En Crypt Ing Technologies For The Forensic Investigator
En Crypt Ing Technologies For The Forensic Investigator
• What is it?
• Who uses it?
• Where is it found?
– Bitlocker (Vista)
– Whole Disk Encryption
– Hardware based Encryption
– Software based Encryption
• How does it work?
What are we learning today?
PART 2 – DEFEATING Encryption
Two weeks ago BBC News published an article speculating about a possible “back door” in BitLocker
(http://news.bbc.co.uk/1/hi/uk_politics/4713018.stm). The suggestion is that we are working with governments
to create a back door so that they can always access BitLocker-encrypted data.
Well, maybe not literally---I’m not ready to be a martyr quite yet---but certainly not in any product I work on. And I’m not
alone in that sentiment. The official line from high up is that we do not create back doors. And in the unlikely
situation that we are forced to by law we’ll either announce it publicly or withdraw the entire feature. Back doors
are simply not acceptable. Besides, they wouldn’t find anybody on this team willing to implement and test the
back door.
We are of course talking to various governments; we want them to buy Vista and use BitLocker for their own security.
We get the typical questions you always get: ease of use, performance, security, etc. We also get questions
from law enforcement organizations. They foresee that they will want to read BitLocker-encrypted data, and
they want to be prepared. Like any security technology BitLocker has its avenues of attack and law
enforcement should know about them. For example, if they search a house and find a computer, they should
also take all USB thumb drives, as these might contain a BitLocker key. This information is not secret; our users
need to have the same information when they make the security vs. convenience tradeoff of choosing a key-
protection option (TPM only, USB key, TPM + USB key, etc.) We plan on having a KB article with the details
when Vista ships.
• Key Specifications
– AES encryption
– 5400-RPM performance
– 2.5-inch form factor
– SATA 1.5Gb/s with Native Command Queuing
– 8-MB cache
• Ah, but what about the dreaded massively distributed cracking brute force method for
attacking something like 128 bit RC5 encryption? There are massive zombie farms
of infected computers throughout the world and some may have gotten as big as 1
million infected computers. What if that entire army was unleashed upon the
commonly used 128 bit RC5 encryption? Surprisingly, the answer is not much. For
the sake of argument, let’s say we unleash 4.3 billion computers for the purpose of
distributed cracking. This means that it would be 4.3 billion or 2 to the 32 times faster
than a single computer. This means we could simply take 2 to the 128 combinations
for 128-bit encryption and divide it by 2 to the 32 which means that 2 to the 96 bits
are left. With 96 bits left, it’s still 4.3 billion times stronger than 64 bit encryption. 64
bit encryption happens to be the world record for the biggest RC5 bit key cracked in
2002 which took nearly 5 years to achieve for a massive distributed attack.
Encryption – How does it work, cont’d.
• Now that we know that the distributed attacks will only shave off a few bits, what about Moore’s
law which historically meant that computers roughly doubled in speed every 18 months? That
means in 48 years we can shave another 32 bits off the encryption armor which means 5 trillion
future computers might get lucky in 5 years to find the key for RC5 128-bit encryption. But with
256-bit AES encryption, that moves the date out another 192 years before computers are
predicted to be fast enough to even attempt a massively distributed attack. To give you an idea
how big 256 bits is, it’s roughly equal to the number of atoms in the universe!
• Once some of these basic facts on encryption become clear, "is encryption crackable" isn’t the
right question because the real question is "when can it be cracked and will it matter then". This is
just like Bank safes which are rated by the time it takes an attacker to crack it open and never sold
as "uncrackable". Encryption strength and the number of bits used are selected based on how
many decades the data needs to be kept safe. For a secure E-Commerce transaction, the data
being transmitted is moot after a few decades which is why 128-bit encryption is perfectly suitable
since it’s considered unbreakable for the next few decades. For top secret classified data that
needs to remain secret for the next 100 years, the Government uses NIST certified 256-bit AES
encryption. So the next time someone tells you that encryption is crackable, ask him if he’ll be
around on this earth to see it demonstrated. -- GEORGE OU, ZDNET
Encryption – a clue to defeat
• Standards and cryptographic software and
hardware to perform encryption are widely
available, but successfully using encryption to
ensure security may be a challenging problem.
A single slip-up in system design or execution
can allow successful attacks. Sometimes an
adversary can obtain unencrypted information
without directly undoing the encryption.
-- from Wikipedia
Defeating Encryption
• There are several ways to defeat
encryption. They can be categorized into
four main groups:
Reference:http://www.forensickb.com/2008/01/incident
-response-recovering-bitlocker.html
Password (key) Attack – Ed Felten
• Today eight colleagues and I are releasing a significant new
research result. We show that disk encryption, the standard
approach to protecting sensitive data on laptops, can be defeated by
relatively simple methods. We demonstrate our methods by using
them to defeat three popular disk encryption products: BitLocker,
which comes with Windows Vista; FileVault, which comes with
MacOS X; and dm-crypt, which is used with Linux. The research
team includes J. Alex Halderman, Seth D. Schoen, Nadia Heninger,
William Clarkson, William Paul, Joseph A. Calandrino, Ariel J.
Feldman, Jacob Appelbaum, and Edward W. Felten.