FlyerTalk Forums - View Single Post - Disk Encryption Not Secure?
View Single Post
Old Mar 3, 2008 | 6:30 am
  #6  
Abadeea
 
Join Date: Feb 2008
Posts: 1
Hi everyone...

My take on this is:

What you must note is that even if it could be done, it would not be as simple or successfully easy as they wanted to show in the video.

People must have deeply knowledge and much experience in data protection and cryptography.

In order to have success using this attack, it will deppends on some factors that not always will work:

First of all, they use an application to find the possible area in RAM memory that can be an eventual encryption key.
This will deppends on how much memory still keeps intact.
Then they need to reconstruct the parts of the key that was corrupted.
The software that I use uses the AES 256 algorithm, that you can see is much more complex to reconstruct as the others.

On almost all the machines in the market, the BIOS can perform a destructive memory check during its Power-On Self Test.
(POST). Most of the machines we examined allowed this test to be disabled or bypassed (sometimes by enabling an option called “Quick Boot”). You just need to disable this "quick boot" and everytime you turn your PC on, it will erase the RAM memory before even any software can be used to record it.

Also in Bios, you can disable the boot by removable devices or by network to prevent this procedure to be performed without have to change the memory to a second machine, what makes things harder.

the software I am using gives you the possibility to use more than one encryption key (one for each partition).

So I guess there are still solutions to this.

Last edited by ScottC; Mar 3, 2008 at 2:54 pm
Abadeea is offline