Oliver Welter wrote:

> We made a concept for a secure media player and now try to attack it -
> the openssl related question is:
> 
> We use openssl to en/decrypt data with 3des - is it possible to retrieve
> the used key while running a de/encryption via a memory debugger or
> something similar ? Are there any preventions against such attacks or
> has noone ever thought about such an attack ?

After the decryption you end up with a unprotected audio/video stream,
correct? Now why should the "attacker" spend time with finding the key
hidden somewhere in the process memory when he can probably more easily
capture the decrypted data that you serve him almost right on his table?

But as long as he has access to the player process' memory you lost
anyway. The only question now is which way to choose to get the
unprotected data :-)

Just my 2 cents...

Michal Ludvig
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to