POV-Ray : Newsgroups : povray.off-topic : Encrypted storage : Re: Encrypted storage Server Time
29 Jul 2024 22:24:10 EDT (-0400)
  Re: Encrypted storage  
From: Invisible
Date: 19 Aug 2011 04:00:56
Message: <4e4e1838@news.povray.org>
On 18/08/2011 07:39 PM, Darren New wrote:
> On 8/18/2011 10:57, Orchid XP v8 wrote:
>> Maybe if you sent certain requests, the timing of the responce varies
>> in a
>> way that tells you something about the encryption key or the password
>> hash
>> or the PRNG state. Maybe you can measure power consuption and find out
>> useful info. Heck, maybe the temperature varies, or it leaks RF signals.
>
> If it doesn't even respond to USB signals until you've unlocked it, it
> would seem to pretty much eliminate side-channel attacks.

Oh, well, if you're talking about the one with the combination lock 
(which *isn't* FIPS certified) then yeah. The most you could worry about 
is RF leakage, or maybe heat. (But you would need some damned sensitive 
thermometers to measure that.) I would imagine RF output is both very 
easy to check for and shield against.

I was thinking more about the ones where you insert the USB drive and it 
asks for a password before it will let you see the encrypted partition.

>> To me, that seems like a very strange way to implement. However,
>> there's no
>> particular reason why you can't use the SHA-1 hash of the password to
>> AES-encrypt the main AES encryption key. And then changing the
>> password is
>> /still/ instant, without having to re-encrypt any data.
>
> Well, yes, that's true. In any case, by the time you've taken that
> apart, you can probably brute-force the thing pretty easily. You don't
> have to brute-force the entire 160 bit SHA-1 key if you can brute-force
> the possible hashes of 5^10 (9 million) possible combinations.

Oh, sure, the password or PIN or whatever is *clearly* the weakest point 
in the system. (Assuming the RNG isn't broken...)


Post a reply to this message

Copyright 2003-2023 Persistence of Vision Raytracer Pty. Ltd.