This unlocking becomes hard when there are a lot of partitions with different keys that the drive does not know about...

I would suggest that a "wrong key behavior" can be beyond the scope of the work here.

JIm

On Dec 22, 2005, at 1:14 PM, [EMAIL PROTECTED] wrote:

If you make the data inaccessible unless the correct key is provided, then why bother with encryption at all?
Without disk encryption if you change (reset) your password, the disk
drive should be operational with the new password. You can just read
the old content off the disk, that is, the disk has to be erased before
reuse, which is a very slow and not full proof operation.

It just protects the data in case someone removes the platters from
the disk.
If the data is in the clear on the disk, there could be a large number
of attacks to bypass the access control, like temporarily connect the
head signal to another controller (after spin-up), insert or remove
data between the disk controller and the channel chip, force diagnostic
mode or just induce random faults in the controller. If the data is
encrypted with a key not stored in the drive, these attacks cannot get
to the data.

important to be able to read the data off the drive without giving the drive the key
There could be situations, where traffic analysis based attacks are
thwarted by some other means, like physical protection (a guard with a
machinegun). Then you could allow unauthenticated data access, but not
in personal or portable disks. If your application requires the ability
to make backup without providing the encryption key, there is a simple
solution: setup several authentication passwords. Some would lead to
the encryption key (for normal use), some password don't (for data
backup).

some communications encryption scheme should be used
When the wire is not completely inside the computer. Of course, in this
case you need secure communication but there is no requirement there
for keeping the length of the data. There are more types of attacks,
but we have a larger arsenal to protect against them.

Traffic analysis can be a threat even if the cable is in the box. As I
explained several times, colleagues at lunchtime, janitor at night,
intruder in weekends, etc. If someone can make several snapshots
undetected, he can locate the changes made in the disk. In some cases
(database, file system) the leak can be serious.

Laszlo
-------- Original Message --------
Subject: RE: wrong key behaviour
From: "Elliott, Robert (Server Storage)" <[EMAIL PROTECTED]>
Date: Thu, December 22, 2005 12:18 pm
To: <[EMAIL PROTECTED]>

If you make the data inaccessible unless the correct key is provided,
then
why bother with encryption at all?  It just protects the data in case
someone
removes the platters from the disk, which is a niche case.  The ATA
style
SECURE LOCK password feature leaves the drive open after reset, but a
more
secure varient of that could be used (I think TCG is developing
something
along those lines).

I think it's important to be able to read the data off the drive without
giving the drive the key.  This allows for disk copies and image
backups.
If the drive is encrypted with a key from the payroll department, the IT department can perform a backup without having to know the payroll key.

If concerned about security from the HBA to the drive, then some
communications encryption scheme should be used (Jim Hughes always
emphasizes the distinction between communications encryption and
storage encryption).
--
Rob Elliott, [EMAIL PROTECTED]
Hewlett-Packard Industry Standard Server Storage Advanced Technology
https://ecardfile.com/id/RobElliott




-----Original Message-----
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On
Behalf Of [EMAIL PROTECTED]
Sent: Wednesday, December 21, 2005 11:42 AM
To: SISWG
Subject: RE: wrong key behaviour

how does the drive know if the key it is given is wrong?
There are other options, too. For example, a secure hash of the key
could be stored in the drive for each key scope (a contiguous LBA
range). Alternatively, a public key MAC. This later method has the
advantage that an attacker cannot replace it arbitrarily, even if he
rips up the drive.

It is possible to store a disk key in the drive, which is
hard to hack.
It could be in some nonvolatile memory integrated with the crypto
engine. To get it, you have to get inside of a 65...130 nm integrated circuit, use microelectrodes and try not to damage the circuit. A very
expensive and slow process, which uncovers some secrets for only one
drive. Nevertheless, storing all the keys on disk is not the best
solution.

Laszlo

-------- Original Message --------
Subject: RE: wrong key behaviour
From: "Colin Sinclair" <[EMAIL PROTECTED]>
Date: Wed, December 21, 2005 12:04 pm
To: "SISWG" <[EMAIL PROTECTED]>

the drive must not return any data if the wrong key is given.

Not being funny, but how does the drive know if the key it
is given is wrong? Either

(a) it keeps a copy of the key internally (easy to hack), or

(b) it encrypts a special string and keeps that internally
(in flash or on media), or

(c) it must add a crpytographically safe integrity field
computed over the plaintext on each sector
to tell if it has been decrypted correctly. This is just
like adding authentication, and will add
overhead. It's probably not possible to rely on CRC because
that isn't always there (vendor specific
additional sector information).

I presume the only sensible method is (b)?

Colin.

Reply via email to