Forensics
Hardware Based Disk Encryption Oct 31 2006 01:52PM
bsmathers reypd com (3 replies)
Re: Hardware Based Disk Encryption Nov 04 2006 01:07PM
John T. Hoffoss (john t hoffoss gmail com)
RE: Hardware Based Disk Encryption Nov 01 2006 03:02PM
Brewis, Mark (mark brewis eds com)
From Seagate: "allows hard drive data to be erased instantly"
Three ways of doing this that I can think of at the moment:
1 - It purges/overwrites the encryption key(s) from whatever
ASIC/EEPROM/security chip it stores it in.
2 - It writes (not flips) a number of bits on the disk, to corrupt the
encrypted disk. It doesn't even need to be a random/pseudo-random
pattern (although more secure if it is.) Since the state of the drive
isn't likely to be known beforehand, even knowing which bits have been
changed wouldn't render the process ineffective.
3 - They do both.
Even on a 120GB drive that isn't going to take long. Would it 'Wipe'
the drive? Not in the way we have historically referred to wiping, but
effective nevertheless. If you have to go through n processes simply to
get back to the state of having an encrypted drive, and then to have to
break the encryption, I don't suppose there are too many people on this
list with the facilities and capabilities to do that.

(There is of course another (im)possibility - that Seagate are shipping
drives with micro EMP generators for that Mission Impossible-style
sayonara to your data. They'd need to do something about a Big Red
Button and getting a curling smoke effect for complete user satisfaction
though.)

-----Original Message-----
From: listbounce (at) securityfocus (dot) com [email concealed] [mailto:listbounce (at) securityfocus (dot) com [email concealed]]
On Behalf Of bsmathers (at) reypd (dot) com [email concealed]
Sent: 31 October 2006 13:52
To: forensics (at) securityfocus (dot) com [email concealed]
Subject: Hardware Based Disk Encryption

http://www.seagate.com/cda/newsinfo/newsroom/releases/article/0,,2732,00

.html

When someone gets a chance to play with one of these, please post.

An open and self-contained crypto infrastructure on a hard drive that is
"useless" until the BIOS recognizes it with a password key. Reminds me a
little of the "locks" some manufactures have that can be enabled in the
BIOS for some drives. Although, it is easy to just call up the
manufacture and get the back-door key for locked drives (done many times
with basic data recovery jobs or just hook up to another computer and
not boot from it), according to Seagate, there is no "back-door" access
here. If the key is lost, stolen, or just not available for
investigations/recoveries, there will be no way to access/read the FDE
(Full-Disk Encryption) drive.

Also, it has a "wiping" technique that supposedly can "wipe" a drive in
less then a second and be "secure". I would like to know more about
this. If anyone has any information, please post. Thanks.

[ reply ]
Re: Hardware Based Disk Encryption Nov 01 2006 01:14PM
Steve (root quicksilverscreen com)


 

Privacy Statement
Copyright 2010, SecurityFocus