I could not explain my concerns clearly enough about small block
encryption (~LRW) outside of the disk drive, so here I try it again.
(Because of protests, we did not discuss this in the last P1619
meeting.)

The purpose of the standard is to provide reasonable security for data
at rest. In case of a disk drive doing LRW internally, we know of no
other threat of comparable severity than theft of the disk drive,
assuming that the drive locks up if the right key or password is not
provided. Otherwise, there would be another severe threat: traffic
analysis. An attacker, who temporarily gains control of the drive
(night guard, intruder, colleague during lunch break, bribed
technician) can make snapshots of the drive content, and can find the
extent of the changes and their place with very good locality (16
bytes).

If the drive does not lock up, when it receives the wrong key, but
provides data decrypted with the wrong key, the attacker could
re-encrypt the data with the key he provided to the drive, and gets the
raw data, which is encrypted with the original key. If he does that
often, he can perform traffic analysis. LRW is weak against it.

If the drive denies access when a wrong key is provided, the attacker
sees nothing. The drive remains locked, the LBA's hidden from the
attacker. If he puts the magnetic platters on a spin stand, with
expensive equipment he can get a snapshot, but it costs time and money,
and the attack gets discovered. When the disk encryption keys are
legitimately changed, the new key owner can read the old raw content of
the disk (re-encrypting it in SW with his new keys), but the old content
does not change any more, so there is no traffic to be analyzed.

These mean that an encrypting disk drive needs two new feature sets:
data encryption and access control. Both are complicated and both
require new disk commands, new disk electronics, firmware,
manufacturing tests, infrastructure, documentation, etc.

If LRW is done in the controller (the other end of the wire) or even in
SW, after temporarily connecting the drive to another computer, the raw
data can be accessed and a traffic analysis performed, unless the disk
drive still provides access control. In this case, half of the changes
are still needed in the disk design and the password/key information
has to be provided to both the encryptor and the disk drive. (The
current ATA security is not sufficient, because the password is
customarily stored in the drive, there are issues with sleep mode of
the host PC, diagnostic/debug modes of the drive, the BIOS needs to
cooperate, etc.) It is questionable if any disk manufacturer would
provide disk drives with secure access control but no data encryption.
Without it LRW in the controller or in SW is susceptible to traffic
analysis, and so less secure than internal disk encryption.

The picture would change somewhat with wide block encryption. If 4KB
blocks are encrypted together, the locality of a change on disk can
only be determined 256 times less accurately.

In this view, reasonable security is only achieved in practice, if the
encryption is done internally in the disk drive. There is no
interoperability. In theory, the disk manufacturers could employ
proprietary solutions, users won't be able to tell the difference.

The key export part of the standard is for key archiving. You only want
to use the key on one particular drive (to avoid comparison attacks),
and you have to provide the key at its power up time in a short, simple
manner (not with XML). In case the user forgets his password (and the
master password, and the enterprise password, etc.), he might need to
write it down and store it in a safe. Instead of a physical safe, a
secure XML file can be used, and only the XML encryption key is stored
in a physical safe.

There is also the US export control problem. If a disk drive can encrypt
data and provide it in raw, encrypted format, it can be used as an
encryption device. These need export control clearance. If the
encrypted data is not accessible, there are no problems with export. It
is also an issue with encryption in the controller. The encrypted data
can easily be diverted, and so the controller can be used as an
encryption device.

The value of the standard is:
- Saves the disk manufacturers the work of designing a good encryption
scheme themselves
- Disk designers don't need to repeat the security analysis the IEEE
standard went through
- Assures users that high level of security is provided, improves trust
- Assures users that there are no back doors left to their confidential
information
- Provides a uniform way of archiving disk keys or passwords

Laszlo

Reply via email to