Security Basics mailing list archives
Re: Hard disk Encryption
From: "Ali, Saqib" <docbook.xml () gmail com>
Date: Mon, 16 Apr 2007 10:02:07 -0700
Since TPM does not have enough processing power to decrypt the raw data, the key (used to decrypt the data) has to be transmitted outside of the TPM.
Not really. IBM's TPM chip can handle bulk data decryption and encryption easily.
Due to the first assumption, the CPU can be emulated by an attacker so that external entities cannot distinguish it from the "normal" CPU; due to the second assumption, after such an emulation the attacker may have exactly the same secret key.
This is a extremely hypothetical scenario, and I am not even sure if it will work. Has somebody proved that such a attack is possible? saqib http://www.full-disk-encryption.net
Current thread:
- Re: Re: Hard disk Encryption Balaji Prasad (Apr 12)
- Re: Re: Hard disk Encryption Ali, Saqib (Apr 12)
- Re: Re: Hard disk Encryption Alexander Klimov (Apr 15)
- Re: Re: Hard disk Encryption Ali, Saqib (Apr 16)
- Re: Hard disk Encryption Alexander Klimov (Apr 16)
- Re: Hard disk Encryption Ali, Saqib (Apr 16)
- Re: Hard disk Encryption Alexander Klimov (Apr 17)
- Re: Hard disk Encryption Ali, Saqib (Apr 17)
- Re: Hard disk Encryption Alexander Klimov (Apr 18)
- Re: Hard disk Encryption Ali, Saqib (Apr 19)
- Re: Hard disk Encryption Alexander Klimov (Apr 24)
- Re: Re: Hard disk Encryption Ali, Saqib (Apr 16)