[17032] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: comments wanted on gbde

daemon@ATHENA.MIT.EDU (Dan Kaminsky)
Mon Mar 7 13:33:31 2005

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Mon, 07 Mar 2005 09:23:14 -0800
From: Dan Kaminsky <dan@doxpara.com>
To: David Wagner <daw-usenet@taverner.CS.Berkeley.EDU>
Cc: cryptography@metzdowd.com
In-Reply-To: <200503070639.j276d65a015000@taverner.CS.Berkeley.EDU>

Re, GDBE--

    Some initial thoughts:

    I wouldn't be surprised if platters couldn't be analyzed for usage
levels / magnetic degradation (Peter?).  Even without a clean room, ATA
is pretty rich -- anyone remember the guy who graphically plotted the
spiral damage caused by a falled drive head w/ nothing but a massively
hacked ATA driver?  There's also likely to be useful information from
drive sectors duplicated by the drive firmware (there's extra space in
every drive; when particular sectors are judged "buggy" content from
them is migrated onto the spare space).

    I saw nothing establishing the integrity of sectors during
*decryption* in 7.5.  Random / polluted sectors will decrypt, though
into unpredictable noise (which tends to do bad things to file system
code).  Previous versions of sectors will also decrypt successfully --
the cleaning lady can take lessons from Mallory, as it were.  It's
useful to immediately grant though that their threat model is much more
aligned towards drives that will never be hot again.

    One wonders if there is a delivery service for Key-key's.

--Dan


---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post