Re: the cold-boot attack - a paper tiger?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



--- Richard Zidlicky <rz@xxxxxxxxxxxxxx> wrote:

> .. perfectly feasible
> with much of todays stock hardware. On multicore
> systems all you need is 
> a nonpreemptible kernel thread holding part of the
> key in its CPU registers. 
> That way you do not have the keys in main memory or
> they can be in main memory 
> but encrypted. The thread would also do the disk
> encryption so if designed
> carefully there would never be sufficient
> information in main memory
> to recover any data.
> 

Sounds like a solution. How hard would that be to
implement in loop-aes (is Jari reading?)



      

-
Linux-crypto:  cryptography in and on the Linux system
Archive:       http://mail.nl.linux.org/linux-crypto/


[Index of Archives]     [Kernel]     [Linux Crypto]     [Gnu Crypto]     [Gnu Classpath]     [Netfilter]     [Bugtraq]
  Powered by Linux