Oliver Welter wrote:
Hello Lev,

thx for the quick answer

We use openssl to en/decrypt data with 3des - is it possible to retrieve the used key while running a de/encryption via a memory debugger or something similar ?

[skip]

plan for building the system for which the cost of stealing the key would be
barely more than expected damage which can possibly occur from breaking the
system. that's the golden practical rule.


yes of course - you must find the balance between paranoid and necessary ;)
Are there any studies or test that have dealt with this issue ? That it is theoretically possible was clear to me, the question meant if it is "enough possible" for practical relevance - I even can hack a 3des key in a certain amount of time - so there is of course no 100% security...

this is very trivial. the key is contained clear-text in the memory image of a process (/dev/mem, or whatever). To try to decrypt the data with the key, the simplest case is a brute-force: fetch a memory region at location X, treat it as a key, and try to decrypt an encrypted data. You certainly have to have an algorithm to determine with high probability that decription has succeeded, but it is quite easy for most structured data, including audio formats. The complexity of this task is linear with amount of process memory: for 5 mbyte process the whole process will take certainly less than an hour of average computer.

do you really need a "study" to believe that?

--
Lev Walkin
[EMAIL PROTECTED]
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to