hard disk encryptions

19
Full Hard Disk Encryption

Upload: nu-the-open-security-community

Post on 29-Nov-2014

1.535 views

Category:

Technology


1 download

DESCRIPTION

Hard Disk Encryptions by Imran @ null Hyderabad Meet, March, 2011

TRANSCRIPT

Page 1: Hard Disk Encryptions

Full Hard Disk Encryption

Page 2: Hard Disk Encryptions

Agenda

What Why Where When Who can do it How

Page 3: Hard Disk Encryptions

What is encryption

In cryptography, encryption is the process of transforming information (referred to as plaintext) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is

encrypted information (in

Page 4: Hard Disk Encryptions

What is FDE

Disk encryption uses disk encryption software or hardware to encrypt every bit of data that goes on a disk or disk volume. The term "full disk encryption" (or whole disk encryption) is often used to signify that everything on a disk is encrypted, including the programs that can encrypt bootable operating system partitions Disk encryption prevents unauthorized access to data storage.--source: wikipedia

Page 5: Hard Disk Encryptions

Why Disk/file Encryption ?

Because (there are infinite reasons to do it): Its last line of defense in case

everything else fails information is more important than

anything else nowadays of security,privacy, confidentiality and

integrity

Page 6: Hard Disk Encryptions

Where can we use FDE/encryption ?

Everywhere !!!

Page 7: Hard Disk Encryptions

When ?

* Its never too late.* When you feel its time !* when you start taking security seriously !!!

Page 8: Hard Disk Encryptions

Who can do it ?

Page 9: Hard Disk Encryptions

How ?

Open source to the rescue ! Easy to use (those pointy clicky

things, dont know what ? ), GUI's No major performance hits

Page 10: Hard Disk Encryptions

Here comes interesting stuff

Various types of encryption for different levels.

Disk controller level–

Volume level–

Disk block level–

Filesystem level–

Directory level–

File level–

Row and column level (for

databases)

Page 11: Hard Disk Encryptions

Encryption tools (continued)

The biggest weakness with encryption tools is not the algorithm, but how encryption keys are managed.

Some tools allow only one passphrase, forcing groups of staff to share it, which can result in it being divulged.

Some tools store the passphrase in a weak manner, allowing for easy brute force cracking using rainbow tables or dictionaries.

Some tools may be poorly designed

and leave sensitive information out of the

Page 12: Hard Disk Encryptions

Disk controller encryption

Pros

As the encryption is done in hardware, little to no performance loss is encountered.

A secure erase and repurposing of the drive can be done in milliseconds by wiping and generating a new master encryption key.

Cons

Only select few drives have AES encryption on the drive controller level.

Key management is an issue with some drives, as they only may have one password that would have to be shared

among staff.

Page 13: Hard Disk Encryptions

Disk/Volume encryption (BitLocker, PGP Whole Disk

Encryption)Pros

Generally excellent key management depending on utility.

Recovery of data by IT staff is doable. BitLocker can store recovery keys in Active Directory, PGP can issue disk recovery tokens.

Encrypts everything on the disk, OS, data, and

all. This protects against

Cons Most are commercially licensed. Malicious software that manages

to get superuser access can pull the master decryption keys from memory and set them aside for later use by an attacker.

May have performance issues if used on volumes with high read/write throughput.

May render data unrecoverable if used with RAID, depending on program.

Only protects if the machine is powered off or volumes are

unmounted.

Page 14: Hard Disk Encryptions

Filesystem encryption (EncFS, FileVault)

Pros

Able to resize filesystems without having to copy data or decrypt files.

Backup programs can store the encrypted data.

Users can have their own encrypted directories, protected

against a root/admin

Cons

Sensitive data, if stored outside the protected filesystems can be left unprotected.

None have any enterprise level recovery abilities. EncFS only has one passphrase, FileVault can offer a recovery passphrase, but that isn’t scalable.

Page 15: Hard Disk Encryptions

Directory/file level (EFS)

Pros

Excellent recoverability.

Multiple users can have access to groups of encrypted files.

Cons

Confidential information can leak, if stored outside the EFS protected directory.

Unless a backup program uses special semantics to back EFS protected files up, the backup will fail.

Page 16: Hard Disk Encryptions

Row/Column level for databases

Pros

Encryption is independent of the system.

Resistant to compromise even if superuser privileges are obtained by unauthorized entities.

Most new DBMS programs support this.

Cons

Key management is an issue. Where does the app keep its authorization credentials?

Recovery of encrypted data is iffish, depends on the database program.

Sometimes hard to

sync up encrypted

Page 17: Hard Disk Encryptions

Hardware assisted encryption (cryptographic tokens)

Pros

Protects against brute force password guessing by either disabling access after a number of password guesses, or adding a significant delay between entries.

Allows a machine to boot unattended while providing hard disk protection (Bitlocker).

Cons Hardware is sometimes hard

to find. For example, its hard to find machines with an onboard TPM/security chip.

Different drivers required for different cards. There is no real standard for cryptographic token I/O, other than APDU.

Hardware can fail, locking legitimate users out.

Page 18: Hard Disk Encryptions

Demo !!!

1. True Crypt2. Encfs3. Luks/cryptsetup

Page 19: Hard Disk Encryptions

Thanks