Penetration Testing mailing list archives
RE: AES-256 encryption
From: Mike Messick <mikem () tridigitalenterprises com>
Date: Wed, 22 Aug 2007 10:59:39 -0800 (AKDT)
Hi Dereck, I'm assuming your referring to loop-aes, (http://loop-aes.sourceforge.net) as opposed to the cryptoloop feature in newer linux kernels. If not, then please disregard my comments as I'm only familiar with loop-aes. I'm also not a crypto mathematician, so I can't comment on *exactly* how long a brute-force attack would take and will leave this to others more knowlegeable than me, but brute-force attack against the cyphertext won't happen in any computationally feasible amount of time (ie we'll all be long dead before it succeeds.) If you're using the multi-key-v3 key setup mode, the key itself is protected against dictionary attacks by GPG and salting (according to the readme). But, you're not even talking about attacking the key, rather your scenario is that the key was not taken along with the hard drive, so comments about weak passphrases don't apply. According to http://en.wikipedia.org/wiki/Advanced_Encryption_Standard, the only successful attacks against the Rijndael algorithm have been side channel attacks which wouldn't be effective if the key doesn't physically exist either on the USB or in the system's memory. (Loop-aes tries to obfuscate the key in ram by shifting bits around continually to help prevent this type of attack, but it might still be possible if the key is in ram when it's stolen?) The algorithm itself has been declared sufficient for protecting US Top-Secret information when a 192-bit or 256-bit key has been used to encrypt the data provided the NSA has approved the implementation of the algorithm. Short answer - it's probably the most secure open-source algorithm we can get our hands on for the foreseeable future and will protect your system from being accessed by street-level criminals and even corporate infosec thugs. National level intelligence - well, if the NSA is after you, you'll have far worse problems than your machine being stolen. I'm sure someone else will post something more intelligent than this but I hope it helps. ================================================================== Mike Messick Dona nobis pacem rm -rf /bin/laden PGP Key Fingerprint: email: mikem () alaska net 2048/0x57318496 053B 412B 82FC 3808 E141 CDCD 74AE 01C5 5731 8496 On Tue, 21 Aug 2007, Dereck Martin wrote:
I use an encrypted file system in Linux using a loopback device with AES-256 encryption and the password is a symmetric GPG key on a USB device required a boot (which also contains the boot partition). What would be the likely hood of breaking the encryption if the disk was taken, but the GPG key required to unlock it was not. Dereck Martin Network Operations Engineer PacketDrivers IT Outsourcing, LLC http://www.packetdrivers.com ____ _ _ ____ _ | _ \ __ _ ___| | _____| |_| _ \ _ __(_)_ _____ _ __ ___ | |_) / _` |/ __| |/ / _ \ __| | | | '__| \ \ / / _ \ '__/ __| | __/ (_| | (__| < __/ |_| |_| | | | |\ V / __/ | \__ \ |_| \__,_|\___|_|\_\___|\__|____/|_| |_| \_/ \___|_| |___/ -----Original Message----- From: listbounce () securityfocus com [mailto:listbounce () securityfocus com] On Behalf Of Michel Pereira Sent: Tuesday, August 21, 2007 2:01 PM To: adrian.floarea Cc: 'R Buena'; 'Kush Wadhwa'; pen-test () securityfocus com; forensics () securityfocus com Subject: Re: AES-256 encryption But this tools can tell you if the correct key was found? Or you need to see every output that the tool does. Bye On 16/08/2007, at 12:49, adrian.floarea wrote:As I say to Kush in a private email, it is almost impossible to crack a file which is encrypted in a proper way with AES. But, if the password used for encryption is a week password (like 1234 or abcd etc) with a specialized tool you can break the encryption. Even, if the password is weak some tools cannot decrypt the files, because do not understand the format of the document (for example, if the document is a PKCS#7 structure), so in this case you must use an appropriate tool. This was the sense of my words. Hope to help you. Regards, Adrian Floarea, CISA Business Development Manager SC CERTSIGN srl Central Business Park 133, Calea ªerban Vodã St., Building C1, 2nd floor 040205 Bucharest 4, Romania -----Original Message----- From: R Buena [mailto:dreamsbig () gmail com] Sent: Thursday, August 16, 2007 6:09 PM To: adrian.floarea Cc: Kush Wadhwa; pen-test () securityfocus com; forensics () securityfocus com Subject: Re: AES-256 encryption Just curious, what if the program was KeyPass or PasswordSafe? and you don't know the passphrase? On 8/14/07, adrian.floarea <adrian.floarea () uti ro> wrote:Hi Kush, Please tell me if you know the program which was used for encrypt the file and also the used password. If not, I am afraid that will be impossible for you to decrypt the file. There are some good programs for decrypt files (for example Passware) but with limited functionalities. For example if was used for encryption a good password (more than 6-7 characters, numbers or special characters) it is almost impossible to recover the file. Regards, Adrian Floarea, CISA Business Development Manager SC CERTSIGN srlr Central Business Park 133, Calea ªerban Vodã St., Building C1, 2nd floor 040205 Bucharest 4, Romania -----Original Message----- From: listbounce () securityfocus com [mailto:listbounce () securityfocus com ] On Behalf Of Kush Wadhwa Sent: Tuesday, August 14, 2007 1:36 PM To: pen-test () securityfocus com; forensics () securityfocus com Subject: AES-256 encryption Hello All, Is there any way to decrypt a file which is AES-256 encrypted? I used many of the tools but I was not able to decrypt it. Please help me if any one knows how to decrypt it Regards, Kush Wadhwa ------------------------------------------------------------------------ This list is sponsored by: Cenzic Need to secure your web apps NOW? Cenzic finds more, "real" vulnerabilities fast. Click to try it, buy it or download a solution FREE today! http://www.cenzic.com/downloads ------------------------------------------------------------------------ ------------------------------------------------------------------------ This list is sponsored by: Cenzic Need to secure your web apps NOW? Cenzic finds more, "real" vulnerabilities fast. Click to try it, buy it or download a solution FREE today! http://www.cenzic.com/downloads ------------------------------------------------------------------------------------------------------------------------------------------------ This list is sponsored by: Cenzic Need to secure your web apps NOW? Cenzic finds more, "real" vulnerabilities fast. Click to try it, buy it or download a solution FREE today! http://www.cenzic.com/downloads -------------------------------------------------------------------------- Só Jesus salva, o homem faz backups http://www.michel.eti.br ------------------------------------------------------------------------ This list is sponsored by: Cenzic Need to secure your web apps NOW? Cenzic finds more, "real" vulnerabilities fast. Click to try it, buy it or download a solution FREE today! http://www.cenzic.com/downloads ------------------------------------------------------------------------ ------------------------------------------------------------------------ This list is sponsored by: Cenzic Need to secure your web apps NOW? Cenzic finds more, "real" vulnerabilities fast. Click to try it, buy it or download a solution FREE today! http://www.cenzic.com/downloads ------------------------------------------------------------------------
------------------------------------------------------------------------ This list is sponsored by: Cenzic Need to secure your web apps NOW? Cenzic finds more, "real" vulnerabilities fast. Click to try it, buy it or download a solution FREE today! http://www.cenzic.com/downloads ------------------------------------------------------------------------
Current thread:
- RE: AES-256 encryption, (continued)
- RE: AES-256 encryption Ken Kousky (Aug 14)
- RE: AES-256 encryption Mazher, Mohammed (Aug 14)
- RE: AES-256 encryption adrian.floarea (Aug 14)
- Message not available
- Re: AES-256 encryption R Buena (Aug 16)
- RE: AES-256 encryption adrian.floarea (Aug 16)
- Message not available
- RE: AES-256 encryption adrian.floarea (Aug 20)
- Re: AES-256 encryption Michel Pereira (Aug 21)
- RE: AES-256 encryption Dereck Martin (Aug 21)
- Re: AES-256 encryption dante (Aug 22)
- RE: AES-256 encryption Dereck Martin (Aug 22)
- Re: AES-256 encryption R Buena (Aug 16)
- RE: AES-256 encryption Mike Messick (Aug 22)