Comment Re:Why not just use TrueCrypt? (Score 1) 237
Benefits are as follows:
1. The unencrypted portion of the disk (boot record) can still be tampered with: a. planting passphrase-stealing code in boot code for later retrieval b. brute-forcing the passphrase
2. The user might only need to type in a short PIN number rather than a long passphrase. Often, the weakness of an encryption solution isn't the encryption, but bad practices on the part of the user, including bad passwords. A hardware-based solution means that a strong, cryptographically random password is generated, and then unlocked by a weaker password/PIN. However, the hardware chip restricts the number of guesses an attacker can make, meaning the entropy of the password/PIN is less relevant.
4. Resistance to cold boot" attack. This attack exploits the fact that the contents of RAM can be read even after shutting down a machine, meaning that cryptographic keys held in RAM can be obtained. Hardware-based full disk encryption (FDE) solutions retain the key (in a safe, tamper-resistant memory cache) rather than ever copying it to main memory.
Ultimately, the reason for the focus on hardware-based FDE has a lot to do with economics and little to do with conspiracy theories. Private enterprise knows that government and corporate mandates to secure mobile media mean that the demand for FDE will rise. Companies that are responsive will flourish; others will lose market share. Solutions that are later found to fail or have a backdoor in any form will be subject to massive liability, such as lawsuits, as well as massive divestment. It's economics, not geekdom, that is driving hardware-based FDE.
1. The unencrypted portion of the disk (boot record) can still be tampered with: a. planting passphrase-stealing code in boot code for later retrieval b. brute-forcing the passphrase
2. The user might only need to type in a short PIN number rather than a long passphrase. Often, the weakness of an encryption solution isn't the encryption, but bad practices on the part of the user, including bad passwords. A hardware-based solution means that a strong, cryptographically random password is generated, and then unlocked by a weaker password/PIN. However, the hardware chip restricts the number of guesses an attacker can make, meaning the entropy of the password/PIN is less relevant.
4. Resistance to cold boot" attack. This attack exploits the fact that the contents of RAM can be read even after shutting down a machine, meaning that cryptographic keys held in RAM can be obtained. Hardware-based full disk encryption (FDE) solutions retain the key (in a safe, tamper-resistant memory cache) rather than ever copying it to main memory.
Ultimately, the reason for the focus on hardware-based FDE has a lot to do with economics and little to do with conspiracy theories. Private enterprise knows that government and corporate mandates to secure mobile media mean that the demand for FDE will rise. Companies that are responsive will flourish; others will lose market share. Solutions that are later found to fail or have a backdoor in any form will be subject to massive liability, such as lawsuits, as well as massive divestment. It's economics, not geekdom, that is driving hardware-based FDE.