Re: thumdrive integrity --Deniable Thumbdrive?
WTF is the point of adding more biometric security to a device that cannot and does not support data integrity? that flash memory held within the thumbdrive keeps your data in clear text...unless of course you store everything within some form of encrypted disk. even then, the quick and dirty way to bypass the bio-security us to pull the card out of the usb enclosure and start poking at the contents.
DEFINITELY TRUE! Thumbdrive products are a good step in the right direction, but by far not long enough. Another approach is needed. The unit should be tamperproof, with more services than just a dumb mass storage device. The unit should contain a biometric sensor (eg, a fingerprint reader), a small keypad or other device to enter a PIN, and its own processor, for performing cryptographic operations. The device should support several operations for different PINs, and several PINs, which will allow several different private storage areas, different operations, and a special PIN for destruction of secure content and offering dummy content instead ("See officer? I told you there are no crypto keys there!"). The device should be able to keep audit log of operations. The device should store the data in encrypted form in the memory. The PIN could be part of the decryption key. The device should be able to handle the biometric reader output on its own, independently on the host computer. This architecture together with adherence to USB mass-storage standards would make us independent on any OS-specific drivers, making the device truly multiplatform. The device should be able to perform the encryption/decryption services on its own (hence the cryptographic CPU). Eg, you have an untrusted computer. You plug the device to its port, move a document from the untrusted machine to device's directory "Cleartext", authorize yourself to the device with fingerprint and PIN, select the "Encrypt" function (which can be done eg. by a suffix to the PIN). In few seconds, you should then find the encrypted document in the device's directory "Ciphertext". Similarly, the device should support write-only directory, to which you could write files freely but won't be able to retrieve them without authorization (this could allow using the device for data couriers who would be able to pick data but won't be able to read them along the way). Optionally, the unit could be usable for encryption/decryption of data streams, which would make it very useful for IP telephony. The key for crypto functions should never leave the unit. Attempt of physical compromising of the unit should result in self destruction of at least the part of the memory that keeps the keys (maybe keep them in battery-backed RAM, sealed in epoxide resin with both passive and active tamper-detection devices (including but not limited to thin wire mesh)? This way, even if the computer itself would get compromised, the only thing the adversary would be able to intercept would be the plaintexts used in the sessions with the compromised machine. Which they would be able to get using TEMPEST or a keylogger anyway. This design should be robust against hijacking of the key by eg. trojan horses.
On Fri, Jan 24, 2003 at 09:51:46PM +0100, Thomas Shaddack wrote:
DEFINITELY TRUE!
...
The device should be able to perform the encryption/decryption services on its own (hence the cryptographic CPU). Eg, you have an untrusted computer. You plug the device to its port, move a document from the untrusted machine to device's directory "Cleartext", authorize yourself to the device with fingerprint and PIN, select the "Encrypt" function (which can be done eg. by a suffix to the PIN). In few seconds, you should then find the encrypted document in the device's directory "Ciphertext". Similarly, the device should support write-only directory, to which you could write files freely but won't be able to retrieve them without authorization (this could allow using the device for data couriers who would be able to pick data but won't be able to read them along the way).
...
Good points. I've thought a lot about the possibility of such devices (I suppose they are kind of obvious/inevitable to crypto-minded people). One comment: One the of the primary uses for such a device would be in protocols requiring digital signatures. If the device is to be used for this, it would seem necessary to also include a small display on it so the user can view what the untrusted computer wants signed and authorize the signature. Of course, with a screen, it's going to be more like a PDA and less like a key-chain sized device. One of these days, I might build a little device that stores a private key and does on-board encryption using a microcontroller. I would do it just for fun, since it is pretty useless if the infrastructure to support it is not out there. John Bethencourt
One of these days, I might build a little device that stores a private key and does on-board encryption using a microcontroller. I would do it just for fun, since it is pretty useless if the infrastructure to support it is not out there.
Check http://developer.axis.com/products/mcm/ - this looks like a good chip. Together with embedded Linux it could be pretty useful for this purpose, could shorten the development time considerably. For $249 they offer a readymade developer board. Has built-in Ethernet and serial ports, and with a chip like FT8U232AM it could work with USB as well.
On Fri, 24 Jan 2003, Thomas Shaddack wrote:
Has built-in Ethernet and serial ports, and with a chip like FT8U232AM it could work with USB as well.
The 232BM version is easier to use and costs the same. Patience, persistence, truth, Dr. mike
participants (3)
-
John Bethencourt
-
Mike Rosing
-
Thomas Shaddack