Download presentation
Presentation is loading. Please wait.
Published byMelvin Douglas Modified over 8 years ago
1
Systems Architecture http://sar.informatik.hu-berlin.de Microsoft BitLocker -> securing data on mobile devices Johannes Marotzke 21.05.2008
2
2 May 2006 - 2 Systems Architecture http://sar.informatik.hu-berlin.de Overview What is BitLocker? What encryption is being used? The Diffuser AES-CBC + Diffuser What about performance? Requirement What is a TPM? Bitlocker Configurations and risks - TPM, USB, TPM + PIN, TPM + USB Encryption File System - concept BitLocker + EFS References
3
3 May 2006 - 3 Systems Architecture http://sar.informatik.hu-berlin.de What is BitLocker? -Bitlocker Drive Encryption is a data protection Feature integrated in Windows Vista Ultimate and Windows Server (Enterprise) -Features full-volume encryption -Designed for use with compatible Trusted Platform module (TPM) -Provides recovery mechanism -Supports possible configurations: -Bitlocker with TPM -Bitlocker with USB -Bitlocker with TPM and PIN -Bitlocker with TPM and USB Device
4
4 May 2006 - 4 Systems Architecture http://sar.informatik.hu-berlin.de What encryption is being used? -Bitlocker uses the Advanced Encryption Standard (AES) -Which is a widely used symmetric block cipher (works on fixed blocks) -the AES in Cipher-block chaining mode (CBC) – by IBM 1976 -Each block of plaintext is XORed with the previous ciphertext block -BitLocker provides 128 Bit or 256 Bit Key Encryption -Bitlocker features also the Elephant-Diffuser -Instead writing the data in sequential order to the hard- disk, the data is put more randomly on the hard-disk through the diffuser
5
5 May 2006 - 5 Systems Architecture http://sar.informatik.hu-berlin.de The Diffuser -Diffuser? What for? -An attacker could manipulate cipher text to achieve a none random output in the plaintext -Watching cipher text changes during boot, exploiting those sectors through changing them and look at the effects -Creating meaningful plaintext changes through cipher text changing could lead to security holes -The diffuser diffuses the data in a random way to make manipulation attacks harder -AES-CBC + Diffuser gives better poor-mans protection -And if the diffuser algorithm gets broken there is still AES-CBC
6
6 May 2006 - 6 Systems Architecture http://sar.informatik.hu-berlin.de AES-CBC + diffuser -Block size can be anything between 512-8192 (any power of 2) -Plaintext is XORed with a sector key -> Plaintext runs through 2 un-keyed diffuser -> Plaintext is encrypted with AES-CBC -The sector key and the AES-CBC key are independent keys -(256 + 256) lower keys are possible, which means unused bits (128)
7
7 May 2006 - 7 Systems Architecture http://sar.informatik.hu-berlin.de What about performace? -Usually slower performance for encrypted partitions then unencrypted.. -Estimated 20% loss -Microsoft Performance Requirement (Ferguson): -Typical Machine 3 GHz P4 CPU & Hard Disk 50MB/s -> 60 clock cycles available per Byte -Laptops 1GHz & Hard Disk not significantly slower -> 40-30 clock cycles -Decryption must be faster than the disk -BitLocker meets the Requirement of 30 cycles -128 Bit AES-CBC at 20 cycles per byte -Diffuser at 10 cycles per byte -5% loss on test-systems with AES-CBC +Diffuser
8
8 May 2006 - 8 Systems Architecture http://sar.informatik.hu-berlin.de Requirement -Only included in Windows Vista Ultimate and Enterprise -C: must be at least 50 GB NTFS of size -1.5 GB NTFS boot partition -TPM – Chip (1.2v) or USB – Stick -BitLocker can be activated after the system installation -BitLocker Drive Preperation Tool -> MS-Site -Leads through the configuration process -Set recovery key -Secures only system partition -Other partition could be secured through EFS (key in system partition secured through BitLocker)
9
9 May 2006 - 9 Systems Architecture http://sar.informatik.hu-berlin.de What is a TPM? -TPM a microchip designed to provide basic security functions involving keys -Can create keys and encrypt them, so only TPM can decrypt them (called “wrapping” or “binding”) -Each TPM has a master wrapping key -> Storage Root Key (SRK), never exposed to other components -A “wrapped” key can be tied to specific hardware or software conditions (called “sealing”) -By sealing a key TPM creates a snapshot of configurations and file hashes (Platform Configuration Register - PCR) -A key is released only if a snapshot and the system are identical
10
10 May 2006 - 10 Systems Architecture http://sar.informatik.hu-berlin.de BitLocker -Risks depending on possible configurations: -Bitlocker with TPM (min. v1.2) -Easiest to deploy, manage and use -Least user interaction -> least protection -Bitlocker with USB -No TPM, important combing with strong login -BitLocker retrieves key from USB -Bitlocker with TPM and PIN -Best option, no external token -More secure but loss of usability and manageability (also no PIN-backup) -Anti-hammering protection (time till retry) -Bitlocker with TPM and USB Device -USB at boot time and at hibernation
11
11 May 2006 - 11 Systems Architecture http://sar.informatik.hu-berlin.de BitLocker with TPM 1)BIOS initiates the TPM which creates a snapshot from the system - PCR PCR includes Master boot record (MBR), NTFS boot sector & boot block and the boot manager and other critical components 2)if PCR as expected, the TPM decrypts the volume master key(VMK) with the SRK 3)Full volume encryption key (FVEK) is read and decrypted with the VMK FVEK is indirect secured through the VMK 4)Disk sectors are decrypted with FVEK while they are accessed 5)Plaintext data is provided to applications and processed
12
12 May 2006 - 12 Systems Architecture http://sar.informatik.hu-berlin.de BitLocker with TPM - mitigated risks Key discovery through offline attack - Location of encrypted FVEK know, attacker needs brute force attack - VMK encrypts FVEK, which is inside the TPM Offline attacks against the operating system - Mitigated by the fact of attacker getting the SRK from the TPM - Or brute-force on the FVEK, also the diffuser mitigates attacks on ciphertext (changes will propagate over a large area) Plaintext leaks through hibernation file - BitLocker encrypts the hibernation file Plaintext leaks through system paging file - BitLocker encrypts the paging file User error - Mitigated because BitLocker encrypts whole volume, so the user can not accidentally fail to encrypt important areas
13
13 May 2006 - 13 Systems Architecture http://sar.informatik.hu-berlin.de BitLocker with TPM - NOT mitigated risks Computer left in hibernation - BitLocker does not change Key in hibernation, FVEK is available to the system - Through setting the system to prompt for a login after hibernation can mitigate this risk Computer left in sleep(standby)mode - Same as hibernation, mitigate risk through login Computer left logged on and desktop unlocked – watch out Discover local/domain password – !!no further authentication!! Insider can read encrypted data – known user/pass Online attacks against the operating system - Unsealed volume is unprotected, inside system can be attacked Platform attacks – system boots till logon, holds key (DMA) Required authentication factor left with computer
14
14 May 2006 - 14 Systems Architecture http://sar.informatik.hu-berlin.de BitLocker with USB Device 1)OS starts and prompts for the USB stick containing the key 2)The VMK is decrypted with the key on the USB 3)The encrypted FVEK is read and decrypted with the decrypted VMK 4)Sectors are decrypted with the FVEK while accessed 5)Plaintext data is provided to applications and processed
15
15 May 2006 - 15 Systems Architecture http://sar.informatik.hu-berlin.de BitLocker with USB device - mitigated risks Computer left in hibernation - BitLocker prompts for USB device after hibernation Discover local/domain password – no use without USB Insider can read encrypted data – not without USB Key discovery through offline attack - Key from the USB encrypts the FVEK, only brute force (diffuser) Offline attack against the operating system - brute-force on the FVEK, also the diffuser mitigates attacks on ciphertext (changes will propagate over a large area) Plaintext leaks through hibernation file - encrypted Plaintext leaks through system paging file - encrypted User error – BitLocker encrypts all
16
16 May 2006 - 16 Systems Architecture http://sar.informatik.hu-berlin.de BitLocker with USB - NOT mitigated risks Computer left in sleep(standby)mode - mitigate risk through login after sleep Computer left logged on and desktop unlocked – watch out Online attacks against the operating system - After providing USB - Unsealed volume is unprotected, inside system can be attacked Platform attacks - system boots till logon with USB, system holds key (DMA) - Attacks against key possible Required authentication factor left with computer - USB device left with the computer
17
17 May 2006 - 17 Systems Architecture http://sar.informatik.hu-berlin.de BitLocker with TPM and PIN 1)BIOS initiates TPM, PCR measurements are taken and the user is prompted for a PIN 2)VMK is decrypted by TPM using the SRK (if PCR ok and PIN ok) 3)FVEK read and decrypted by VMK 4)Sectors are decrypted with the FVEK while accessed 5)Plaintext data is provided to applications and processed
18
18 May 2006 - 18 Systems Architecture http://sar.informatik.hu-berlin.de BitLocker with TPM and PIN - mitigated risks Computer left in hibernation - BitLocker prompts for PIN after hibernation Discover local/domain password - PIN is still securing the access, no point in having the login/pass Insider can read encrypted data - A user with an authorized domain can't access without the pin Key discovery through offline attack - VMK is encrypted through SRK(inside TPM) and PIN Offline attacks against the operating system - SRK & PIN are needed to decrypt the FVEK to access system files Required authentication factor left with computer - PIN is non physical hibernation file & paging file - encrypted User error - BitLocker encrypts all
19
19 May 2006 - 19 Systems Architecture http://sar.informatik.hu-berlin.de BitLocker with TPM & PIN - NOT mitigated risks Computer left in sleep(standby)mode - mitigate risk through login after sleep Computer left logged on and desktop unlocked - As usual better not happens Online attacks against the operating system - Active system does not prevent attacks from user Platform attacks - Without PIN keys stay secure - If PIN at boot time has been given system boot till user logon screen at which point FVEK is inside the system - Attacking the memory might cause leak out of the key
20
20 May 2006 - 20 Systems Architecture http://sar.informatik.hu-berlin.de BitLocker with TPM and USB Device 1)BIOS initiates TPM, PCR measurements are taken 2)the user is prompted for the USB device with the BitLocker key 3)TPM uses SRK to decrypt a key which is combined with the key on the USB to decrypt the VMK 4)FVEK read and decrypted by VMK 5)Sectors are decrypted with the FVEK while accessed 6)Plaintext data is provided to applications and processed
21
21 May 2006 - 21 Systems Architecture http://sar.informatik.hu-berlin.de BitLocker with TPM & USB- mitigated risks Computer left in hibernation - After hibernation USB is needed Discover local/domain password - Still need USB Insider can read encrypted data - Not without USB, only a domain login is not enough Key discovery through offline attack - Without USB attacker must mount brute force attack Offline attacks against the operating system - No USB no access, brute force attack to access key hibernation file and system paging file are encrypted User error – BitLocker encrypts all
22
22 May 2006 - 22 Systems Architecture http://sar.informatik.hu-berlin.de BitLocker with TPM & USB - NOT mitigated risks Computer left in sleep(standby)mode - After sleep mode the system still holds the key - Mitigate risk through setting windows to prompt for login Computer left logged on and desktop unlocked - Same as usual Online attacks against the operating system - An attacker that causes normal boot can attack the system Platform attacks - Having the system boot to windows login, the attacker can access memory which might lead to disclosure of the key Required authentication factor left with computer - If the USB is left with the computer it is accessible
23
23 May 2006 - 23 Systems Architecture http://sar.informatik.hu-berlin.de Configuration Summary
24
24 May 2006 - 24 Systems Architecture http://sar.informatik.hu-berlin.de Encrypting File System (EFS) ESF is a file system driver with file encryption available in windows 2000 and later (except xp home, vista home & basic) File encryption based on user access - Which means file encryption is only as strong as the user password File Encryption Key (FEK) - Only files are encrypted, below file system - An encrypted file is as such recognizable for all applications ESF security risks - Decrypting files using the local administrator password - Access private key through password reset - Plaintext files are only deleted after encryption and not overwritten Only on NTFS EFS weakness results through the OS
25
25 May 2006 - 25 Systems Architecture http://sar.informatik.hu-berlin.de BitLocker EFS combination EFS is a per-user encryption BitLocker is a per-computer encryption EFS is only as good as the system which controls the user access credentials Combining BitLocker with EFS - BitLocker encrypts the whole volume, the keys and user credentials to access EFS protected files
26
26 May 2006 - 26 Systems Architecture http://sar.informatik.hu-berlin.de BitLocker and EFS – Risk Summary
27
27 May 2006 - 27 Systems Architecture http://sar.informatik.hu-berlin.de References Data Encryption Toolkit for Mobile PCs: Security Analysis - http://www.microsoft.com/technet/security/guidance/clientsecurity/dataencryption/analysis/4e6ce820-fcac-495a-9f23-73d65d846638.mspx http://www.microsoft.com/technet/security/guidance/clientsecurity/dataencryption/analysis/4e6ce820-fcac-495a-9f23-73d65d846638.mspx BitLocker Drive Encryption Overview - http://windowshelp.microsoft.com/Windows/en-US/help/6035e2fd-ee50-4b74-9bfb-6c27bb6bf2201033.mspx http://windowshelp.microsoft.com/Windows/en-US/help/6035e2fd-ee50-4b74-9bfb-6c27bb6bf2201033.mspx SolutionBase: Follow these steps to secure your hard drive with Windows Vista BitLocker - http://articles.techrepublic.com.com/5100-10878_11-6162979.html http://articles.techrepublic.com.com/5100-10878_11-6162979.html “AES-CBC + Elephant diffuser A Disk Encryption Algorithm for Windows Vista“, Niels Ferguson Microsoft - 2006
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.