Cracking a Crypto Hard Drive Case 238
juct writes "A label on the box reading 'AES' does not ensure that your data are protected. heise examined a hard drive enclosure with an RFID key that is typical of many similar products. They found that the 128-bit AES hardware encryption claimed in advertisements was in fact a simple XOR encryption that they were able to break easily with a known plaintext attack." The manufacturer of the drive examined has announced that the product is being retooled and will be reintroduced later this year, presumably with actual AES encryption.
Criminal prosecution? (Score:5, Insightful)
So what happens... (Score:5, Insightful)
Does the mfg keep a list of serial #s and RFID keys so they can mail you/thief a replacement?
Re:How about a software solution? (Score:3, Insightful)
This has to be illegal (Score:5, Insightful)
Trust (Score:5, Insightful)
Trust is a precious resource that you must cultivate; it's not a boomerang. Never risk throwing it away.
Re:How about a software solution? (Score:5, Insightful)
Re:Leaves Software Based Encryption Relevant (Score:2, Insightful)
MOD PARENT UP (Score:4, Insightful)
That said, the case manufacturers should have tested the product themselves. They should at least offer returns / refunds.
Re:Criminal prosecution? (Score:5, Insightful)
It's
It's also NEVER a good idea to use any "crypto developed in-house". Manufacturers love to tell you since they developed it and their development is secret and such that their product is safe and secure, much more secure even since nobody knows how it works.
Cryptologists laugh at those claims, and everybody else should, too. These non-encrypting devices are a good reason as to why they do so.
If you want truly encrypted files and disks, don't rely on cheap external enclosures. TrueCrypt is not hard to use and offers a decent level of protection (forget Windows crypto, it's littered with backdoors unless configured JUST right, which is not an easy task and definitely not default). Under linux, it's decidedly easy to use AES encryption on block devices.
Re:So what happens... (Score:5, Insightful)
The question you should be asking is "If somebody copies my key, can I change the lock ?"
Re:And a legal battle ensues (Score:3, Insightful)
Well, as others have noted (Score:5, Insightful)
However more importantly, what good does the source really do you? I mean I can get the Truecrypt source, and I can look at it, but it really isn't going to tell me anything other than that I'm not very good at C++. I'm not a programmer by trade, so I certainly can't trace through all the complicated code that makes up a program like Truecrypt (it even includes assembly).
What's more, even if you are a programmer, it doesn't necessairily do you any good. Cryptography is a pretty specialized field and a pretty complex one. So while you might be able to trace through all the code and see what it does, do you have all the cryptographic knowledge to know if it is doing everything right? Can you tell the different between a properly and improperly applied algorithm? Will you notice a minor bug in assembly where they put a JNA instead of a JNAE? You might conclude everything looks fine, but be wrong simply because you don't understand how it works well enough or because the error is non-obvious.
Now please don't misunderstand, I'm not saying I think Truecrypt is untrustworthy. Far from it, I use and trust it. I am just saying that there is the false warm fuzzy myth about OSS that tends to get thrown around on
Well, while that certainly can, and does, happen with OSS, it can happen with closed software as well. Being open doesn't make it inherantly secure, and doesn't mean a normal person can tell.
For that matter, to really check crypto software you don't just need a code audit, it is even more important to do a results audit. Basically you take data, you encrypt it, and then you look at the result and see if it is good. You treat the software like a black box because the question isn't "Is it producing the correct result based on the code," the question is "Is it producing the correct result based on the cryptosystem." If I wanted to audit Truecrypt I wouldn't so much be interested in how it did things internally. Heck, even if I was an expert it might easily have a bug I'd miss (since after all other experts had written it and missed said bug). What I'd be interested in is having it do encryption, then comparing the result against controls. Maybe another AES implementation I knew to be good, maybe one I wrote, maybe a bit of a test worked out by pen and paper, maybe just trying to do cryptographic attacks against the ciphertext..
Regardless of the method, what I'd want to do is verify operation, not design. I imagine that's what they did in this case. Drive claims "this is AES encryption" so they do a little compare and contrast and, what do you know, it isn't.
Re:Criminal prosecution? (Score:5, Insightful)
How about some product testing. (Score:3, Insightful)
Am I wrong?
Re:How about a software solution? (Score:5, Insightful)
Especially since compiling the code yourself is completely sufficient to prevent security flaws. Erm. You were planning to audit it, right? Since everyone knows that's sufficient [bell-labs.com].
Computer security is hard. Doing it right is really hard.
Re:So what happens... (Score:5, Insightful)
Re:Well, as others have noted (Score:5, Insightful)
I'm not really inclined to trust some company that says product X is secure, but i'm far more likely to trust a string of unconnected individuals, especially if some of those individuals are recognised cryptography experts or have at least studied cryptography at a reputable establishment.
Sure it's not perfect, but its a huge step in the right direction. The only perfect solution would be to study cryptography and programming (in whatever language) yourself first.
Re:How about some product testing. (Score:4, Insightful)
Yes, you are. You're thinking way too technical and way too little in marketing terms. If you want to make money, the easiest way is to find enough clueless users that will swallow your marketing babble hook, line and sinker and sell your stuff to them.
Re:Criminal prosecution? (Score:1, Insightful)
AES in counter mode? (Score:4, Insightful)
So, it's perfectly possible that they are not lying at all, they just are not very good at crypto.
Re:Criminal prosecution? (Score:5, Insightful)
Re:And a legal battle ensues (Score:3, Insightful)
XOR is good enough for general situations (Score:3, Insightful)
Re:It's not the company's fault... (Score:4, Insightful)
Definitely not anything unheard of. Sometimes you get a gem out of the Chinese stuff. Most of the time, though, you
get shoddy workmanship, which is what you expect. That's because the incentives are on cutting corners wherever you
can on the stuff over there. That's part of why I question any value in much, if not most, of the offshoring we keep
insisting upon doing here in the States.
Re:Freecom equally bad (Score:2, Insightful)
You immediately attribute to malice and fraud that which could be explained plausibly in several other ways. If the device worked as expected, real antenna or not, I fail to see the justification for your complaint. At worst, the design is a smart marketing decision; at best, it is a vestigial part from an earlier design iteration.