- #1
Vanadium 50
Staff Emeritus
Science Advisor
Education Advisor
- 29,948
- 15,639
Before I start, a quote: "There are two kinds of cryptography in this world: cryptography that will stop your kid sister from reading your files, and cryptography that will stop major world governments from reading your files."
Today you can buy, for $50-100, a USB stick with hardware encryption. To access the data on the disk, you need to enter a PIN on buttons on the drive. Enter it wrong too often and the data is erased. No software is required on the computer - everything exists on the drive.
My questions are how these things really work (and I hate the word "really" in these threads, because it's often ill-defined) and by "really" I mean that we should disregard what the manufacturers imply, and whether it's possible to build such a device that gets us beyond "little sister" security.
The vendors say they use 256-bit AES. I see no reason to question this. For this to have any meaning, that means the data on the flash chip itself is encrypted. But this means the PIN cannot be part of the key. If it were, changing the PIN would require all the data to be decrypted under the old PIN and reencrypted with the new PIN, a procedure which takes a good fraction of an hour. Yet it happens instantaneously.
If the PIN is not part of the key, there must be somewhere a circuit that determines if the PIN is good, and if so, to release the key. Applying a voltage to the output right these will unlock the stick. This doesn't take a major world government - a minor crime family is all you need. So how does one prevent this exploit from working, and what is needed to make these drives truly secure?
Today you can buy, for $50-100, a USB stick with hardware encryption. To access the data on the disk, you need to enter a PIN on buttons on the drive. Enter it wrong too often and the data is erased. No software is required on the computer - everything exists on the drive.
My questions are how these things really work (and I hate the word "really" in these threads, because it's often ill-defined) and by "really" I mean that we should disregard what the manufacturers imply, and whether it's possible to build such a device that gets us beyond "little sister" security.
The vendors say they use 256-bit AES. I see no reason to question this. For this to have any meaning, that means the data on the flash chip itself is encrypted. But this means the PIN cannot be part of the key. If it were, changing the PIN would require all the data to be decrypted under the old PIN and reencrypted with the new PIN, a procedure which takes a good fraction of an hour. Yet it happens instantaneously.
If the PIN is not part of the key, there must be somewhere a circuit that determines if the PIN is good, and if so, to release the key. Applying a voltage to the output right these will unlock the stick. This doesn't take a major world government - a minor crime family is all you need. So how does one prevent this exploit from working, and what is needed to make these drives truly secure?