The past week has seen a plethora of articles in the press about the Princeton Coldboot Attack Vector and how it might wreak havoc on FDE Encryption products.
I have been watching this list with increasing interest for some time, if not only due to my involvement with SECUDE and Full Disk Encryption but I have also found it quite interesting and in many cases informational as well as educational. With the release of the Princeton attack, we asked some of our Senior Cryptographic Engineers to take a closer look at this and come up with a realistic assessment of this newly discovered attack vector. We will be publishing the paper shortly, but I felt the members of this list might appreciate having a first look...here is the link: http://usa.secude.com/lp/index.php?action=filedl <http://usa.secude.com/lp/index.php?action=filedl&fid=3&cid=3> &fid=3&cid=3 As individuals obviously deeply interested in encryption technology, your comments would be most welcome and appreciated. Kind Regards, Larry ___________________________________________________ Larry Massey President SECUDE IT Security, LLC 380 Sundown Drive Dawsonville, GA 30534 USA Tel : +1 706 216 8609 Fax: +1 706 216 4696 Mobile : +1 706 215 3854 <mailto:[EMAIL PROTECTED]> [EMAIL PROTECTED] <http://www.secude.com/> www.secude.com |-----Original Message----- |From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] |On Behalf Of Ali, Saqib |Sent: Thursday, February 21, 2008 3:19 PM |To: fde |Subject: [FDE] Scary...... | |http://citp.princeton.edu/memory/ | |However, hardware based encrypted drives like Seagate FDE would easily |deter these type of attacks. |_______________________________________________ |FDE mailing list |[email protected] |http://www.xml-dev.com/mailman/listinfo/fde
_______________________________________________ FDE mailing list [email protected] http://www.xml-dev.com/mailman/listinfo/fde
