Forensics Tool Finds Headerless Encrypted Files 374
gurps_npc writes "Forensics Innovations claims to have for sale a product that detects headerless encrypted files, such as TrueCrypt Dynamic files.
It does not decrypt the file, just tells you that it is in fact an encrypted file. It works by detecting hidden patterns that don't exist in a random file. It does not mention steganography, but if their claim is true, it seems that it should be capable of detecting stenographic information as well."
Don't worry (Score:5, Insightful)
The company has "innovations" in it's name, so their product probably won't work.
If it did work against true crypt, which is a yard stick of well implemented encryption, I'm sure they'll come up with a counter measure by the next minor release.
Also: In before XKCD strip.
Re:Patterns? (Score:4, Insightful)
The fact that there's order in the encrypted information doesn't change the fact that, to an outside observer that doesn't know the original information or the key can't tell the difference between the encrypted information and true random noise. That's part of the point.
If they can tell that it's not random, that's a start on cracking the encryption and gaining the original information.
Re:Don't worry (Score:5, Insightful)
Since encryption implements a lossless conversion then the data is not random. BECAUSE random data is just that random.
Encryption in ECB mode leaves a very clear pattern, because identical input blocks leads to identical output blocks. Pretty much every other block chaining mode doesn't though because they mix it the preceding blocks, so i'm guessing an implementation flaw because the cryptographic primitives are pseudorandom, they have no distinguishable non-randomness unless you know the exact key.
Re:Plausible Denial? (Score:5, Insightful)
"That's cute, sir - now give us the other password"
- "what other password?"
"for the hidden truecrypt volume"
- "what hidden truecrypt volume??"
"the one that's being referred to by half a dozen applications' most recently used files lists"
- "oh err.. that's uh.. another drive entirely"
"very well, then hand us that other drive"
- "err uhm.. my dog ate it?"
If you're really, really serious about these things, maybe you could work super-diligently to prevent leaving any clues as to that hidden volume's existence.. odds are something's going to bite you in the behind somewhere though.
Re:Patterns? (Score:5, Insightful)
Dear mods, that's meant to be facetious. Some of you seem to be a little trigger-happy so you won't understand why I shouldn't have to explain that.
Make your joke and take the moderations like a man.
If you are going to explain that it is a joke, you might as well not bother in the first place since explaining takes away all the fun.
Re:Patterns? (Score:3, Insightful)
Re:Vindicated! (Score:3, Insightful)
encrypted information (short of a one time pad, which is the only way to get true noise) has an underlying structure in the data operated on.
The digits of pi have an underlying structure. If you have a way to distinguish an arbitrary stretch of pi from truly random data, I suspect you'll win a Fields Medal.
Re:Don't worry (Score:3, Insightful)
You've never heard of cruise control on a 500 mile trip have you?
Sure they do! :) (Score:3, Insightful)
[pb@localhost ~]$ tail ~/.bash_history
less GnosLoadPDFForms.pdf
file GnosLoadPDFForms.
mv GnosLoadPDFForms.pdf GnosLoadPDFForms.fdf
file GnosLoadPDFForms.fdf
evince GnosLoadPDFForms.fdf
less GnosLoadPDFForms.fdf
su
acroread GnosLoadPDFForms.fdf
top
Re:I'm calling BS (Score:3, Insightful)
OK, I checked it out. Here's how they "do" it:
1. No File Header.
2. (File size % 512) = 0
3. Successful X2 and Arithmetic Mean tests on certain bytes.
4. File size greater than 15 MB.
Step 2 == entropy tests.
In other words, they detect random looking files (which implicitly implies "no header") whose size is 0 mod 512 and is greater than 15MB.
Big fucking deal. It might be true that on your system, the only files that meet these characteristics are TrueCrypt volumes, but again it's trivial to create non-TrueCrypt files that meet these criteria. Simply, any true random file (whose size meets the above requirements) will be detected as a TrueCrypt file.
I stand by my assessment: BS.
Re:Don't worry (Score:5, Insightful)
You realize that you aren't saying anything at all, right? Your argument is that since encrypted data is different than random data (an assumption you make without stating), encrypted data will look different than random data.
In reality, one of the standards for encryption algorithms (and block chaining methods) is that they produce a pseudorandom output. In fact, block ciphers are often called upon to operate as PRNGs when given random input data. The idea is that they will produce a significantly larger amount of pseudorandom output data than the random seed data.
BTW I do mathematical cryptanalysis at a university...
Re:Don't worry (Score:5, Insightful)
BECAUSE random data is just that random.
Any kind of analysis that answers the question of whether a piece of data is random or deterministic can't do so with certainty. You can't prove a string of a million 1's wasn't randomly generated. Every piece of random data long enough will have substrings that appear to be a pattern.
Give a voice recognition program a low enough certainty threshold and it'll pick out words from below the noise floor. But the lower you go, it'll make more and more mistakes and eventually it'll pick out words from plain white noise.
Re:Is unreadable data really encrypted data? (Score:3, Insightful)
Re:Don't worry (Score:4, Insightful)
"Awww, jeez... the damn thing's gotten corrupted! My boss told me to keep my sensitive company files in an encrypted zip file, and it keeps screwing up"
Just because security through obscurity isn't good as the only defense doesn't mean that it's not quite handy in addition to others.
Re:Don't worry (Score:3, Insightful)
Re:Don't worry (Score:3, Insightful)
Your argument is that since encrypted data is different than random data (an assumption you make without stating), encrypted data will look different than random data.
He didn't say that. He said that, for TrueCrypt case, the "random" data on the disk in free sectors is not random at all - it's got bits of deleted files in it, and so on. So, it's rather low entropy. On the other hand, sectors used for TrueCrypt will actually contain truly random, high-entropy data. And statistical analysis will be able to tell the difference easily.
Re:Don't worry (Score:3, Insightful)
Re:Plausible Denial? (Score:3, Insightful)
And your non-virtual OS's swap file? You can turn it off, but that'd raise big suspicions.
Like what? Having 4GB of RAM? I have no swap on some systems, don't need it, why should I thrash my HDD?
Re:Patterns? (Score:3, Insightful)
"The right way to do this is simply to have the encryption code silently destroy access to the data when given a special, secondary password."
Have you never heard of "dd"? Bit-for-bit copying of an entire drive renders your special booby-trapped key completely pointless. Who are you trying to defend yourself against, Inspector Clouseau?
Re:Vindicated! (Score:3, Insightful)
Re:Don't worry (Score:2, Insightful)
Re:Don't worry (Score:5, Insightful)
I wish I had mod-points for you.
Finally we hear from someone who knows WTF he/she is talking about.
Just to expand a bit: encryption algorithms (except for one-time-pad) don't produce truly random output. But all good, modern ones seek to produce output that's as indistinguishable as possible from truly random output, as a necessary but not sufficient component of their security. There are a variety of techniques to produce pseudorandom data based on a variety of sophisticated mathematics.
It seems like the height of hubris to claim that one software program can reliably detect all these different kinds of extreme slight deviation from perfect randomness.
A more plausible approach (as others have pointed out), is to look for files that do appear to be totally random. Such files are likely to be either (a) the output of a random number generator, or (b) encrypted. All files that have some useful content in their present form have some structure or non-randomness.