Cleaning spray defeats disk encryption
By Matthew Sparkes
Posted on 22 Feb 2008 at 10:33
Hard disk encryption can be broken using nothing more complex than a can of cleaning spray and a new algorithm, claim researchers at Princeton University.
The encryption key for most systems is stored in RAM, even if the user is not yet logged in.
The Princeton researchers have developed a new algorithm which can analyse a chip and decipher the key, allowing access to all encrypted data.
"We have found new attacks that can defeat most disk encryption products if an attacker gains physical access to the computer. These attacks are surprisingly practical, typically taking only a few minutes," explains a video from the group demonstrating such an attack.
While most people believe that the contents of RAM are immediately erased when power is lost, data is actually present for seconds or minutes after power loss, depending on the brand of chip.
Because of this, attackers can turn off power to the PC, quickly reboot and run an analytic algorithm to recover the encryption key.
Should this not be possible, the RAM chip can even be removed from the machine and transplanted into another, where the code can be run.
The rate at which data is lost can be slowed by cooling the chips, and researchers found that freezing RAM with an inverted cleaning spray can extend this period to ten minutes - long enough to remove RAM and transplant it into another computer.
"Whether your computer is at risk depends on what kind of disk encryption you use and what mode your computer is in when an attacker accesses it," explains the demonstration video.
"Most disk encryption systems can be defeated if the computer is stolen or accessed when it is in sleep mode or at a password protected screensaver. Windows Vista BitLocker is also sometimes vulnerable even when the computer is completely off."
Is your business a social business? For helpful info and tips visit our hub.
- CeBit 2014 diary: Cameron comes to town
- The 5 most interesting UK businesses at SXSW
- Quickest way to upload 1GB? Hop on a train
- Move over Delia: IBM Watson is cooking tonight
- Eric Schmidt on the double-edged smartphone: friend and foe
- Getty joins the race to the bottom
- Hour of Code: five steps to learn how to code
- Sony Xperia Z2 Tablet review: first look
- Sony Xperia Z2 review: first look
- Samsung Galaxy Gear 2 review: first look
- Headings vs headers: how to use both in Word
- Windows Server 2012 R2: how the Datacenter edition could change SMBs
- Invoices and VAT: how to set up your documents correctly
- Nexus 5 vs Samsung Galaxy S4 Active: the best phone for avoiding screen burn
- How much is a social user worth?
- The key to choosing a secure password
- Thunderbolt Bridge: a fast Mac migration tool
- Should you advertise on Twitter?
- How to track a lost smartphone
- Self-publishing success: the best way to sell your book