There are lots of reasons why a vendor might choose to offer a non-FIPS
mode.  There are even some (but perhaps fewer) good reasons why a
security-conscious enterprise would or should choose to make use of such
modes.

The first non-FIPS case that comes to mind involves the use of a
non-FIPS algorithm or mode.  MD5, single-DES, CAST, etc., are all
non-FIPS approved algorithms, but may have some utility for backwards
compatibility.

Even if all of the encryption algorithms are FIPS -approved, that
particular mode of operation might not be approved, or might not have
been at the time the module was certified.  For example, the use of RSA
for key exchange is not FIPS approved, although it is approved for
digital signatures.  HMAC, AES Galois Counter Mode, and the various
"tweak" ciphers now being proposed many or many not fall into that gray
area, although most can be composed as a series of ECB operations with
pre- and post-processing.

Other areas of concern may be the time required to complete all of the
power-on self tests, which FIPS 140-2 requires be completed before ANY
cryptographic operations are performed, vs. the draft FIPS 140-3
specification which only requires that they be completed before that
particular usage is first performed.  So if you implement some
relatively expensive but optional and infrequently used function (e.g.,
ECDSA), you may cause a 10 to 15 second delay in smart card logon.  A
vendor might very reasonably choose to offer a non-FIPS mode to avoid
the unnecessary overhead in that case.

Finally, some functions may be required for FIPS Level 3, such as a
secure channel for all PIN entry and key exchange, which may be
difficult or expensive to do on all platforms.  Rather than downgrade
the product's rating to level 2, the vendor may choose to offer a
non-FIPS mode that might be even worse, while still claiming level 3
(although no one will use the product in that fashion.)

As usual, the devil is in the details, and reading the Security Policy
carefully before purchasing the product is essential to an informed
decision.

Bob


Robert R. Jueneman
Chief Scientist
SPYRUS, Inc.
www.spyrus.com
1860 Hartog Drive
San Jose, CA 95131
408-392-4307 (Office)
408-422-2378 (Cell)
Please note the new address and office telephone number.
 
See http://www.spyrus.com/productdemo.asp for a brief video regarding
the SPYRUS Hydra Privacy Card.
This message and any attached documents may contain SPYRUS confidential
information and may be subject to privilege or exempt from disclosure
under applicable law.  These materials are intended only for the use of
the intended recipient.  If you are not the intended recipient of this
electronic message, you are hereby notified that any use of this message
is strictly prohibited.  Delivery of this message to any person other
than the intended recipient shall not constitute any waiver of any
privilege.  If you have received this message in error, please delete
this message from your system and notify the sender immediately.  Thank
you."
 

-----Original Message-----
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
On Behalf Of [EMAIL PROTECTED]
Sent: Friday, May 02, 2008 11:00 AM
To: fde@www.xml-dev.com
Subject: FDE Digest, Vol 20, Issue 2

Send FDE mailing list submissions to
        fde@www.xml-dev.com

To subscribe or unsubscribe via the World Wide Web, visit
        http://www.xml-dev.com/mailman/listinfo/fde
or, via email, send a message with subject or body 'help' to
        [EMAIL PROTECTED]

You can reach the person managing the list at
        [EMAIL PROTECTED]

When replying, please edit your Subject line so it is more specific
than "Re: Contents of FDE digest..."


Today's Topics:

   1. FIPS 140-2: When operated in FIPS mode? (Flagstone, Spyrus,
      Utimaco, Poinsect, MobileArmor) (Ali, Saqib)
   2. Re: FIPS 140-2: When operated in FIPS mode? (Flagstone,
      Spyrus,   Utimaco, Poinsect, MobileArmor)
      ([EMAIL PROTECTED])
   3. Re: Fujistu announces 2,5 inch SATA HDD with FDE (Duane Dyar)
   4. Re: Microsoft COFEE, - Alternatively a True Brute Force
      Attack on RFID (Allen)


----------------------------------------------------------------------

Message: 1
Date: Thu, 1 May 2008 12:54:40 -0700
From: "Ali, Saqib" <[EMAIL PROTECTED]>
Subject: [FDE] FIPS 140-2: When operated in FIPS mode? (Flagstone,
        Spyrus, Utimaco, Poinsect, MobileArmor)
To: fde <FDE@www.xml-dev.com>
Message-ID:
        <[EMAIL PROTECTED]>
Content-Type: text/plain; charset=ISO-8859-1

I was looking at the FIPS 140-2 Certificate[1] for the Stonewood's
Flagstone product, and it has a clause that says "(When operated in
FIPS mode)". What does this clause mean?

I was under the impression that since Flagstone only implement FIPS
validated encryption algorithms (128-bit AES CBC/ECB and ANSI X9.31
AES 128 bit RNG) there would no non-FIPS mode.

I later found out that, Spyrus, Utimaco, Poinsect, MobileArmor have
the same clause.


1.
http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140crt/140crt779.pd
f


------------------------------

Message: 2
Date: Thu, 1 May 2008 15:47:25 -0500
From: <[EMAIL PROTECTED]>
Subject: Re: [FDE] FIPS 140-2: When operated in FIPS mode? (Flagstone,
        Spyrus, Utimaco, Poinsect, MobileArmor)
To: <fde@www.xml-dev.com>
Message-ID:
        
<[EMAIL PROTECTED]>
Content-Type: text/plain;       charset="us-ascii"

Just because they use FIPS approved or validated algorithms doesn't mean
they are FIPS validated modules. There is much more than just correctly
implementing the algorithm to FIPS mode. Some that come to mind are
zeroizing the key store if a tamper is suspected, or if account lock-out
numbers are reached, etc. Depending on the level of validation physical
keys (dongles, USB, smart cards) are needed to enable the device.

Most encryption products have the option of running in FIPS mode or
non-FIPS mode. Generally FIPS modes are far more restrictive and slower
than necessary for typical non-classified usage. But, if you are storing
the root of your PKI on the disk, it would probably be considered a best
practice.

Eric Lengvenis
Security Architecture

This message may contain confidential and/or privileged information. If
you are not the addressee or authorized to receive this for the
addressee, you must not use, copy, disclose, or take any action based on
this message or any information herein. If you have received this
message in error, please advise the sender immediately by reply e-mail
and delete this message. Thank you for your cooperation.

-----Original Message-----
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
On Behalf Of Ali, Saqib
Sent: Thursday, May 01, 2008 2:55 PM
To: fde
Subject: [FDE] FIPS 140-2: When operated in FIPS mode? (Flagstone,
Spyrus,Utimaco, Poinsect, MobileArmor)

I was looking at the FIPS 140-2 Certificate[1] for the Stonewood's
Flagstone product, and it has a clause that says "(When operated in
FIPS mode)". What does this clause mean?

I was under the impression that since Flagstone only implement FIPS
validated encryption algorithms (128-bit AES CBC/ECB and ANSI X9.31
AES 128 bit RNG) there would no non-FIPS mode.

I later found out that, Spyrus, Utimaco, Poinsect, MobileArmor have
the same clause.


1.
http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140crt/140crt779.pd
f
_______________________________________________
FDE mailing list
FDE@www.xml-dev.com
http://www.xml-dev.com/mailman/listinfo/fde




------------------------------

Message: 3
Date: Thu, 1 May 2008 16:16:18 -0500
From: "Duane Dyar" <[EMAIL PROTECTED]>
Subject: Re: [FDE] Fujistu announces 2,5 inch SATA HDD with FDE
To: <fde@www.xml-dev.com>
Message-ID:
        
<[EMAIL PROTECTED]>
Content-Type: text/plain;       charset="us-ascii"

You can modify the Windows operating system to use a FIPS Mode Operation
by opening the MMC console and changing the local security policy.  This
will enable either a FIPS 140-1 or 140-2 validation mode depend on the
OS (Vista or something older).  

Duane


-----Original Message-----
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
On Behalf Of Hubbert Smith
Sent: Wednesday, April 30, 2008 11:21 PM
To: fde@www.xml-dev.com
Subject: Re: [FDE] Fujistu announces 2,5 inch SATA HDD with FDE

Hi all,
great thread, by the way. Pls keep it coming.
I'm not an expert, but I have read the spec. 
FIPS does define "cryptography modules". FIPS does not require encrypted
drives http://en.wikipedia.org/wiki/FIPS_140
http://csrc.nist.gov/publications/fips/fips140-2/fips1402.pdf
so, I did not read anything that says that the "cryptography module"
_must_ be a disk drive and I did not read anything that says the
cryptography module _cannot_ be a laptop.


I guess what I'm attempting to sort out ...
it appears FIPS compliance for laptops can be attained with O/S level
encryption, today. (am I wrong?) so are we attempting to solve a problem
of FIPS compliance for _all_ laptops or are we attempting to improve
performance for _some_ FIPS compliant laptops?


cheers
Hubbert






----- Original Message ----
From: Scott S <[EMAIL PROTECTED]>
To: fde@www.xml-dev.com
Sent: Wednesday, April 30, 2008 6:52:51 PM
Subject: Re: [FDE] Fujistu announces 2,5 inch SATA HDD with FDE

This might be possible for desktop computers where space is not a
constraint. However, in laptops (which are the computers that are most
vulnerable to theft and lost) where form factors are so specific and
compact, it would be problemmatic, especially to make it generic enough
to fit all brands.

There is also the manufacturing aspect of it. Integration of components
brings down the overall cost of production. Once components are
separated out, it will be another product line with its own margins and
price points.

Scott

On Tue, 29 Apr 2008, Simson Garfinkel wrote:

> Would it not be possible to certify an encryption module that fits 
> between the hard drive and the host computer? This would allow you to 
> use off-the-shelf drives while maintaining certification...
>
>
> On Apr 29, 2008, at 8:40 PM, Ali, Saqib wrote:
>
>> This is precisly the issue with obtaining FIPS certification for hard

>> drives.
>>
>> Hard Drive design and development moves at a extremely rapid pace.
>> Time to market and innovation is key in the disk drive business.
>> Manufacturers like Hitachi, Fujitsu and Seagate have to release newer

>> hardware every month to keep ahead of the competition. Whereas 
>> obtaining FIPs certification is a slow and time consuming process. By

>> the time these manufacturers obtain FIPS for a certain hardware, that

>> hardware is already few generations old.
>>
> _______________________________________________
> FDE mailing list
> FDE@www.xml-dev.com
> http://www.xml-dev.com/mailman/listinfo/fde
>
_______________________________________________
FDE mailing list
FDE@www.xml-dev.com
http://www.xml-dev.com/mailman/listinfo/fde






 
________________________________________________________________________
____________
Be a better friend, newshound, and
know-it-all with Yahoo! Mobile.  Try it now.
http://mobile.yahoo.com/;_ylt=Ahu06i62sR8HDtDypao8Wcj9tAcJ
_______________________________________________
FDE mailing list
FDE@www.xml-dev.com
http://www.xml-dev.com/mailman/listinfo/fde



------------------------------

Message: 4
Date: Thu, 01 May 2008 17:43:38 -0700
From: Allen <[EMAIL PROTECTED]>
Subject: Re: [FDE] Microsoft COFEE, - Alternatively a True Brute Force
        Attack on RFID
To: Cryptography <[EMAIL PROTECTED]>
Cc: ekmi <[EMAIL PROTECTED]>, fde@www.xml-dev.com
Message-ID: <[EMAIL PROTECTED]>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed

Funny you should be talking about this just as EFF references an 
article on BoingBoing where the "brute force attack" of choice 
against RFID is a hammer. ;->

As to the Microsoft COFEE brute forcing passwords using tools on 
a USB key, I'd guess there is a lot of FUD involved. I don't 
believe one could shoehorn a Rainbow Table of a reasonable size 
into any current USB key, so one would be reduced to either 
LANMAN attacks or wiping the SAM file of the computer itself 
running ISOLinux. This would destroy the validity of the evidence 
for courtroom evidence purposes as not being able to prove that 
the data was not tampered with.

A true brute force attack against 10 characters and a 66 (U/L 
alpha and numeric plus 4 non-alphanumeric) or so key space at 
15X10^6 keys/second - average decent dual core rate - would take 
about a year assuming that you had a terabyte of storage on a 
portable USB drive with a pre-computed table that might 
conceivably take as little as 3+ years to pre-compute at 15x10^9 
keys/second. Add one more character to the password length or 
increase the key space and pre-computing the Rainbow Table is a 
couple of hundred years or more.

So then what are you left with? You can map the files without the 
password if the disk is not encrypted and get a lot of 
information that way, but forget this if the drive(s) or the 
files are encrypted.

FCCU Linux has almost all the tools one needs and it will fit and 
run from a USB key, so who needs Microsoft?

The takeaway is encrypt the drive/files and use a password of at 
least 12 characters and a key space of U/L alpha, numeric and the 
common other keys and your computer is secure enough for the 
moment. Tomorrow? Who knows.

Allen

BTW, Thanks to "Rainbow Chain Hash Cracking Calculator" by Tom 
Sullivan for the figures on key strength. If you can't find a 
copy of this, I'll send you one.

Adam Shostack wrote:
> My understanding, based mostly on what I've read in the press, is that
> COFFEE is a set of scripts that run existing tools, making it easier
> for law enforcement to do things which are already known to be
> possible.  Note the words "executing 150 seperate commands," which, I
> think, would be odd if this was something other than scripts, but
> appear in a lot of the news stories.
> 
> For example, I believe that there are several freely available
> password cracking tools and some commercial ones. For example, you can
> order John the Ripper to decrypt a system password on some operating
> systems.  I have no idea if a password cracker is included.
> 
> Speaking for me.
> 
> Adam
> 
> On Wed, Apr 30, 2008 at 03:36:28PM -0400, Arshad Noor wrote:
> | It can be "ordered to decrypt system passwords"???  So, I wonder
> | what attackers can do with this...
> | 
> | Arshad Noor
> | StrongAuth, Inc.
> | 
> | "Microsoft revealed its development of a digital forensic analysis
toolkit at a security conference yesterday as part of a wider discussion
of how technology can be used to fight crime. The Computer Online
Forensic Evidence Extractor, or COFEE for short, is a USB thumb drive
that contains software capable of executing approximately 150 separate
commands. Once plugged in, COFEE can be ordered to decrypt system
passwords, display a history of internet activity, and search the system
for evidence...."
> | 
> |
http://arstechnica.com/news.ars/post/20080429-new-microsoft-law-enforcem
ent-tool-bypasses-pc-security.html
> | 
> |
---------------------------------------------------------------------
> | The Cryptography Mailing List
> | Unsubscribe by sending "unsubscribe cryptography" to
[EMAIL PROTECTED]
> 
> ---------------------------------------------------------------------
> The Cryptography Mailing List
> Unsubscribe by sending "unsubscribe cryptography" to
[EMAIL PROTECTED]
> 


------------------------------

_______________________________________________
FDE mailing list
FDE@www.xml-dev.com
http://www.xml-dev.com/mailman/listinfo/fde


End of FDE Digest, Vol 20, Issue 2
**********************************

_______________________________________________
FDE mailing list
FDE@www.xml-dev.com
http://www.xml-dev.com/mailman/listinfo/fde

Reply via email to