TrueCrypt Šifrovanie diskov Vladimír Tkáč.

Slides:



Advertisements
Similar presentations
DES The Data Encryption Standard (DES) is a classic symmetric block cipher algorithm. DES was developed in the 1970’s as a US government standard The block.
Advertisements

ECE454/CS594 Computer and Network Security
“Advanced Encryption Standard” & “Modes of Operation”
L1.2. An Introduction to Block Ciphers Rocky K. C. Chang, February 2013.
Cryptography & Security Presented April 16, 2010 By Dave Stycos, Zocalo Data Systems.
Web Security for Network and System Administrators1 Chapter 4 Encryption.
K. Salah1 Cryptography Module II. K. Salah2 Data Encryption Standards DES.
CS470, A.SelcukAfter the DES1 Block Ciphers After the DES CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Encryption Schemes Second Pass Brice Toth 21 November 2001.
CN8816: Network Security1 Confidentiality, Integrity & Authentication Confidentiality - Symmetric Key Encryption Data Integrity – MD-5, SHA and HMAC Public/Private.
1 Chapter 4 Encryption. 2 Objectives In this chapter, you will: Learn the basics of encryption technology Recognize popular symmetric encryption algorithms.
Block Cipher Transmission Modes CSCI 5857: Encoding and Encryption.
Martinus Djamaluddin ITEC400V1FF Prof. Robert D’Andrea April 10, 2008.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 11 Basic Cryptography.
Network Security Lecture 4 Modes of Operation Waleed Ejaz
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
3DES and Block Cipher Modes of Operation CSE 651: Introduction to Network Security.
Chapter 9: Algorithms Types and Modes Dulal C. Kar Based on Schneier.
Lecture 4 Page 1 CS 236 Stream and Block Ciphers Stream ciphers convert one symbol of plaintext immediately into one symbol of ciphertext Block ciphers.
1.1 Chapter 8 Encipherment Using Modern Symmetric-Key Ciphers Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
BLOCK CIPHER SYSTEMS OPERATION MODES OF DATA ENCRYPTION STANDARD (DES)
Shambhu Upadhyaya Security – AES-CCMP Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 13)
Modes of Usage Dan Fleck CS 469: Security Engineering These slides are modified with permission from Bill Young (Univ of Texas) 11 Coming up: Modes of.
Stream Ciphers and Block Ciphers A stream cipher is one that encrypts a digital data stream one bit or one byte at a time. Examples of classical stream.
Ronnie Mullins By: Ronnie Mullins. History Developed by the U.S. Military Prevents (or at least delays) an attacker Also implemented in Fire Prevention.
Lecture 4 Page 1 CS 236 Stream and Block Ciphers Stream ciphers convert one symbol of plaintext immediately into one symbol of ciphertext Block ciphers.
Cipher Transmission and Storage Modes Part 2: Stream Cipher Modes CSCI 5857: Encoding and Encryption.
1 CPCS425: Information Security (Topic 5) Topic 5  Symmetrical Cryptography  Understand the principles of modern symmetric (conventional) cryptography.
Systems Architecture TrueCrypt Martin Bösler
Modes of Operation block ciphers encrypt fixed size blocks – eg. DES encrypts 64-bit blocks with 56-bit key need some way to en/decrypt arbitrary amounts.
Block Cipher Encrypting a large message Electronic Code Book (ECB) message m1 m2 m3 m4 m5 m6 c1 c2 c3 c4 c5 c6 E E E Secret.
Symmetric-Key Cryptography CS 161: Computer Security Prof. Raluca Ada Popa Sept 13, 2016.
Practical Aspects of Modern Cryptography Josh Benaloh & Brian LaMacchia.
CS480 Cryptography and Information Security
Symmetric Cryptography
PV204 Security technologies
Triple DES.
AES (Rijndael) Joan Daemen and Vincent Rijmen, “ The Design of
Homework #2 J. H. Wang Oct. 19, 2017.
Network Security.
Outline Desirable characteristics of ciphers Stream and block ciphers
Unit -1.
The Advanced Encryption Standard: Rijndael
رمزنگاري متقارن بهروز ترك‏لاداني 1.
Symmetric Key Block Ciphers
Cryptography Basics and Symmetric Cryptography
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Message Authentication Codes, Hashes and Message Digests
مروري برالگوريتمهاي رمز متقارن(كليد پنهان)
Block cipher and modes of encryptions
Rivest, Shamir and Adleman
Practical Aspects of Modern Cryptography
CSE 484 Midterm Review “1st half of the quarter in 5 slides”
csci5233 computer security & integrity (Chap. 4)
Symmetric-Key Encryption
Block vs Stream Ciphers
Hiding Information, Encryption, and Bypasses
ADVANCED ENCRYPTION STANDARDADVANCED ENCRYPTION STANDARD
Network Security.
Chapter -3 ADVANCED ENCRYPTION STANDARD & BLOCK CIPHER OPERATION
Block Ciphers: DES and AES
Padding Oracle Attacks
Homework #2 J. H. Wang Oct. 18, 2018.
SOHAIL SHAHUL HAMEED Dr. BHARGAVI GOSWAMI
IEEE MEDIA INDEPENDENT HANDOVER DCN: xx-00-sec
Elect. Codebook, Cipher Block Chaining
Review of Cryptography: Symmetric and Asymmetric Crypto Advanced Network Security Peter Reiher August, 2014.
Secret-Key Encryption
Presentation transcript:

TrueCrypt Šifrovanie diskov Vladimír Tkáč

Motivácia Ochrana citlivých údajov Súkromie Vysoká cena informácií cena informácií >>> cena média (zariadenia) Riešenie: obmedzenie prístupu (fyzické, SW) šifrovanie

Troška teórie Bloková šifra symetrické šifrovanie pracuje s pevným počtom bitov= Blok rozdelenie veľkých správ do blokov dopĺňanie (padding) meta-prúdová šifra AES (Advanced Encryption Standard) (3)DES (Data Encryption Standard) Twofish ...

Troška teórie: Mód ECB ECB (Electronic codebook)

Troška teórie: Mód ECB(2) Nevýhody ECB Vzory – rovnaké bloky šifrovanej správy sa prekladajú rovnako Žiadna kontrola integrity - (možná zámena blokov)

Troška teórie: Mód CBC CBC (Cipher-block chaining)

Troška teórie: Mód CBC(2) zašifrovanie: odšifrovanie: Výsledok

Troška teórie: Ostatné módy LRW (Liskov-Rivest-Wagner) primárny a sekundárny kľúč modifikácia sekundárneho kľúča podľa pozície bloku => šifrovanie blokov na rôznej pozícií rôznymi kľúčmi XEX (Xor-Encrypt-Xor) rozdelenie jedného kľúča na dve časti XTS XEX, TCB (Tweaked CodeBook), CTS (CipherText Stealing) XEX+TCB+CTS=XTS (XTC)

TrueCrypt open source (TrueCrypt License) Multiplatformový Max. veľkosť šifrovaného disku = 1,048,576GB (1PB) Po inštalácii ~6MB Funkcie: OTFE (on-the-fly encryption ) súborové zväzky (file-hosted container ) šifrovanie systémového disku skryté zväzky (hidden volume) cestovný disk (traveller disk)

D. Whiting, D. Wagner, C. Hall, TrueCrypt: Algoritmy Algorithm Designer(s) Key Size (Bits) Block Size (Bits) Mode of Operation AES J. Daemen, V. Rijmen 256 128 XTS Serpent R. Anderson, E. Biham, L. Knudsen Twofish B. Schneier, J. Kelsey, D. Whiting, D. Wagner, C. Hall, N. Ferguson AES-Twofish 256; 256 AES-Twofish-Serpent 256; 256; 256 Serpent-AES Serpent-Twofish-AES Twofish-Serpent

TrueCrypt: Princíp Vytvorenie nového disku: výber blokovej šifry pre šifrovanie dát (hlavičky a dátových sektorov) v móde XTS výber hashovacieho algoritmu Whirlpool, SHA-512, RIPEMD-160 vytvorenie hlavičky, naformátovanie informácia o algoritmoch sa nikde neukladá! Otvorenie existujúceho disku: rekonštrukcia algoritmov (skúšanie všetkých) overenie správnosti dešifrovanie hlavičky získanie prístupu k dátam (cez kľúč v hlavičke)

TrueCrypt: Hlavička prvých 512B na každom disku vytvorenom TrueCryptom Offset (bytes) Size (bytes) Encryption Status Description   0  64   Not Encrypted  Salt 4   Encrypted  ASCII string “TRUE” 68  2   Volume header format version 70   Minimum program version required to open the volume 72   CRC-32 checksum of the (decrypted) bytes 256-511 76  8   Volume creation time 84   Header creation/modification time 92   Reserved (set to zero) 100   Size of the volume 108   Byte offset of the encrypted area 116   Size of the encrypted area 124  132  256  Var.  Concatenated primary and secondary master keys 512   Data area (virtual volume contents)

TrueCrypt: Sprievodca Vytvorenie šifrovaného disku:

Cold Boot Attack Vývojári z Prinstonskej Univerzity a Electronic Frontier Foundation Pri šifrovaní on-the-fly je heslo uložené v RAM Priamy prístup k RAM cez rozhranie firewire V niektorých notebookoch sa po reštartovaní uchováva obsah RAM až 1min => boot z externého disku, získanie obsahu RAM Zmrazenie RAM na -50°C a prenos do iného zariadenia (do 10min) útoku bol úspešne vyskúšaný na Apple FileVault, Microsoft BitLocker, Truecrypt a linuxovom dm- crypt.

Koniec Ďakujem za pozornosť 

Zdroje http://www.truecrypt.org/docs/ http://cryptography.hyperlink.cz/2007/ST_2007_07_18_18.pd f http://crypto-world.info/klima/2003/st_2003_12_18_19.pdf http://en.wikipedia.org/wiki/Block_cipher_modes_of_operati on http://en.wikipedia.org/wiki/Disk_encryption_theory http://www.root.cz/clanky/truecrypt-profesionalni-ochrana- dat-zdarma/ http://citp.princeton.edu.nyud.net/pub/coldboot.pdf http://youtube.com/watch?v=JDaicPIgn9U