Cleaning spray defeats disk encryption
A new attack using cleaning spray and an algorithm can break most disk encryption systems, claim researchers
Hard disk encryption can be broken using nothing more complex than a can of cleaning spray and a new algorithm, claim researchers at Princeton University.
The encryption key for most systems is stored in RAM, even if the user is not yet logged in.
The Princeton researchers have developed a new algorithm which can analyse a chip and decipher the key, allowing access to all encrypted data.
"We have found new attacks that can defeat most disk encryption products if an attacker gains physical access to the computer. These attacks are surprisingly practical, typically taking only a few minutes," explains a video from the group demonstrating such an attack.
While most people believe that the contents of RAM are immediately erased when power is lost, data is actually present for seconds or minutes after power loss, depending on the brand of chip.
Because of this, attackers can turn off power to the PC, quickly reboot and run an analytic algorithm to recover the encryption key.
Should this not be possible, the RAM chip can even be removed from the machine and transplanted into another, where the code can be run.
The rate at which data is lost can be slowed by cooling the chips, and researchers found that freezing RAM with an inverted cleaning spray can extend this period to ten minutes - long enough to remove RAM and transplant it into another computer.
"Whether your computer is at risk depends on what kind of disk encryption you use and what mode your computer is in when an attacker accesses it," explains the demonstration video.
"Most disk encryption systems can be defeated if the computer is stolen or accessed when it is in sleep mode or at a password protected screensaver. Windows Vista BitLocker is also sometimes vulnerable even when the computer is completely off."