Re: the cold-boot attack

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



IT2 Stuart Blake Tener, USNR wrote:
> Mr. Applebaum:
> 
> Are you now suggesting that loop-aes has now been subverted in some manner?

Our paper is clear. Using general purpose memory for keying material is
not as safe as we'd all like. Depending on the time you decide to make
an acquisition of memory contents, you'll likely catch keying material
in memory regardless of software countermeasures.

This is not specific to loop-aes. I just happened to run our tools
against some loop-aes memory images and I found many AES key schedule
candidates.

To be clear:
I did not perform decryption tests against loop-aes disks with the
keying material I found.

The loop-aes code isn't as easy to patch for use with discovered keys as
say - dm-crypt's user space tools. It should be possible to do it in
short order though if someone were so inclined.

Regards,
Jacob Appelbaum

-
Linux-crypto:  cryptography in and on the Linux system
Archive:       http://mail.nl.linux.org/linux-crypto/


[Index of Archives]     [Kernel]     [Linux Crypto]     [Gnu Crypto]     [Gnu Classpath]     [Netfilter]     [Bugtraq]
  Powered by Linux