To add to the list of issues here, crypto implementations on mobile devices may be vulnerable to power analysis side-channel attacks. Attackers may be able to measure RF signal strength to infer power consumption during crypto operations, then derive key material. I think Cryptography Research Inc. has been researching these attacks and working on countermeasures.
On Mon, Apr 29, 2013 at 12:09 PM, Seth David Schoen <sch...@eff.org> wrote: > ... > There are a lot of problems about disk encryption on small > mobile devices. One that was highlighted by Belenko and > Sklyarov at Black Hat EU 2012 is that mobile device CPUs are > relatively slow, so it's difficult to do very large numbers of > iterations of key derivation functions, which would make > brute-force cracking slower. >
-- Too many emails? Unsubscribe, change to digest, or change password by emailing moderator at compa...@stanford.edu or changing your settings at https://mailman.stanford.edu/mailman/listinfo/liberationtech