I seriously doubt anyone is saying you can crack AES
*WITHOUT* access to the 
keys or a serious flaw in the implementation there of.
This article is about a 
flaw where the keys are in RAM in the clear. Flushing
the keys when the system 
goes into a locked or suspend state (while halting
processes that need access to 
the encrypted data) and forcing the keys to be
re-entered externally on resume 
would remove this vulnerability completely.

Hardware *is* the solution if you understand the flaws
of using general purpose 
computers to run encryption software vs. dedicated
hardware doing it. Then 
factor in as you said, an external factor like a token
or certificate that is 
separate from the PC. Without RAM to be accessed,
there locally is no key to be 
found by forensics. As to if someone can get to the
other component needed to 
decrypt is another discussion completely and moot if
that component can be 
destroyed.

A completely encrypted system is not debuggable
because by definition nothing is 
"in the clear". Sure you can "read" it's RAM while
tweaking it's input ports 
trying to discern what it's keys are based on
injecting known values but 
asymmetrical is supposed to mean even with encryption
key, source plain data & 
resulting encrypted data it's not going to reveal the
decryption key.

Look into the IronKey drive I was mentioning & you'll
understand it would be 
damn hard to get at where the keys are "to connect
debuggers" & still be able to 
retrieve keys nor a still working module. That module
as a SATA go-between would 
mean your not getting into the drive without whatever
component unlocks the 
encryption module.

Even with "flawed" TC on a Powered down system, no
trace keydata on the HDD, no 
get in short of brute force (AES? TwoFish? much luck!)
FBI or not. Only option 
would be "water boarding" and that's not going to
produce results if the keys 
were on a component and destroyed vs. being a password
you can force out of a 
subject.

Mesdaq, Ali wrote:
> Hardware is not really the solution. The problem is
layered but the main
> problem here is physical security. If you have a
system and all of its
> components to encrypt and decrypt are right there in
one piece and
> people can connect debuggers to it or analyze it
they could break
> anything you do. But if the system is not complete
without something
> else like a private key that needs to be retrieved
remotely then you
> have some extra security. Then you can control the
process by seeing if
> physical security is compromised you just don't send
that private key
> and the system is incomplete. For true secure
solutions you need to
> layer, then separate, then control access to each
layer and component.
> So in the case of hard drive encryption if an FBI
person gets your drive
> and you can bet they can find out everything on it
if they care enough. 
> 
> Security is really just a level of comfort you can
deal with. EVERYTHING
> can be compromised in some way.
> 


      
____________________________________________________________________________________
Never miss a thing.  Make Yahoo your home page. 
http://www.yahoo.com/r/hs

Reply via email to