To add to the list of issues here, crypto implementations on mobile devices
may be vulnerable to power analysis side-channel attacks. Attackers may be
able to measure RF signal strength to infer power consumption during crypto
operations, then derive key material. I think Cryptography Research Inc.
has been researching these attacks and working on countermeasures.

On Mon, Apr 29, 2013 at 12:09 PM, Seth David Schoen <sch...@eff.org> wrote:

> ...
>
There are a lot of problems about disk encryption on small
> mobile devices.  One that was highlighted by Belenko and
> Sklyarov at Black Hat EU 2012 is that mobile device CPUs are
> relatively slow, so it's difficult to do very large numbers of
> iterations of key derivation functions, which would make
> brute-force cracking slower.
>
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Reply via email to