Security Basics mailing list archives
Re: Re: Hard disk Encryption
From: Alexander Klimov <alserkli () inbox ru>
Date: Sun, 15 Apr 2007 11:20:45 +0300 (IDT)
On Thu, 12 Apr 2007, Balaji Prasad wrote:
I wanted to start a discussion on strong and weak algorithms for disk encryption, their popularity and specific tradeoffs. Do we know of any test tools that can break an encrypted hard disk? What possible options does a hacker have if they have access to an encrypted disk.
Despite what you can see in movies [1], the real-life cryptographers believe [2] that it will not be possible to crack AES with random 128-bit key long beyond 2030. Since AES is quite fast there is no trade-offs -- just use AES. The main problem is how you store (or derive) the key. For example, if you use TPM to store the key, it will be easily extracted by an attacker with hardware tools for bus access. [1] <http://www.schneier.com/blog/archives/2005/04/blowfish_on_24.html> [2] <http://csrc.nist.gov/publications/nistpubs/800-57/SP800-57-Part1.pdf> -- Regards, ASK
Current thread:
- Re: Re: Hard disk Encryption Balaji Prasad (Apr 12)
- Re: Re: Hard disk Encryption Ali, Saqib (Apr 12)
- Re: Re: Hard disk Encryption Alexander Klimov (Apr 15)
- Re: Re: Hard disk Encryption Ali, Saqib (Apr 16)
- Re: Hard disk Encryption Alexander Klimov (Apr 16)
- Re: Hard disk Encryption Ali, Saqib (Apr 16)
- Re: Hard disk Encryption Alexander Klimov (Apr 17)
- Re: Hard disk Encryption Ali, Saqib (Apr 17)
- Re: Hard disk Encryption Alexander Klimov (Apr 18)
- Re: Hard disk Encryption Ali, Saqib (Apr 19)
- Re: Hard disk Encryption Alexander Klimov (Apr 24)
- Re: Re: Hard disk Encryption Ali, Saqib (Apr 16)