Security Basics mailing list archives
Re: Re: Hard disk Encryption
From: "Ali, Saqib" <docbook.xml () gmail com>
Date: Sun, 15 Apr 2007 17:06:16 -0700
Hi Alexander,
The main problem is how you store (or derive) the key. For example, if you use TPM to store the key, it will be easily extracted by an attacker with hardware tools for bus access.
Can you please elaborate on this point? I was under the impression that in a properly implemented system, the "TPM wrapped and bound encryption keys" have NO need to leave the TPM. So I am not sure how tapping in into the bus will reveal the keys. Thanks saqib http://www.full-disk-encryption.net
Current thread:
- Re: Re: Hard disk Encryption Balaji Prasad (Apr 12)
- Re: Re: Hard disk Encryption Ali, Saqib (Apr 12)
- Re: Re: Hard disk Encryption Alexander Klimov (Apr 15)
- Re: Re: Hard disk Encryption Ali, Saqib (Apr 16)
- Re: Hard disk Encryption Alexander Klimov (Apr 16)
- Re: Hard disk Encryption Ali, Saqib (Apr 16)
- Re: Hard disk Encryption Alexander Klimov (Apr 17)
- Re: Hard disk Encryption Ali, Saqib (Apr 17)
- Re: Hard disk Encryption Alexander Klimov (Apr 18)
- Re: Hard disk Encryption Ali, Saqib (Apr 19)
- Re: Hard disk Encryption Alexander Klimov (Apr 24)
- Re: Re: Hard disk Encryption Ali, Saqib (Apr 16)