Disk Encryption - Security Concerns

Security Concerns

Most full disk encryption schemes are vulnerable to a cold boot attack, whereby encryption keys can be stolen by cold-booting a machine already running an operating system, then dumping the contents of memory before the data disappears. The attack relies on the data remanence property of computer memory, whereby data bits can take up to several minutes to degrade after power has been removed. Even a Trusted Platform Module (TPM) is not effective against the attack, as the operating system needs to hold the decryption keys in memory in order to access the disk.

All software-based encryption systems are vulnerable to various side channel attacks such as acoustic cryptanalysis and hardware keyloggers. In contrast, self-encrypting drives are not vulnerable to these attacks since the hardware encryption key never leaves the disk controller.

Read more about this topic:  Disk Encryption

Famous quotes containing the words security and/or concerns:

    Happiness is peace after strife, the overcoming of difficulties, the feeling of security and well-being. The only really happy folk are married women and single men.
    —H.L. (Henry Lewis)

    American thinking, when it concerns itself with beautiful letters as when it concerns itself with religious dogma or political theory, is extraordinarily timid and superficial ... [I]t evades the genuinely serious problems of art and life as if they were stringently taboo ... [T]he outward virtues it undoubtedly shows are always the virtues, not of profundity, not of courage, not of originality, but merely those of an emasculated and often very trashy dilettantism.
    —H.L. (Henry Lewis)