![]() |
|
|
#1 |
|
"Victor de Hollander"
Aug 2011
the Netherlands
32×131 Posts |
Not sure this is the right forum (we have a Linux subforum but no Windows, could also go in a crypto forum).
Question: Is Bitlocker (disk encryption in Win10 Pro and Edu) safe to use? As in is the encryption standard used not broken? The implementation by Microsoft could contain bugs *kuch*NSAbackdoors*kuch*, but that is not something we can check. Are there any good alternatives? I read Truecrypt, but that is not developed anymore, so I'm a bit reluctant to try that. The data I'm trying to protect contains sensitive customer data (telephone numbers, emailadresses), so I just want to make sure that a stolen PC or HDD cannot be read by thieves. Protection against 3-letter agencies is not needed. What is the performance impact of Bitlocker? The motherboard doesn't have a TPM chip, so it will be with a passphase? How do I backup the key/recovery safely in case somebody forgets the password? |
|
|
|
|
|
#2 |
|
Aug 2006
10111011001002 Posts |
It uses AES which has not been broken and is not likely to be broken in the near future. As far as we can tell from the Snowden documents the NSA does not have a cryptographic break. AES is quantum resistant: small quantum computers are no threat, large efficient quantum computers might break AES-128 but not AES-256 (for the foreseeable future).
BitLocker and similar schemes are vulnerable to cold boot attacks unless you are using (at least) 2-factor authentication. Last fiddled with by CRGreathouse on 2018-08-08 at 13:25 |
|
|
|
|
|
#3 |
|
"Victor de Hollander"
Aug 2011
the Netherlands
22338 Posts |
So basicly it is safe to use for the purpose I was thinking of?
|
|
|
|
|
|
#4 |
|
Aug 2006
22×3×499 Posts |
If you use a secure passphrase and don't allow people physical access to the machine while and shortly after it has power I think it should be safe for that scenario, yes.
|
|
|
|
|
|
#5 |
|
Undefined
"The unspeakable one"
Jun 2006
My evil lair
1A8916 Posts |
I would suggest TrueCrypt's successor VeraCrypt.
Edit: You can have multiple passphrases to the same data by exchanging the header. So if someone forgets a passphrase you can replace the header with a backup. Last fiddled with by retina on 2018-08-09 at 01:34 |
|
|
|
|
|
#6 | |
|
Aug 2006
598810 Posts |
Quote:
Ueli M. Maurer and James L. Massey, Cascade ciphers: the importance of being first, Journal of Cryptology 6:1 (1993), pp. 55-61. |
|
|
|
|
|
|
#7 |
|
Romulan Interpreter
"name field"
Jun 2011
Thailand
41·251 Posts |
You lost me here. How is that possible, and still be secure? If the encryption key is generated from the password, then it means they have a way to generate the same key from different passwords, which is by itself insecure (imagine SHA256 but being able to get the same hash from two different sets of data). If the encryption key is not generated from the passphrase, then is is stored somewhere (is that why a "header" is needed?) and the passphrase is used to get to it, which is also not so secure if the attacker can get his hands on some copies of different "headers".
Last fiddled with by LaurV on 2018-08-10 at 05:27 |
|
|
|
|
|
#8 | |
|
Undefined
"The unspeakable one"
Jun 2006
My evil lair
6,793 Posts |
Quote:
|
|
|
|
|
|
|
#9 |
|
"Robert Gerbicz"
Oct 2005
Hungary
3·547 Posts |
|
|
|
|
|
|
#10 | |
|
Aug 2006
22·3·499 Posts |
Quote:
Maybe if you are Robert Gerbicz or Phil Zimmermann this doesn't apply to you, but for most people: https://motherboard.vice.com/en_us/a...our-own-crypto |
|
|
|
|
|
|
#11 | |
|
"Composite as Heck"
Oct 2017
2×52×19 Posts |
Quote:
|
|
|
|
|
![]() |
| Thread Tools | |
Similar Threads
|
||||
| Thread | Thread Starter | Forum | Replies | Last Post |
| Laymans explanation of RSA encryption | Fusion_power | Programming | 3 | 2013-11-04 20:50 |
| Encryption and governments | retina | Soap Box | 119 | 2012-02-28 05:00 |
| A good encryption ? | science_man_88 | Soap Box | 14 | 2010-10-14 18:31 |
| Interesting Encryption problem | FDCmercs | Math | 0 | 2007-01-07 15:50 |
| No disk writing | Max | Software | 22 | 2006-10-27 21:26 |