity alone is discouraged and not recommended by standards bodies.


History

An early opponent of security through obscurity was the locksmith Alfred Charles Hobbs, who in 1851 demonstrated to the public how state-of-the-art locks could be picked. In response to concerns that exposing security flaws in the design of locks could make them more vulnerable to criminals, he said: "Rogues are very keen in their profession, and know already much more than we can teach them." There is scant formal literature on the issue of security through obscurity. Books on security engineering cite Kerckhoffs' doctrine from 1883 if they cite anything at all. For example, in a discussion about secrecy and openness in
nuclear command and control Nuclear command and control (NC2) is the command and control of nuclear weapons. The U. S. military's ''Nuclear Matters Handbook 2015'' defined it as the "activities, processes, and procedures performed by appropriate military commanders and su ...
:
e benefits of reducing the likelihood of an accidental war were considered to outweigh the possible benefits of secrecy. This is a modern reincarnation of Kerckhoffs' doctrine, first put forward in the nineteenth century, that the security of a system should depend on its key, not on its design remaining obscure.
Peter Swire has written about the trade-off between the notion that "security through obscurity is an illusion" and the military notion that " loose lips sink ships", as well as on how competition affects the incentives to disclose. There are conflicting stories about the origin of this term. Fans of MIT's Incompatible Timesharing System (ITS) say it was coined in opposition to
Multics Multics ("MULTiplexed Information and Computing Service") is an influential early time-sharing operating system based on the concept of a single-level memory.Dennis M. Ritchie, "The Evolution of the Unix Time-sharing System", Communications of t ...
users down the hall, for whom security was far more an issue than on ITS. Within the ITS culture, the term referred, self-mockingly, to the poor coverage of the documentation and obscurity of many commands, and to the attitude that by the time a tourist figured out how to make trouble he'd generally got over the urge to make it, because he felt part of the community. One instance of deliberate security through obscurity on ITS has been noted: the command to allow patching the running ITS system (altmode altmode control-R) echoed as $$^D. Typing Alt Alt Control-D set a flag that would prevent patching the system even if the user later got it right. In January 2020, NPR reported that Democratic Party officials in Iowa declined to share information regarding the security of its caucus app, to "make sure we are not relaying information that could be used against us." Cybersecurity experts replied that "to withhold the technical details of its app doesn't do much to protect the system."


Criticism

Security by obscurity alone is discouraged and not recommended by standards bodies. The
National Institute of Standards and Technology The National Institute of Standards and Technology (NIST) is an agency of the United States Department of Commerce whose mission is to promote American innovation and industrial competitiveness. NIST's activities are organized into Outline of p ...
(NIST) in the
United States The United States of America (USA), also known as the United States (U.S.) or America, is a country primarily located in North America. It is a federal republic of 50 U.S. state, states and a federal capital district, Washington, D.C. The 48 ...
recommends against this practice: "System security should not depend on the secrecy of the implementation or its components." The Common Weakness Enumeration project lists "Reliance on Security Through Obscurity" as CWE-656. A large number of telecommunication and
digital rights management Digital rights management (DRM) is the management of legal access to digital content. Various tools or technological protection measures, such as access control technologies, can restrict the use of proprietary hardware and copyrighted works. DRM ...
cryptosystems use security through obscurity, but have ultimately been broken. These include components of
GSM The Global System for Mobile Communications (GSM) is a family of standards to describe the protocols for second-generation (2G) digital cellular networks, as used by mobile devices such as mobile phones and Mobile broadband modem, mobile broadba ...
, GMR encryption, GPRS encryption, a number of RFID encryption schemes, and most recently
Terrestrial Trunked Radio Tetra is the common name of many small freshwater characiform fishes. Tetras come from Africa, Central America, and South America, belonging to the biological families Characidae, Alestidae (the "African tetras"), Lepidarchidae, Lebias ...
(TETRA). One of the largest proponents of security through obscurity commonly seen today is anti-malware software. What typically occurs with this
single point of failure A single point of failure (SPOF) is a part of a system that would Cascading failure, stop the entire system from working if it were to fail. The term single point of failure implies that there is not a backup or redundant option that would enab ...
, however, is an
arms race An arms race occurs when two or more groups compete in military superiority. It consists of a competition between two or more State (polity), states to have superior armed forces, concerning production of weapons, the growth of a military, and ...
of attackers finding novel ways to avoid detection and defenders coming up with increasingly contrived but secret signatures to flag on. The technique stands in contrast with security by design and open security, although many real-world projects include elements of all strategies.


Obscurity in architecture vs. technique

Knowledge of how the system is built differs from concealment and
camouflage Camouflage is the use of any combination of materials, coloration, or illumination for concealment, either by making animals or objects hard to see, or by disguising them as something else. Examples include the leopard's spotted coat, the b ...
. The effectiveness of obscurity in operations security depends on whether the obscurity lives on top of other good security practices, or if it is being used alone. When used as an independent layer, obscurity is considered a valid security tool. In recent years, more advanced versions of "security through obscurity" have gained support as a methodology in
cybersecurity Computer security (also cybersecurity, digital security, or information technology (IT) security) is a subdiscipline within the field of information security. It consists of the protection of computer software, systems and networks from thr ...
through Moving Target Defense and cyber deception. NIST's cyber resiliency framework, 800-160 Volume 2, recommends the usage of security through obscurity as a complementary part of a resilient and secure computing environment.


See also

* Steganography * Code morphing * Need to know *
Obfuscation (software) In software development, obfuscation is the practice of creating source code, source or machine code that is intentionally difficult for humans or computers to understand. Similar to obfuscation in natural language, code obfuscation may involve ...
*
Secure by design Secure by design, in software engineering, means that software products and capabilities have been Software design, designed to be foundationally Application security, secure. Alternate security strategies, tactics and patterns are considered at ...
* AACS encryption key controversy * Full disclosure (computer security) * Code talker *
Obfuscation Obfuscation is the obscuring of the intended meaning of communication by making the message difficult to understand, usually with confusing and ambiguous language. The obfuscation might be either unintentional or intentional (although intent ...
* Concealment device


References


External links


Eric Raymond on Cisco's IOS source code 'release' v Open Source

Computer Security Publications: Information Economics, Shifting Liability and the First Amendment
by Ethan M. Preston and John Lofton * by Jay Beale



by
Bruce Schneier Bruce Schneier (; born January 15, 1963) is an American cryptographer, computer security professional, privacy specialist, and writer. Schneier is an Adjunct Lecturer in Public Policy at the Harvard Kennedy School and a Fellow at the Berkman ...

"Security through obsolescence", Robin Miller, ''linux.com'', June 6, 2002
{{DEFAULTSORT:Security Through Obscurity Computer security procedures Cryptography Secrecy Security engineering