Well said Thi.. This was my original point, which I lost so adeptly. 

________________________________

From: [EMAIL PROTECTED] on behalf of Joseph Belsanti
Sent: Wed 8/22/2007 10:44 AM
To: [email protected]
Subject: Re: [FDE] New DoD encryption mandate and TPM requirements



WinMagic has supported TPM (at pre-boot) since 2005. Starting with Infineon TPM 
v1.1, we now support Infineon v1.2 and the Broadcom chipset.   We are currently 
working on support for the Atmel chips. While in theory TPM v1.2 of all vendors 
are supposed to work the same way and support the same (low level) application 
programming interface API, it is unfortunately not always the case.

 

I would like to outline our view on the TPM to hopefully clarify some points:

1) Symmetric AES 256 bit is considered much "stronger" than RSA's asymmetric 
keys of 1024 bits. I recall NIST would put the same strength to AES 256-bit at 
15,000 bit RSA. Thus, TPM with 2048 bit RSA does not provide higher security 
(to AES 256 bit keys). (See Table 2: Comparable Strengths in 
http://csrc.nist.gov/publications/nistpubs/800-57/SP800-57-Part1.pdf 
<http://csrc.nist.gov/publications/nistpubs/800-57/SP800-57-Part1.pdf> )

 

2) Use of TPM in conjunction with Full Disk Encryption should refer mainly to 
the ability to get a secret from the TPM to have the key to access the disk 
data. 

 

3) Due to the fact that all applications can use the root private key of the 
TPM, the key management in conjunction with TPM public key system is different 
to, for example,  smartcard and PKI for disk encryption.

 

4) Managing TPM keys and using TPM to protect disk encryption key are two 
different issues. As a disk encryption vendor, we would not need to "manage" 
TPM keys. Similarly to using PKI, our software does not manage PKI keys or 
change any keys on the smartcard. Unlike PKI though, our software has to use a 
TPM key slot. But this should not interfere with other keys.

 

5) For data recovery, our key servers can issue keys to access encrypted disks 
even if the TPM is for some reasons no longer available. This is essential 
whether or not we can manage TPM keys. And I would like to refer to our point 
1) above to emphasize that the ability to work without TPM does not necessarily 
mean the encryption system is weakened.

 

So, the TPM is a very welcome addition to the PC to increase the security level 
of the encryption systems and it can eliminate the weakest link of the 
encryption system: the password. WinMagic - as far as we know - is the only 
Full Disk Encryption vendor to support TPM in the real sense of disk 
encryption: to get the disk encryption key, at pre-boot. And this TPM support 
for FDE does not necessarily mean the software has to manage TPM keys.

 

On behalf of our CEO - Thi Nguyen-Huu.


Cheers,

Joseph




________________________________

From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Brian Wood
Sent: Saturday, August 18, 2007 4:27 PM
To: [email protected]
Subject: Re: [FDE] New DoD encryption mandate and TPM requirements

 

Saqib,

I am new to this list, but have worked in the field for some time, and I want 
to make a point here: the TPM keys are a core security component of this 
particular FDE solution. That means that the management of those keys needs to 
be handled by the approved security software, not something else. By saying 
that Wave could handle the backup/restore/transfer of keys, you are saying that 
a non-approved piece of software (Wave in this case) will have control over the 
keys which are used to secure all the data. That is an unacceptable risk for 
any security solution, to allow another program to manage your encryption keys 
in any way. While this works for something like the Wave/Seagate partnership, 
primarily because Seagate provides no management software at all, this is not 
going to be acceptable for a managed software solution, whether it be Mobile 
Armor, WinMagic or Pointsec. That software must provide the security and 
management of the software keys used for encryption. While they may rely on TPM 
for local storage and physical protection of the keys on the end device, 
reliance on what would essentially be a third-party solution for backup of 
those keys would not be acceptable. A main criteria whenever a disk encryption 
solution is chosen, whether by the government or a corporation, is the safe, 
secure and known management of all keys, including backup and recovery. If 
Mobile Armor or anybody went into a sale and said "by the way, you need to buy 
this other package over which we have no control to backup and manage the keys 
from the local computers", no one would buy the product.

Realize also that this does not mean that Wave could not partner or license 
their technology for integration into someones solution and acquire a large 
business in that fashion, but as a direct player at this time in the DARTT 
market, they would not benefit at this time.

Brian Wood

Ali, Saqib wrote: 

        Wave's solution will not benefit by this, because it does not manage any
        of the DARTT selected software.
            

 
Bryan, I think you are missing the point.
 
If a encryption suite (e.g. MobileArmor) is using the TPM to
"Wrap/Bind" the bulk data encryption keys then the Wavesys does NOT
need to manage the encryption suite. The Wavesys has to simply provide
management of the TPM with key backup/restore and transfer
capabilities.
 
Wavesys is not designed to managed encryption software. It doesn't
have to. If the encryption software properly utilizes the TPM, then
the Wavesys only needs to manage the TPM.
 
saqib
http://www.linkedin.com/in/encryption
_______________________________________________
FDE mailing list
[email protected]
http://www.xml-dev.com/mailman/listinfo/fde
 
  

<<winmail.dat>>

_______________________________________________
FDE mailing list
[email protected]
http://www.xml-dev.com/mailman/listinfo/fde

Reply via email to