An Improved Trusted Full Disk Encryption Model

Size: px
Start display at page:

Download "An Improved Trusted Full Disk Encryption Model"

Transcription

1 An Improved Trusted Full Disk Encryption Model Prasenjit Das and Nirmalya Kar Department of Computer Sc. & Engineering, National Institute of Technology Agartala, India. Abstract. This paper presents a complete analysis of current storage protection models like Encrypting File System (EFS), traditional Full Disk Encryption (FDE), FDE with Trusted Platform Module (TPM) chip and Trusted Full Disk Encryption (TFDE) model, and points out the security loop-holes an attacker can exploit in them. Based on the design of TFDE we introduce a new model which incorporates all the best security features of the models mentioned above. Digital certificate based user identification as in EFS, protects data between users. Encrypted partition secures critical data and file metadata at disk level. Trusted Platform Module is used to hide all the encryption and signing keys in separate hardware unreachable to preying eyes of attackers. The TFDE model is modified to protect systems coming out of standby mode from potential attacks. The new model also provides safe and easy recovery mechanism in case user forgets his password or a stolen system is found or recovered. Keywords: EFS, encryption, FDE, TPM, trusted full disk, storage security. 1. Introduction In today s world the most valuable asset is information. Stealing, publishing or modification of critical information about any person or organization may lead to social discrepancy and economic collapse. This is why protection of user system and data is of utmost importance and different tools are being developed for this purpose like EFS, FDE, FDE with TPM and TFDE model. Each model has its weaknesses and drawbacks. To evaluate and select the optimum solution for a given system or environment we have to analyze many intricate criterions such as security level, performance, key management issues and overall cost [1]. Most of the attacks exploit flaws in software. The risk increases exponentially if an attacker gets physical access to the system. To protect data against today s increasingly sophisticated attacks software based solutions are not enough. Tamper-proof hardwares like TPM add another layer of security. In this paper we introduce a secure and improved TFDE model eliminating the design flaws and security loop-holes in the basic TFDE model [2]. Corresponding author K. R. Venugopal, P. Deepa Shenoy and L. M. Patnaik (Eds.) ICDMW 2013, pp Elsevier Publications 2013.

2 Prasenjit Das and Nirmalya Kar 2. Security Tools 2.1 Encrypting file system EFS protects user files by encrypting them using a symmetric encryption key called file encryption key (FEK) [3,4]. FEK is encrypted by an asymmetric key and stored in the $EFS alternate data stream (ADS) of the encrypted file. 2.2 Full disk encryption In traditional FDE the contents of a disk are encrypted block-by-block using a symmetric key encryption algorithm. All the user files including directory structure, file names, temporary files, cache files, swap files, system files etc. always remain encrypted on the disk [5]. 2.3 Trusted platform module with full disk encryption TPM is an embedded cryptographic device and used in conjunction with FDE to provide better security. In this model the symmetric disk encryption key is stored in hard drive encrypted by a TPM non-migratable key and sealed with TPM s platform configuration register (PCR) values [6,8]. 2.4 Trusted full disk encryption model In this model all the file encryption keys and attestation keys are stored on disk encrypted by storage key (SK) and SRK. System boot partition and OS partition contents are encrypted by system storage key (SSK) and sealed by PCR values [2]. 3. Analysis of Existing Models 3.1 Problems found in EFS EFS has the following limitations affecting data security: (i) When a plaintext file is encrypted, the EFS driver makes a backup copy and creates the $EFS stream [3]. The backup file is deleted when encryption is completed. However, EFS marks the backup file as a status of deleted merely and doesn t really erase (overwrite with 0 s) it s contents. So the deleted plaintext data can be recovered easily by using some low-level data recovery tools. (ii) EFS only encrypts contents of a file. The file metadata like directory structure, file names, modification timestamps or sizes etc. are not encrypted, and therefore, may lead to security risk. (iii) Files and folders encrypted by EFS are decrypted before being copied to a volume formatted with another file system, like FAT32. Moreover, when encrypted files are shared over network using SMB protocol, they are decrypted before they are sent [4]. 10

3 An Improved Trusted Full Disk Encryption Model 3.2 Problems found in FDE Full disk encryption has the following problems: (i) Decryption keys can be stolen from dumped memory contents using cold boot attack. This attack is deployed based on two facts. First, the OS needs to hold the decryption keys in memory to decrypt data on disk. Second, all the data stored in RAM fades away gradually over a period of seconds to minutes even after power is cut off [9]. This duration can be increased by cooling the chip before cutting power. (ii) Evil-maid attack makes the system vulnerable during pre-boot authentication phase. Attacker can modify the MBR to run a malicious code in the pre-boot screen, which sniffs the decryption key and saves it somewhere or transmits over the network [10,11]. (iii) If the files in an encrypted volume are copied to an unencrypted volume such as usb drive, the files are decrypted. Even if a user shares files to remote users, or hackers copy the files after the system is cracked, the files are decrypted [12]. (iv) If a system is accessed by multiple users, each user can access all the data in the hard drive after the system starts, so the data confidentiality can not be achieved between different users in the system. 3.3 The problems of FDE with trusted platform module Along with the performance issues of FDE this model has the following problems: (i) Decrypted user data stays in memory for use by applications. So by using cold boot attack he can extract sensitive user data [9]. (ii) The PCR values stored inside TPM play an important role in remote computer authentication using a Privacy CA (a trusted third party) [7]. TPM typically resides on the Low Pin Count (LPC) bus which has a ground driven reset line. So if the attacker physically grounds this line, TPM is reset and PCR values are initialized to 0 [13]. 3.4 Problems of TFDE model TFDE has few design flaws and security loop holes as explained next Design flaws of TFDE TFDE model has the following design flaws. (i) SSK is encrypted using SK. This approach has two problems: a. SK of a user is decrypted by SRK and his password when he logs into the system [2]. So the SK is not available at boot time and as per TPM key hierarchy SSK can not be decrypted and used unless the parent key SK is decrypted and loaded to TPM key slot [7]. b. SK is user specific, so in a multiuser environment multiple SKs can not be used to encrypt a single unique SSK. 11

4 Prasenjit Das and Nirmalya Kar Figure 1. Hard disk partition structure. (ii) TFDE does not suggest any security measures about computer in sleep mode or screen locked mode. (iii) TFDE model does not specify any policy about locking down a user account after a specified number of login failures. It also does not provide any recovery mechanism in case a user forgets his password. (iv) To change login password every user must have SRK password as it is required to reconfigure SK which is not safe in a multi user environment Security loop-holes TFDE model has following security issues. (i) In TFDE any new data file created by user or temporary files, cache files, backup files etc created by operating system or application software are not encrypted automatically. User must encrypt them manually if these files contain any sensitive information. (ii) Only the contents of the file are encrypted. File names, access date and time etc. are easily readable which may lead to sensitive data leak. (iii) An attacker can perform TPM reset attack on this model if he can get access to any of the user accounts [13]. 4. Improved TFDE Model 4.1 Disk partition structure In the proposed model a new encrypted partition is included in addition to the existing three primary partitions (hidden keys partition, system boot partition and operating system partition) and one extended partition (user data partition) [2], along with an optional logical partition (see Figure 1). (i) Hidden Keys partition stores all the symmetric and asymmetric keys for every user. Asymmetric TPM keys include Storage keys (SK), Binding keys, Attestation Identity Keys (AIK), signing keys and other migratable as well as non-migratable keys. Storage Root Key (SRK) and Endorsement Key (EK) reside inside TPM. TPM manages a key hierarchy while storing the keys, where each key is encrypted by its parent key which, at the top level, is encrypted by SK 12

5 An Improved Trusted Full Disk Encryption Model Figure 2. Key hierarchy. and thereafter by SRK [6]. The System Storage Key (SSK) which is used to encrypt the contents of system boot partition and operating system partition is stored in an external storage device directly encrypted by SRK (see Figure 2). (ii) System boot partition contains the boot sector and files required to start up the booting process which are encrypted by SSK and sealed by the hash values of TPM platform configuration registers (PCR) to provide platform authentication. (iii) Operating System partition stores operating system files and its support files. These files are also encrypted by SSK and sealed by PCR values. (iv) Application software partition stores the application software files. This partition is optional. The purpose is to make the operating system partition less cluttered. (v) Encrypted partition is encrypted block-by-block using a symmetric key encryption algorithm. The encryption key is stored in hidden keys partition encrypted by a SK. This partition can be used as a temporary working directory for critical data while using applications which create backup files. Encryption at disk level protects file metadata and due to automatic encryption low-level data recovery tools become useless. (vi) User data partition stores encrypted user data and may be divided into multiple logical partitions. User data is encrypted by various symmetric key algorithms on demand basis. 4.2 System setup and configuration This includes multiple jobs and/or steps explained next. (i) Right After the system administrator finishes installation of operating system and other software, he takes owner ship of the TPM, during which a new SRK key pair is generated [7]. (ii) Administrator creates SSK using TPM s built in true Random Number Generator. This SSK is used to encrypt the contents of system boot partition and operating system kernel while sealing. (iii) The pre-boot authentication operating system is installed in system boot partition and the MBR is modified to execute that before booting starts. (iv) The booting process core components are sealed in the following manner. a. The Core Root of Trust for Measurement (CRTM) measures BIOS block and inserts that into a PCR by extending the PCR. Similarly the BIOS measures other hardware components and the boot loader and control is passed to the boot loader. 13

6 Prasenjit Das and Nirmalya Kar Figure 3. Flowchart for decryption process of system startup. b. The boot loader measures the pre-boot authentication operating system. The current PCR values are stored on the disk. At the time of decryption these values are used to ensure that the MBR is not infected and correct software is loaded. c. Then contents of the system boot partition are sealed using SSK and sealed content is stored on disk. These PCR values can be used to verify platform authenticity. d. Similarly the operating system kernel is measured, sealed and stored to verify platform integrity. To keep them temper proof sealed data is signed by TPM signing keys. (v) Whenever a new user account is created, a new set of symmetric and asymmetric keys is created by TPM and the user is given an external storage device (usually an usb drive) containing the SSK which is protected by a PIN or password. For the system to boot, user must plug in the storage device and enter password/pin in pre-boot screen in order to unseal the contents of system boot and operating system partition. In a multi user environment this configuration keeps the SRK password safe with the administrator allowing others to use the system with their separate PIN/password. (vi) During setup, a separate encrypted partition is created and to encrypt/ decrypt the contents of that partition a symmetric key is created by TPM. (vii) The system is configured so that at the time of sleep mode or screen locked mode, TPM should unload all the encryption keys from its key slots. When the user tries to resume from sleep mode or unlock the screen the system should display the pre-boot screen. User must plug in the usb drive and enter the PIN/password to load SSK into the TPM. 4.3 Decryption Process of the Model The system s decryption process includes decryption process of system start-up, decryption process of users keys, data and decryption process at resume from sleep mode/unlock screen. The whole process has been explained through flow charts (see Figures 3 and 4). 4.4 Recovery mechanism A safe and easy recovery mechanism is required whenever a user forgets his login password or a stolen PC is recovered. Whenever the number of failed login attempts in the login screen reaches a 14

7 An Improved Trusted Full Disk Encryption Model Figure 4. Flowchart for decryption process (a) of user keys (b) of user data (c) at resume from startup mode/unlock screen. policy based limit the system treats that as a threat situation and loads the pre-boot recovery console. Two options are available. (i) Recovery password: The system may ask for a recovery password designated at user account creation time and stored in the external storage device. (ii) Challenge-response method: The external storage device stores a set of challenge questions and their responses designated at user account creation time. The number and type of challenge questions depends upon users choice. The recovery console randomly chooses a challenge of the set and asks for its response to unlock the account. 5. Conclusion In this paper we have analyzed some of the mostly used storage security models and also a new model named TFDE. The models were scrutinized based on both their security measures and performance impact. As we can see from the analysis that most of security loop-holes persist due to the design flaws. We also proposed a new model eliminating almost every security loop-hole by making some changes in the existing TFDE model design. The primary component effecting security of the system is security of the external storage device and it s PIN/password. We have also introduced two recovery options to be used in case of forgotten password or recovery of a stolen PC. Although the proposed model is much secured than others, yet we do not get any performance gain over basic TFDE. Moreover, this model is not suitable for multi-os or network OS environment. These, along with extending the usage of external storage device as a backup of encryption keys will be the focus of our future wok. References [1] Tomasz Bilski: A Formal Model for Data Storage Security Evaluation. In International Conference on Computational Science and its Applications, ICCSA (2007) [2] Li Jun and Yu Huiping: Trusted Full Disk Encryption Model Based on TPM. In 2nd International Conference on Digital Object Identifier, ICISE (2010)

8 Prasenjit Das and Nirmalya Kar [3] reskit/distrib/dsck efs duwf.mspx [4] Randy Muller: How it works-encrypting File System (2006) [Online], en-us/magazine/ howitworks.aspx [5] papers/ b-how-drive-encryption-works WP pdf [6] Platform Module White Paper.pdf [7] ftp://ftp.cs.bham.ac.uk/pub/authors/m.d.ryan/08-intro-tpm.pdf [8] [9] Halderman, J. A., Schoen, S. D., Heninger, N., Clarkson, W., Paul, W., Calandrino, J. A., Feldman, A. J., Applebaum, J. and Felten, E. W.: Lest we remember: Cold Boot Attacks on Encryption Keys. In Proc. 17th USENIX Security Symp., Sep. (2008) [10] Jake Edge: Evil Maid Attack Against Disk Encryption, October (2009) [Online], / [11] [12] Guido J. van t Noordende, Silvia D. Olabarriaga, Matthijs R. Koot and Cees Th. A. M. de Laat: A Trusted Data Storage Infrastructure for Grid-Based Medical Applications. In 8th IEEE International Symposium on Cluster Computing and the Grid, CCGRID-2008 (2008) [13] Klaus Kursawe, Dries Schellekens and Bart Preneel: Analyzing Trusted Platform Communication. In ECRYPT Workshop, CRASH Cryptographic Advances in Secure Hardware (2005). 16

Assessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives

Assessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives Assessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives Main Line / Date / Etc. June May 2008 2nd Line 80-11-01583 xx-xx-xxxx Revision 1.0 Tagline Here Table of Contents

More information

Recipe for Mobile Data Security: TPM, Bitlocker, Windows Vista and Active Directory

Recipe for Mobile Data Security: TPM, Bitlocker, Windows Vista and Active Directory Recipe for Mobile Data Security: TPM, Bitlocker, Windows Vista and Active Directory Tom Olzak October 2007 If your business is like mine, laptops regularly disappear. Until recently, centrally managed

More information

Bypassing Local Windows Authentication to Defeat Full Disk Encryption. Ian Haken

Bypassing Local Windows Authentication to Defeat Full Disk Encryption. Ian Haken Bypassing Local Windows Authentication to Defeat Full Disk Encryption Ian Haken Who Am I? Currently a security researcher at Synopsys, working on application security tools and Coverity s static analysis

More information

Disk Encryption. Aaron Howard IT Security Office

Disk Encryption. Aaron Howard IT Security Office Disk Encryption Aaron Howard IT Security Office Types of Disk Encryption? Folder Encryption Volume or Full Disk Encryption OS / Boot Volume Data Volume Managed or Unmanaged Key Backup and Data Assurance

More information

Secure Storage. Lost Laptops

Secure Storage. Lost Laptops Secure Storage 1 Lost Laptops Lost and stolen laptops are a common occurrence Estimated occurrences in US airports every week: 12,000 Average cost of a lost laptop for a corporation is $50K Costs include

More information

Encrypting with BitLocker for disk volumes under Windows 7

Encrypting with BitLocker for disk volumes under Windows 7 Encrypting with BitLocker for disk volumes under Windows 7 Summary of the contents 1 Introduction 2 Hardware requirements for BitLocker Driver Encryption 3 Encrypting drive 3.1 Operating System Drive 3.1.1

More information

Using BitLocker As Part Of A Customer Data Protection Program: Part 1

Using BitLocker As Part Of A Customer Data Protection Program: Part 1 Using BitLocker As Part Of A Customer Data Protection Program: Part 1 Tech Tip by Philip Cox Source: searchsecuritychannel.com As an information security consultant, one of my jobs is to help my clients

More information

Whitepaper Enhancing BitLocker Deployment and Management with SimplySecure. Addressing the Concerns of the IT Professional Rob Weber February 2015

Whitepaper Enhancing BitLocker Deployment and Management with SimplySecure. Addressing the Concerns of the IT Professional Rob Weber February 2015 Whitepaper Enhancing BitLocker Deployment and Management with SimplySecure Addressing the Concerns of the IT Professional Rob Weber February 2015 Page 2 Table of Contents What is BitLocker?... 3 What is

More information

Firmware security features in HP Compaq business notebooks

Firmware security features in HP Compaq business notebooks HP ProtectTools Firmware security features in HP Compaq business notebooks Embedded security overview... 2 Basics of protection... 2 Protecting against unauthorized access user authentication... 3 Pre-boot

More information

TPM. (Trusted Platform Module) Installation Guide V3.3.0. for Windows Vista

TPM. (Trusted Platform Module) Installation Guide V3.3.0. for Windows Vista TPM (Trusted Platform Module) Installation Guide V3.3.0 for Windows Vista Table of contents 1 Introduction 1.1 Convention... 4 1.2 TPM - An Overview... 5 2 Using TPM for the first time 2.1 Enabling TPM...

More information

Encrypting stored data. Tuomas Aura T-110.4206 Information security technology

Encrypting stored data. Tuomas Aura T-110.4206 Information security technology Encrypting stored data Tuomas Aura T-110.4206 Information security technology Outline 1. Scenarios 2. File encryption 3. Encrypting file system 4. Full disk encryption 5. Data recovery Simple applications

More information

HP ProtectTools Embedded Security Guide

HP ProtectTools Embedded Security Guide HP ProtectTools Embedded Security Guide Document Part Number: 364876-001 May 2004 This guide provides instructions for using the software that allows you to configure settings for the HP ProtectTools Embedded

More information

How to Encrypt your Windows 7 SDS Machine with Bitlocker

How to Encrypt your Windows 7 SDS Machine with Bitlocker How to Encrypt your Windows 7 SDS Machine with Bitlocker ************************************ IMPORTANT ******************************************* Before encrypting your SDS Windows 7 Machine it is highly

More information

Encrypting the Private Files on Your Computer Presentation by Eric Moore, CUGG June 12, 2010

Encrypting the Private Files on Your Computer Presentation by Eric Moore, CUGG June 12, 2010 Encrypting the Private Files on Your Computer Presentation by Eric Moore, CUGG June 12, 2010 I. File Encryption Basics A. Encryption replaces data within a file with ciphertext which resembles random data

More information

TPM Key Backup and Recovery. For Trusted Platforms

TPM Key Backup and Recovery. For Trusted Platforms TPM Key Backup and Recovery For Trusted Platforms White paper for understanding and support proper use of backup and recovery procedures for Trusted Computing Platforms. 2006-09-21 V0.95 Page 1 / 17 Contents

More information

BitLocker Drive Encryption Hardware Enhanced Data Protection. Shon Eizenhoefer, Program Manager Microsoft Corporation

BitLocker Drive Encryption Hardware Enhanced Data Protection. Shon Eizenhoefer, Program Manager Microsoft Corporation BitLocker Drive Encryption Hardware Enhanced Data Protection Shon Eizenhoefer, Program Manager Microsoft Corporation Agenda Security Background BitLocker Drive Encryption TPM Overview Building a BitLocker

More information

TPM. (Trusted Platform Module) Installation Guide V2.1

TPM. (Trusted Platform Module) Installation Guide V2.1 TPM (Trusted Platform Module) Installation Guide V2.1 Table of contents 1 Introduction 1.1 Convention... 4 1.2 TPM - An Overview... 5 2 Using TPM for the first time 2.1 Enabling TPM... 6 2.2 Installing

More information

Kaspersky Lab s Full Disk Encryption Technology

Kaspersky Lab s Full Disk Encryption Technology Kaspersky Lab s Full Disk Encryption Technology In the US alone, an estimated 12,000 laptops are lost or stolen each week. According to the Ponemon Institute, a laptop is stolen every 53 seconds; more

More information

Navigating Endpoint Encryption Technologies

Navigating Endpoint Encryption Technologies Navigating Endpoint Encryption Technologies Whitepaper November 2010 THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL INACCURACIES. THE CONTENT IS

More information

Embedded Trusted Computing on ARM-based systems

Embedded Trusted Computing on ARM-based systems 1 / 26 Embedded Trusted Computing on ARM-based systems Martin Schramm, M.Eng. 10.04.2014 Agenda 2 of 26 martin.schramm@th-deg.de Embedded computing platforms have become omnipresent intend to alleviate

More information

MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features

MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features MCTS Guide to Microsoft Windows 7 Chapter 7 Windows 7 Security Features Objectives Describe Windows 7 Security Improvements Use the local security policy to secure Windows 7 Enable auditing to record security

More information

Introduction to BitLocker FVE

Introduction to BitLocker FVE Introduction to BitLocker FVE (Understanding the Steps Required to enable BitLocker) Exploration of Windows 7 Advanced Forensic Topics Day 3 What is BitLocker? BitLocker Drive Encryption is a full disk

More information

DriveLock and Windows 8

DriveLock and Windows 8 Why alone is not enough CenterTools Software GmbH 2013 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise

More information

How Drive Encryption Works

How Drive Encryption Works WHITE PAPER: HOW DRIVE ENCRYPTION WORKS........................................ How Drive Encryption Works Who should read this paper Security and IT administrators Content Introduction to Drive Encryption.........................................................................................

More information

DriveLock and Windows 7

DriveLock and Windows 7 Why alone is not enough CenterTools Software GmbH 2011 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise

More information

White Paper: Whole Disk Encryption

White Paper: Whole Disk Encryption How Whole Disk Encryption Works White Paper: Whole Disk Encryption How Whole Disk Encryption Works Contents Introduction to Whole Disk Encryption.....................................................................

More information

Trusted Platforms for Homeland Security

Trusted Platforms for Homeland Security Trusted Platforms for Homeland Security By Kevin Schutz, Product Manager Secure Products Summary Ongoing threats from hackers, viruses, and worms continue to make security a top priority for IT and business

More information

Opal SSDs Integrated with TPMs

Opal SSDs Integrated with TPMs Opal SSDs Integrated with TPMs August 21, 2012 Robert Thibadeau, Ph.D. U.S. Army SSDs Must be Opal s We also Studied using the TPM (Trusted Platform Module) with an Opal SSD (Self-Encrypting Drive) 2 Security

More information

Fall. Forensic Examination of Encrypted Systems Matthew Postinger COSC 374

Fall. Forensic Examination of Encrypted Systems Matthew Postinger COSC 374 Fall 2011 Forensic Examination of Encrypted Systems Matthew Postinger COSC 374 Table of Contents Abstract... 3 File System Encryption... 3 Windows EFS... 3 Apple FileVault... 4 Full Disk Encryption...

More information

Do "standard tools" meet your needs when it comes to providing security for mobile PCs and data media?

Do standard tools meet your needs when it comes to providing security for mobile PCs and data media? Product Insight Do "standard tools" meet your needs when it comes to providing security for mobile PCs and data media? Author Version Document Information Utimaco Product Management Device Security 4.30.00

More information

Encrypted File Systems. Don Porter CSE 506

Encrypted File Systems. Don Porter CSE 506 Encrypted File Systems Don Porter CSE 506 Goals Protect confidentiality of data at rest (i.e., on disk) Even if the media is lost or stolen Protecting confidentiality of in-memory data much harder Continue

More information

Full Drive Encryption Security Problem Definition - Encryption Engine

Full Drive Encryption Security Problem Definition - Encryption Engine 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 Full Drive Encryption Security Problem Definition - Encryption Engine Introduction for the FDE Collaborative Protection Profiles

More information

ACER ProShield. Table of Contents

ACER ProShield. Table of Contents ACER ProShield Table of Contents Revision History... 3 Legal Notices... 4 Executive Summary... 5 Introduction... 5 Protection against unauthorized access... 6 Why ACER ProShield... 7 ACER ProShield...

More information

Data At Rest Protection

Data At Rest Protection Data At Rest Protection Dell Data Protection Encryption Full Volume Encryption Whitepaper October 2011 THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL

More information

Improving End-user Security and Trustworthiness of TCG-Platforms

Improving End-user Security and Trustworthiness of TCG-Platforms Improving End-user Security and Trustworthiness of TCG-Platforms Klaus Kursawe, kursawe@acm.org Christian Stüble Saarland University, Germany stueble@acm.org September 29, 2003 Abstract Over the last two

More information

Firewire-based Physical Security Attacks on Windows 7, EFS and BitLocker

Firewire-based Physical Security Attacks on Windows 7, EFS and BitLocker Firewire-based Physical Security Attacks on Windows 7, EFS and BitLocker With kind support from David Huemer V 1.0, 2009-08-13 Benjamin Böck Security Research Lab Secure Business Austria bboeck@securityresearch.at

More information

Patterns for Secure Boot and Secure Storage in Computer Systems

Patterns for Secure Boot and Secure Storage in Computer Systems Patterns for Secure Boot and Secure Storage in Computer Systems Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy Horst Görtz Institute for IT Security, Ruhr-University Bochum, Germany {hans.loehr,ahmad.sadeghi,marcel.winandy}@trust.rub.de

More information

Table of Contents. TPM Configuration Procedure... 2. 1. Configuring the System BIOS... 2

Table of Contents. TPM Configuration Procedure... 2. 1. Configuring the System BIOS... 2 Table of Contents TPM Configuration Procedure... 2 1. Configuring the System BIOS... 2 2. Installing the Infineon TPM Driver and the GIGABYTE Ultra TPM Utility... 3 3. Initializing the TPM Chip... 4 3.1.

More information

ZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference. May 2016

ZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference. May 2016 ZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference May 2016 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government

More information

YubiKey Integration for Full Disk Encryption

YubiKey Integration for Full Disk Encryption YubiKey Integration for Full Disk Encryption Pre-Boot Authentication Version 1.2 May 7, 2012 Introduction Disclaimer yubico Yubico is the leading provider of simple, open online identity protection. The

More information

How to enable Disk Encryption on a laptop

How to enable Disk Encryption on a laptop How to enable Disk Encryption on a laptop Skills and pre-requisites Intermediate IT skills required. You need to: have access to, and know how to change settings in the BIOS be confident that your data

More information

Forensic Decryption of FAT BitLocker Volumes

Forensic Decryption of FAT BitLocker Volumes Forensic Decryption of FAT BitLocker Volumes P. Shabana Subair, C. Balan (&), S. Dija, and K.L. Thomas Centre for Development of Advanced Computing, PO Box 6520, Vellayambalam, Thiruvananthapuram 695033,

More information

Property Based TPM Virtualization

Property Based TPM Virtualization Property Based Virtualization Marcel Winandy Joint work with: Ahmad Reza Sadeghi, Christian Stüble Horst Görtz Institute for IT Security Chair for System Security Ruhr University Bochum, Germany Sirrix

More information

Guidelines on use of encryption to protect person identifiable and sensitive information

Guidelines on use of encryption to protect person identifiable and sensitive information Guidelines on use of encryption to protect person identifiable and sensitive information 1. Introduction David Nicholson, NHS Chief Executive, has directed that there should be no transfers of unencrypted

More information

Secure Data Management in Trusted Computing

Secure Data Management in Trusted Computing 1 Secure Data Management in Trusted Computing Ulrich Kühn Deutsche Telekom Laboratories, TU Berlin Klaus Kursawe (KU Leuven) Stefan Lucks (U Mannheim) Ahmad-Reza Sadeghi (RU Bochum) Christian Stüble (RU

More information

Protecting Data with Short- Lived Encryption Keys and Hardware Root of Trust. Dan Griffin DefCon 2013

Protecting Data with Short- Lived Encryption Keys and Hardware Root of Trust. Dan Griffin DefCon 2013 Protecting Data with Short- Lived Encryption Keys and Hardware Root of Trust Dan Griffin DefCon 2013 Time-Bound Keys Announcements New tool: TimedKey.exe New whitepaper: Trusted Tamperproof Time on Mobile

More information

File System Encryption with Integrated User Management

File System Encryption with Integrated User Management File System Encryption with Integrated User Management Stefan Ludwig Corporate Technology Siemens AG, Munich fsfs@stefan-ludwig.de Prof. Dr. Winfried Kalfa Operating Systems Group Chemnitz University of

More information

PC Security System By Crypto AG.

PC Security System By Crypto AG. Total HC-6360 Information PC Security Security System By Crypto AG Crypto AG / HC6360-e.ppt / 9927 / 1 PC Security System By Crypto AG. File Encryption Message Encryption Disk Encryption Virtual Memory

More information

HP ProtectTools User Guide

HP ProtectTools User Guide HP ProtectTools User Guide Copyright 2007 Hewlett-Packard Development Company, L.P. Microsoft and Windows are U.S. registered trademarks of Microsoft Corporation. Intel is a trademark or registered trademark

More information

Smart TPM. User's Manual. Rev. 1001 12MD-STPM-1001R

Smart TPM. User's Manual. Rev. 1001 12MD-STPM-1001R Smart TPM User's Manual Rev. 1001 12MD-STPM-1001R We recommend that you download the latest version of the Smart TPM utility from GIGABYTE's website. If you have installed Ultra TPM earlier, you can install

More information

USB Portable Storage Device: Security Problem Definition Summary

USB Portable Storage Device: Security Problem Definition Summary USB Portable Storage Device: Security Problem Definition Summary Introduction The USB Portable Storage Device (hereafter referred to as the device or the TOE ) is a portable storage device that provides

More information

Mobile Device Security and Encryption Standard and Guidelines

Mobile Device Security and Encryption Standard and Guidelines Mobile Device Security and Encryption Standard and Guidelines University Mobile Computing and Device best practices are currently defined as follows: 1) The use of any sensitive or private data on mobile

More information

Microsoft Windows Server 2008: Data Protection

Microsoft Windows Server 2008: Data Protection Chapter 5 Microsoft Windows Server 2008: Data Protection Solutions in this chapter: BitLocker Active Directory Rights Management Services Authorization Summary Solutions Fast Track Frequently Asked Questions

More information

New Technologies File System (NTFS) Priscilla Oppenheimer. Copyright 2008 Priscilla Oppenheimer

New Technologies File System (NTFS) Priscilla Oppenheimer. Copyright 2008 Priscilla Oppenheimer New Technologies File System (NTFS) Priscilla Oppenheimer NTFS Default file system for Windows NT, 2000, XP, and Windows Server 2003 No published spec from Microsoft that describes the on-disk layout Good

More information

USB Portable Storage Device: Security Problem Definition Summary

USB Portable Storage Device: Security Problem Definition Summary USB Portable Storage Device: Security Problem Definition Summary Introduction The USB Portable Storage Device (hereafter referred to as the device or the TOE ) is a portable storage device that provides

More information

Software-based TPM Emulator for Linux

Software-based TPM Emulator for Linux Software-based TPM Emulator for Linux Semester Thesis Mario Strasser Department of Computer Science Swiss Federal Institute of Technology Zurich Summer Semester 2004 Mario Strasser: Software-based TPM

More information

Cautions When Using BitLocker Drive Encryption on PRIMERGY

Cautions When Using BitLocker Drive Encryption on PRIMERGY Cautions When Using BitLocker Drive Encryption on PRIMERGY July 2008 Fujitsu Limited Table of Contents Preface...3 1 Recovery mode...4 2 Changes in hardware configurations...5 3 Prior to hardware maintenance

More information

Disk encryption... (not only) in Linux. Milan Brož mbroz@redhat.com

Disk encryption... (not only) in Linux. Milan Brož mbroz@redhat.com Disk encryption... (not only) in Linux Milan Brož mbroz@redhat.com FDE - Full Disk Encryption FDE (Full Disk Encryption) whole disk FVE (Full Volume Encryption) just some volumes (dis)advantages? + for

More information

Check Point FDE integration with Digipass Key devices

Check Point FDE integration with Digipass Key devices INTEGRATION GUIDE Check Point FDE integration with Digipass Key devices 1 VASCO Data Security Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document

More information

SecureDoc Disk Encryption Cryptographic Engine

SecureDoc Disk Encryption Cryptographic Engine SecureDoc Disk Encryption Cryptographic Engine FIPS 140-2 Non-Proprietary Security Policy Abstract: This document specifies Security Policy enforced by SecureDoc Cryptographic Engine compliant with the

More information

How Endpoint Encryption Works

How Endpoint Encryption Works WHITE PAPER: HOW ENDPOINT ENCRYPTION WORKS........................................ How Endpoint Encryption Works Who should read this paper Security and IT administrators Content Introduction to Endpoint

More information

Management of Hardware Passwords in Think PCs.

Management of Hardware Passwords in Think PCs. Lenovo Corporation March 2009 security white paper Management of Hardware Passwords in Think PCs. Ideas from Lenovo Notebooks and Desktops Workstations and Servers Service and Support Accessories Introduction

More information

Windows BitLocker Drive Encryption Step-by-Step Guide

Windows BitLocker Drive Encryption Step-by-Step Guide Windows BitLocker Drive Encryption Step-by-Step Guide Microsoft Corporation Published: September 2006 Abstract Microsoft Windows BitLocker Drive Encryption is a new hardware-enhanced feature in the Microsoft

More information

YOUR DATA UNDER SIEGE. DEFEND IT WITH ENCRYPTION.

YOUR DATA UNDER SIEGE. DEFEND IT WITH ENCRYPTION. YOUR DATA UNDER SIEGE. DEFEND IT WITH ENCRYPTION. With Kaspersky, now you can. kaspersky.com/business Be Ready for What s Next Your Data Under Siege. Defend it with Encryption. 1.0 Keeping up with the

More information

Software Execution Protection in the Cloud

Software Execution Protection in the Cloud Software Execution Protection in the Cloud Miguel Correia 1st European Workshop on Dependable Cloud Computing Sibiu, Romania, May 8 th 2012 Motivation clouds fail 2 1 Motivation accidental arbitrary faults

More information

That Point of Sale is a PoS

That Point of Sale is a PoS SESSION ID: HTA-W02 That Point of Sale is a PoS Charles Henderson Vice President Managed Security Testing Trustwave @angus_tx David Byrne Senior Security Associate Bishop Fox Agenda POS Architecture Breach

More information

THREAT MODELLING FOR SECURITY TOKENS IN WEB APPLICATIONS

THREAT MODELLING FOR SECURITY TOKENS IN WEB APPLICATIONS THREAT MODELLING FOR SECURITY TOKENS IN WEB APPLICATIONS Danny De Cock, Karel Wouters, Dries Schellekens, Dave Singelee and Bart Preneel COSIC Research Group, Dept. Electrical Engineering-ESAT, Katholieke

More information

Comodo Disk Encryption

Comodo Disk Encryption Comodo Disk Encryption Version 2.0 User Guide Version 2.0.122010 Versi Comodo Security Solutions 525 Washington Blvd. Jersey City, NJ 07310 Table of Contents 1.Comodo Disk Encryption Introduction... 3

More information

Full Disk Encryption Agent Reference

Full Disk Encryption Agent Reference www.novell.com/documentation Full Disk Encryption Agent Reference ZENworks 11 Support Pack 3 May 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or

More information

Using the TPM: Data Protection and Storage

Using the TPM: Data Protection and Storage Using the TPM: Data Protection and Storage Ariel Segall ariels@alum.mit.edu Day 2 Approved for Public Release: 12-2749. Distribution unlimited License All materials are licensed under a Creative Commons

More information

University of Rochester Sophos SafeGuard Encryption for Windows Support Guide

University of Rochester Sophos SafeGuard Encryption for Windows Support Guide Sophos SafeGuard Encryption for Windows Support Guide University Information Technology Security & Policy September 15, 2015 Version Date Modification 1.0 September 15, 2015 Initial guide 1.1 1.2 1.3 1.4

More information

Aegis Padlock for business

Aegis Padlock for business Aegis Padlock for business Problem: Securing private information is critical for individuals and mandatory for business. Mobile users need to protect their personal information from identity theft. Businesses

More information

The virtual safe: A user-focused approach to data encryption

The virtual safe: A user-focused approach to data encryption The virtual safe: A user-focused approach to data encryption Steganos GmbH, 2008 1 The hard disk: a snapshot of our lives The personal computer has never been more personal. We routinely trust it with

More information

Innovative Secure Boot System (SBS) with a smartcard.

Innovative Secure Boot System (SBS) with a smartcard. Managed Security Services Desktop Security Services Secure Notebook Desktop Security Services. Secure Notebook. Today s business environment demands mobility, and the notebook computer has become an indispensable

More information

GoldKey Software. User s Manual. Revision 7.12. WideBand Corporation www.goldkey.com. Copyright 2007-2014 WideBand Corporation. All Rights Reserved.

GoldKey Software. User s Manual. Revision 7.12. WideBand Corporation www.goldkey.com. Copyright 2007-2014 WideBand Corporation. All Rights Reserved. GoldKey Software User s Manual Revision 7.12 WideBand Corporation www.goldkey.com 1 Table of Contents GoldKey Installation and Quick Start... 5 Initial Personalization... 5 Creating a Primary Secure Drive...

More information

Pointsec Enterprise Encryption and Access Control for Laptops and Workstations

Pointsec Enterprise Encryption and Access Control for Laptops and Workstations Pointsec Enterprise Encryption and Access Control for Laptops and Workstations Overview of PC Security Since computer security has become increasingly important, almost all of the focus has been on securing

More information

EMBASSY Remote Administration Server (ERAS) BitLocker Deployment Guide

EMBASSY Remote Administration Server (ERAS) BitLocker Deployment Guide EMBASSY Remote Administration Server (ERAS) BitLocker Deployment Guide BitLocker Deployment Guide Document Version 0.0.0.5 http://www.wave.com ERAS v 2.8 Wave Systems Corp. 2010 Contents Contents... 2

More information

Loophole+ with Ethical Hacking and Penetration Testing

Loophole+ with Ethical Hacking and Penetration Testing Loophole+ with Ethical Hacking and Penetration Testing Duration Lecture and Demonstration: 15 Hours Security Challenge: 01 Hours Introduction Security can't be guaranteed. As Clint Eastwood once said,

More information

Discovering passwords in the memory

Discovering passwords in the memory Discovering passwords in the memory Abhishek Kumar (abhishek.kumar@paladion.net) November 2003 Escalation of privileges is a common method of attack where a low privileged user exploits a vulnerability

More information

Hiva-network.com. Microsoft_70-680_v2011-06-22_Kat. Exam A

Hiva-network.com. Microsoft_70-680_v2011-06-22_Kat. Exam A Exam A Microsoft_70-680_v2011-06-22_Kat QUESTION 1 You have a computer that runs Windows 7. The computer has a single volume. You install 15 applications and customize the environment. You complete the

More information

Penetration Testing Windows Vista TM BitLocker TM

Penetration Testing Windows Vista TM BitLocker TM Penetration Testing BitLocker TM Drive Encryption Douglas MacIver Penetration Engineer System Integrity Group, Corporation Hack In The Box 2006/09/21 2006 Corporation. All rights reserved. Trustworthy

More information

Global security intelligence. YoUR DAtA UnDeR siege: DeFenD it with encryption. #enterprisesec kaspersky.com/enterprise

Global security intelligence. YoUR DAtA UnDeR siege: DeFenD it with encryption. #enterprisesec kaspersky.com/enterprise Global security intelligence YoUR DAtA UnDeR siege: DeFenD it with encryption #enterprisesec kaspersky.com/enterprise Contents Your Data Under Siege: Defend it with Encryption 3 Steps Taken to Minimise

More information

Securing Corporate Data and Making Life Easier for the IT Admin Benefits of Pre Boot Network Authentication Technology

Securing Corporate Data and Making Life Easier for the IT Admin Benefits of Pre Boot Network Authentication Technology 20140115 Securing Corporate Data and Making Life Easier for the IT Admin Benefits of Pre Boot Network Authentication Technology TABLE OF CONTENTS What s at risk for your organization? 2 Is your business

More information

ERNW Newsletter 42 / December 2013

ERNW Newsletter 42 / December 2013 ERNW Newsletter 42 / December 2013 Dangers of Disabled Pre-Boot Authentication in Corporate Environments: Attacking Check Point s Full Disk Encryption with Activated WIL Version: 1.1 Date: 12/16/2013 Author(s):

More information

Excerpt of Cyber Security Policy/Standard S05-001. Information Security Standards

Excerpt of Cyber Security Policy/Standard S05-001. Information Security Standards Excerpt of Cyber Security Policy/Standard S05-001 Information Security Standards Issue Date: April 4, 2005 Publication Date: April 4, 2005 Revision Date: March 30, 2007 William F. Pelgrin Director New

More information

Security Overview for Windows Vista. Bob McCoy, MCSE, CISSP/ISSAP Technical Account Manager Microsoft Corporation

Security Overview for Windows Vista. Bob McCoy, MCSE, CISSP/ISSAP Technical Account Manager Microsoft Corporation Security Overview for Windows Vista Bob McCoy, MCSE, CISSP/ISSAP Technical Account Manager Microsoft Corporation Agenda User and group changes Encryption changes Audit changes User rights New and modified

More information

ScoMIS Encryption Service

ScoMIS Encryption Service Introduction This guide explains how to install the ScoMIS Encryption Service Software onto a laptop computer. There are three stages to the installation which should be completed in order. The installation

More information

Using Remote Desktop Clients

Using Remote Desktop Clients CYBER SECURITY OPERATIONS CENTRE December 2011 Using Remote Desktop Clients INTRODUCTION 1. Remote access solutions are increasingly being used to access sensitive or classified systems from homes and

More information

Mutual Authentication Cloud Computing Platform based on TPM

Mutual Authentication Cloud Computing Platform based on TPM Mutual Authentication Cloud Computing Platform based on TPM Lei Peng 1, Yanli Xiao 2 1 College of Information Engineering, Taishan Medical University, Taian Shandong, China 2 Department of Graduate, Taishan

More information

Protect Sensitive Data Using Encryption Technologies. Ravi Sankar Technology Evangelist Microsoft Corporation http://ravisankar.spaces.live.

Protect Sensitive Data Using Encryption Technologies. Ravi Sankar Technology Evangelist Microsoft Corporation http://ravisankar.spaces.live. Protect Sensitive Data Using Encryption Technologies Ravi Sankar Technology Evangelist Microsoft Corporation http://ravisankar.spaces.live.com/blog Where is the User Data Stored? Q: Where is the biggest

More information

Time Stamp. Instruction Booklet

Time Stamp. Instruction Booklet Time Stamp Instruction Booklet Time Stamp Introductions Time stamp is a useful solution for backing up and restoring system, it backs up the entire computer system to the Backup Zone. Time Stamp is used

More information

BounceBack User Guide

BounceBack User Guide Table Of Contents 1. Table of Contents... 2 2. 1-0 Introduction... 3 2.1 1-0: Introduction... 4 2.2 1-1: BounceBack Software Overview... 6 3. 2-0 Navigating the BounceBack Control Center... 9 3.1 2-0:

More information

SimplySecure TM Architecture & Security

SimplySecure TM Architecture & Security Technical Whitepaper SimplySecure TM Architecture & Security Specifications, compliance and certification considerations for the IT Professional Rob Weber November 2014 Foreward First-in-class web-managed

More information

Acronym Term Description

Acronym Term Description This glossary contains definitions of terms created by TCG, or terms that have a particular meaning in trusted computing, or terms that cause particular confusion in trusted computing. Acronym Term Description

More information

Encrypt-FS: A Versatile Cryptographic File System for Linux

Encrypt-FS: A Versatile Cryptographic File System for Linux Encrypt-FS: A Versatile Cryptographic File System for Linux Abstract Recently, personal sensitive information faces the possibility of unauthorized access or loss of storage devices. Cryptographic technique

More information

Trusted Platform Module

Trusted Platform Module Trusted Platform Module TPM Fundamental APTISS, August 2008 Raymond Ng Infineon Technologies Asia Pacific Pte Ltd Raymond.ng@infineon.com TPM Fundamental Introduction to TPM Functional Component of TPM

More information

ScoMIS Encryption Service

ScoMIS Encryption Service Introduction This guide explains how to implement the ScoMIS Encryption Service for a secondary school. We recommend that the software should be installed onto the laptop by ICT staff; they will then spend

More information

Secure Network Communications FIPS 140 2 Non Proprietary Security Policy

Secure Network Communications FIPS 140 2 Non Proprietary Security Policy Secure Network Communications FIPS 140 2 Non Proprietary Security Policy 21 June 2010 Table of Contents Introduction Module Specification Ports and Interfaces Approved Algorithms Test Environment Roles

More information

Session ID: Session Classification:

Session ID: Session Classification: Session ID: Session Classification: Protecting Data with Encryption Access Control Protect Sensitive Data Protect and Manage Threats Groundbreaking Malware Resistance Protects the client, data, and corporate

More information

Windows BitLocker TM Drive Encryption Design Guide

Windows BitLocker TM Drive Encryption Design Guide Windows BitLocker TM Drive Encryption Design Guide Microsoft Corporation Published: August 2007 Abstract This document describes the various aspects of planning for deploying Windows BitLocker Drive Encryption

More information