The past week has seen a plethora of articles in the press about the
Princeton Coldboot Attack Vector and how it might wreak havoc on FDE
Encryption products. 

 

I have been watching this list with increasing interest for some time, if
not only due to my involvement with SECUDE and Full Disk Encryption but I
have also found it quite interesting and in many cases informational as well
as educational.

 

With the release of the Princeton attack, we asked some of our Senior
Cryptographic Engineers to take a closer look at this and come up with a
realistic assessment of this newly discovered attack vector.

 

We will be publishing the paper shortly, but I felt the members of this list
might appreciate having a first look...here is the link:

 

http://usa.secude.com/lp/index.php?action=filedl
<http://usa.secude.com/lp/index.php?action=filedl&fid=3&cid=3> &fid=3&cid=3

 

As individuals obviously deeply interested in encryption technology, your
comments would be most welcome and appreciated.

 

Kind Regards,

Larry

___________________________________________________

Larry Massey

President

 

SECUDE IT Security, LLC 
380 Sundown Drive
Dawsonville, GA  30534 USA 



Tel : +1 706 216 8609 

Fax:    +1 706 216 4696

Mobile : +1 706 215 3854 

 <mailto:[EMAIL PROTECTED]> [EMAIL PROTECTED]
 <http://www.secude.com/> www.secude.com

 

|-----Original Message-----

|From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]

|On Behalf Of Ali, Saqib

|Sent: Thursday, February 21, 2008 3:19 PM

|To: fde

|Subject: [FDE] Scary......

|

|http://citp.princeton.edu/memory/

|

|However, hardware based encrypted drives like Seagate FDE would easily

|deter these type of attacks.

|_______________________________________________

|FDE mailing list

|[email protected]

|http://www.xml-dev.com/mailman/listinfo/fde

_______________________________________________
FDE mailing list
[email protected]
http://www.xml-dev.com/mailman/listinfo/fde

Reply via email to