From Cyber Threat to Data Shield: Constructing Provably Secure File Erasure with Repurposed Ransomware Cryptography

📅 2025-04-16
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
To address the challenge of secure sensitive data destruction, this paper proposes the “Encryption-as-Destruction” paradigm and designs SEER, a provably secure file erasure system. Methodologically, it is the first to repurpose the triple-encryption architecture of the Babuk ransomware—comprising Curve25519 key exchange, SHA-256-based key derivation, and the Sosemanuk stream cipher—for legitimate, security-critical erasure; this is integrated with hierarchical key management and instantaneous session-key wiping to tightly couple encryption with cryptographic key destruction. Theoretically, SEER provides formal security proofs under standard cryptographic assumptions. Experimentally, on the ESXi platform, SEER achieves erasure throughput four orders of magnitude higher than the DoD 5220.22-M standard, while maintaining rigorous information-theoretic security guarantees. Thus, SEER bridges the gap between theoretical security and industrial deployability, offering both provable safety and practical efficiency for secure data sanitization.

Technology Category

Application Category

📝 Abstract
Ransomware has emerged as a persistent cybersecurity threat,leveraging robust encryption schemes that often remain unbroken even after public disclosure of source code. Motivated by the technical resilience of such mechanisms, this paper presents SEER (Secure and Efficient Encryption-based Erasure via Ransomware), a provably secure file destruction system that repurposes ransomware encryption for legitimate data erasure tasks. SEER integrates the triple-encryption design of the Babuk ransomware family, including Curve25519-based key exchange,SHA-256-based key derivation, and the Sosemanuk stream cipher, to construct a layered key management architecture. It tightly couples encryption and key destruction by securely erasing session keys immediately after use. Experimental results on an ESXI platform demonstrate that SEER achieves four orders of magnitude performance improvement over the DoD 5220.22 standard. The proposed system further ensures provable security through both theoretical foundations and practical validation, offering an efficient and resilient solution for the secure destruction of sensitive data.
Problem

Research questions and friction points this paper is trying to address.

Repurposing ransomware encryption for secure file erasure
Achieving provable security with layered key management
Improving performance over traditional data destruction standards
Innovation

Methods, ideas, or system contributions that make the work stand out.

Repurposes ransomware encryption for secure erasure
Uses Babuk's triple-encryption for layered security
Destroys session keys immediately post-use
🔎 Similar Papers
No similar papers found.
J
Jiahui Shang
School of Computer and Cyberspace Security, Communication University of China
Luning Zhang
Luning Zhang
Shanghai University MS student
Multi-modal reasoning
Z
Zhongxiang Zheng
School of Computer and Cyberspace Security, Communication University of China