Velocity Reviews - Computer Hardware Reviews

Velocity Reviews > Newsgroups > Computing > Computer Security > So why don't we use full disk encryption on all mobile devices?

Reply
Thread Tools

So why don't we use full disk encryption on all mobile devices?

 
 
ulee
Guest
Posts: n/a
 
      10-13-2006

Sebastian Gottschalk wrote:
> Jim Watt wrote:
>
> > For most purposes the use of a disk password would be
> > give adequate protection, no overhead on legitimate use
> > and no additional cost.

>
> adequate == none? Just moves the plates to another electronic board and
> you've got full access. Even I'm competent enough to do that.


 
Reply With Quote
 
 
 
 
ulee
Guest
Posts: n/a
 
      10-13-2006

Sebastian Gottschalk wrote:
> Jim Watt wrote:
>
> > For most purposes the use of a disk password would be
> > give adequate protection, no overhead on legitimate use
> > and no additional cost.

>
> adequate == none? Just moves the plates to another electronic board and
> you've got full access. Even I'm competent enough to do that.


 
Reply With Quote
 
 
 
 
Jim Watt
Guest
Posts: n/a
 
      10-14-2006
On Fri, 13 Oct 2006 21:26:07 +0200, Sebastian Gottschalk
<(E-Mail Removed)> wrote:

>- stupid talking about buzzwords like "intellectual property"


Its a legal term, not a 'buzzword' unless you share a cave
with Bin Laden you would have come across it.
--
Jim Watt
http://www.gibnet.com
 
Reply With Quote
 
Saqib Ali
Guest
Posts: n/a
 
      11-04-2006
OK, the review of the 7 Full Disk Encryption suites is now complete.
The results are at:
http://www.xml-dev.com/blog/index.ph...ewtopic&id=250

I did an analysis of various FDE solutions to find the best one for my
needs. The key thing I was interested was that it must be AES 256,
reasonably fast, inexpensive, and *offer key recovery in case of
password loss*.

Compusec is great for home / personal use. It is cheap i.e. $0.00
(Free), and does not slow down the computer as much as the other
products. But that is because it only support 128 bit AES, which is a
major drawback as most enterprise settings require at least 256 bit
AES. Compusec also has a great online support forum where you can get
your questions answered by Compusec employees and other experienced
users.

I ended up purchasing both Utimaco and Pointsec. They are excellent
products. They both support AES 256. The downside is that they are
little bit expensive (Pointsec:$170 ; Utimaco:$200) and slow.

The best thing is they both offer great password / encryption key
recovery capabilities. You can create a recovery disk with both
products.

They also offer password recovery using Challenge / Response sequence,
where the IT Helpdesk can perform a Challenge/Response sequence with
the user to help them recover the password or reset it to a new one.
Off course Challenge/Response password recovery is the NOT most secure,
especially if the user is remote, but you have the option to disable it
on the laptop if you want.
..

saqib
http://www.full-disk-encryption.net

 
Reply With Quote
 
Unruh
Guest
Posts: n/a
 
      11-04-2006
"Saqib Ali" <(E-Mail Removed)> writes:

>OK, the review of the 7 Full Disk Encryption suites is now complete.
>The results are at:
>http://www.xml-dev.com/blog/index.ph...ewtopic&id=250


>I did an analysis of various FDE solutions to find the best one for my
>needs. The key thing I was interested was that it must be AES 256,
>reasonably fast, inexpensive, and *offer key recovery in case of
>password loss*.


Sorry, AES 256 why? It is idiotic in that finding a 128 bit key is simply
infeasible now and in the rather distant future.
And then you demand key recovery which means that you automatically make
the system weak. If you can recover the key, so can the enemy. Ie, it is
like saying "I want a 1 foot thick steel door for my home, and I want a cat
door in it, so if I forget my key I can reach in and unlock it. "

>Compusec is great for home / personal use. It is cheap i.e. $0.00
>(Free), and does not slow down the computer as much as the other
>products. But that is because it only support 128 bit AES, which is a
>major drawback as most enterprise settings require at least 256 bit


How in th eworld is that a drawback? Under what rational criteria is that a
drawback?


>AES. Compusec also has a great online support forum where you can get
>your questions answered by Compusec employees and other experienced
>users.


>I ended up purchasing both Utimaco and Pointsec. They are excellent
>products. They both support AES 256. The downside is that they are
>little bit expensive (Pointsec:$170 ; Utimaco:$200) and slow.


>The best thing is they both offer great password / encryption key
>recovery capabilities. You can create a recovery disk with both
>products.


>They also offer password recovery using Challenge / Response sequence,
>where the IT Helpdesk can perform a Challenge/Response sequence with
>the user to help them recover the password or reset it to a new one.
>Off course Challenge/Response password recovery is the NOT most secure,
>especially if the user is remote, but you have the option to disable it
>on the laptop if you want.


And now you tell me that a third party also has your key as well? Sheesh.


>.


>saqib
>http://www.full-disk-encryption.net


 
Reply With Quote
 
Saqib Ali
Guest
Posts: n/a
 
      11-04-2006
> How in th eworld is that a drawback? Under what rational criteria is that a
> drawback?


hmm, all i said that compusec was a excellent product but it only
offers 128bit AES. Most of the government agencies, and especially if
you work for financial institution, require you to use 256 AES.


> And now you tell me that a third party also has your key as well? Sheesh.


hmm. what do you mean by third party?

For the Challenge/Response password recovery to work, the IT Help Desk
needs to know a secret. If that secret is leaked (e.g. posted on a
website) yes then a attacker *might* be login into the system. The
attacker would still need another secret, the user's logon name, which
may or may not be easy to guess in 3 trys.

As I said earlier, you can turn off the challence/response password
recovery if you want. But it is good to have in case the employee
leaves the company without giving up the passwords. This may not be
applicable in all situations.

BTW, the site that was hosting the analysis was down for a short period
of time. It is back online the URL is still the same:
http://www.xml-dev.com/blog/index.ph...ewtopic&id=250

saqib
http://www.full-disk-encryption.net

 
Reply With Quote
 
Arthur T.
Guest
Posts: n/a
 
      11-04-2006
In
Message-ID:<(E-Mail Removed) ps.com>,
"Saqib Ali" <(E-Mail Removed)> wrote:

>> How in th eworld is that a drawback? Under what rational criteria is that a
>> drawback?

>
>hmm, all i said that compusec was a excellent product but it only
>offers 128bit AES. Most of the government agencies, and especially if
>you work for financial institution, require you to use 256 AES.


What version of Compusec did you benchmark? I haven't
installed it, yet, but the documentation of CompuSec 4.21 says,
"Fast AES Algorithm with 128 or 256 bit key length."

--
Arthur T. - ar23hur "at" intergate "dot" com
Looking for a good MVS systems programmer position
 
Reply With Quote
 
Saqib Ali
Guest
Posts: n/a
 
      11-04-2006
> What version of Compusec did you benchmark? I haven't
> installed it, yet, but the documentation of CompuSec 4.21 says,
> "Fast AES Algorithm with 128 or 256 bit key length."


I had the 4.21 (Free) version installed. And 128bit was the only
option. Maybe I missed something.

Let me know if are able to install the product successfully and encrypt
using 256bit AES

thanks
saqib
http://www.full-disk-encryption.net

 
Reply With Quote
 
Unruh
Guest
Posts: n/a
 
      11-05-2006
"Saqib Ali" <(E-Mail Removed)> writes:

>> How in th eworld is that a drawback? Under what rational criteria is that a
>> drawback?


>hmm, all i said that compusec was a excellent product but it only
>offers 128bit AES. Most of the government agencies, and especially if
>you work for financial institution, require you to use 256 AES.


I guess I did say rational criteria. There si no rational reason to prefer
256 over 128.


>> And now you tell me that a third party also has your key as well? Sheesh.


>hmm. what do you mean by third party?


>For the Challenge/Response password recovery to work, the IT Help Desk
>needs to know a secret. If that secret is leaked (e.g. posted on a
>website) yes then a attacker *might* be login into the system. The
>attacker would still need another secret, the user's logon name, which
>may or may not be easy to guess in 3 trys.


The help desk is the third person. Anyone else who knows the password is
the third person. That introduces a huge security hole, far far larger than
any AES128/256 distinction. It reduces the security to something like the
unix crypt funtion-- seeems secure but is easily broken. In this case not
broken, but susceptible to other far more efficient lines of attack than
direct attack on the cypher.



>As I said earlier, you can turn off the challence/response password
>recovery if you want. But it is good to have in case the employee
>leaves the company without giving up the passwords. This may not be
>applicable in all situations.


I understand why you would want it. It is also a huge security hole. That
is where I would spend my security concerns, not whether it uses 128, 256
or whatever size AES.



>BTW, the site that was hosting the analysis was down for a short period
>of time. It is back online the URL is still the same:
>http://www.xml-dev.com/blog/index.ph...ewtopic&id=250


>saqib
>http://www.full-disk-encryption.net


All I am saying is that the number of bits should not be factor in your
decision, unless there is some insane political reason to take it into
account. It is the least of your worries.

You also have to decide what it is you are using the encryption to protect
yourself from. If it is from the local druggie, or if it is fromNSA those
are very different situations.
The other thing you shoud chech is write speeds. If they use a stream
cypher, they have to rekey every single time you write. And they have to
reencrypt the whole block. If the block is file sized, they have to rewrite
the whole file, not just the section of the file that changed.
They also have to have a subkey management fascility.


 
Reply With Quote
 
Arthur T.
Guest
Posts: n/a
 
      11-08-2006
In
Message-ID:<(E-Mail Removed) ps.com>,
"Saqib Ali" <(E-Mail Removed)> wrote:

>> What version of Compusec did you benchmark? I haven't
>> installed it, yet, but the documentation of CompuSec 4.21 says,
>> "Fast AES Algorithm with 128 or 256 bit key length."

>
>I had the 4.21 (Free) version installed. And 128bit was the only
>option. Maybe I missed something.
>
>Let me know if are able to install the product successfully and encrypt
>using 256bit AES


I installed it, didn't like it, and uninstalled it. I didn't
try encrypting the drives, but I tried using 256-bit strings for
the securityinfo.dat file, and couldn't make it work.

Of course, even 128-bit encryption is overkill since the
password is a maximum of 16 alpha-numeric characters. I work that
out to be just over 95 bits worth. Even worse, you *must* have
two passwords (one for password recovery), so I figure that brings
it down to just over 94 bits.

Also, there's something akin to a back-door in Compusec. In
their Yahoo support group, one message said:

>Hi, may I recommend you to send your Securityinfo.dat file to:
>
>support.sg@ce-infosys
>
>Send it with a request to have them extract your UserID and password
>reset code.
>
>Let us know if you encounter any problem.
>
>CE-Infosys




--
Arthur T. - ar23hur "at" intergate "dot" com
Looking for a good MVS systems programmer position
 
Reply With Quote
 
 
 
Reply

Thread Tools

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are Off


Similar Threads
Thread Thread Starter Forum Replies Last Post
iPhone4,iPhone3,Ipad,Apple Mobile,Blackberry Mobile,HTC Mobile,LGMobile,Motorola Mobile,Nokia Mobile,Samsung Mobile chen selina C++ 0 07-13-2010 08:53 AM
U.S. Gov't to use Full Disk Encryption on All Computers Saqib Ali Computer Security 22 01-05-2007 05:32 AM
findcontrol("PlaceHolderPrice") why why why why why why why why why why why Mr. SweatyFinger ASP .Net 2 12-02-2006 03:46 PM



Advertisments