[H-GEN] Why bother with root when you can take the box?
Benjamin
benjamincarlyle at optusnet.com.au
Fri Sep 12 01:44:39 EDT 2003
[ Humbug *General* list - semi-serious discussions about Humbug and ]
[ Unix-related topics. Posts from non-subscribed addresses will vanish. ]
Trent WADDINGTON wrote:
> On Fri, 12 Sep 2003, Benjamin wrote:
>>with it is far far worse. What you really want is a key that is long
>>compared to the amount of data you're encrypting with it. By encryping
>>everything you're actually weakening your key.
> Very true, which is one of the reasons why multilevel passwords are a good
> idea. You have a long key to encrypt large amounts of data and then you
> encrypt that long key with a short key that you can remember. Compared to
> the short key, the long key is a small amount of data, so it's more secure
> than if you were to encrypt the large amount of data with the small key.
Perhaps what you really want is a removable device that is at least as
big as the amount of data you want to encrypt. You fill the removable
hard-drive with a real random number sequence. On your harddrive you
store all your data as an xor of the corresponding bits on your
removable device. Given that you can get 1 gig usb flash media these
days it starts to look like a reasonable way to do your encryption :)
You're always open to someone obtaining root access on your box and
watching you type stuff in or otherwise stealing your key, but if you
could store all of your data as an xor of your random sequence and
someone simply steals your hard-drive there's theoretically no way to
extract the data without your random number sequence[1]. How much data
do you need to be encrypted anyway? If you're administering data
produced by a large number of people you might need something more
scalable, but if you're only encrypting your own data then it might work
well :)
The problem then boils down to the security of your removable
hard-drive. Physical security may be easier to manage than that of your
PC because you can always have it on you. You could reinforce that
security by encrypting the sequence using a multi-level password system.
Of course each key in that multi-level system needs to be physically
secured also. A multi-level password system is only as strong as its
weakest password if someone has access to all the encrypted keys.
Oh, and is this better than just keeping your confidential data
encrypted with a multi-level password system? Probably not :) Ultimately
all of these schemes come down to the question of how many keys do I
need to have at the same time in order to break this system? and how do
I manage the physical security of each key? My feeling is that once you
go past 1) the encrypted data, 2) some key, and 3) some password to
activate the key you're in a process of diminishing returns. It also
looks to me like the multi-level password idea is the only reasonable
one because at each level it minimises the size of the data encrypted
when compared to the size of the key required to access it, which is no
doubt cryptographically safer than a simple password protecting data
that is the same size as that which is encrypted.
I've been interested lately in the idea of using a usb hard-drive to
manage keys for digital signatures, authentication and encryption. I
think it would be cool to be able to plug a usb key-ring into one of the
sockets on my computer at the gdm login and have my computer
automatically detect the insert event, mount the drive, notice that it
contains authentication data, and let me into the system. My biggest
sticking point with all of this is that the computer has physical access
to the keys. I would love to have a USB device that instead of simply
storing data could answer authentication challenges and have an
interface for passing data in and retrieving the encrpyted form of the
data back out again. I just don't like the idea of my computer knowing
my password ;)
Anyway, pie in the sky :)
Benjamin
[1] I am not a cryptographer, nor am I a cryptologist :)
--
* This is list (humbug) general handled by majordomo at lists.humbug.org.au .
* Postings to this list are only accepted from subscribed addresses of
* lists 'general' or 'general-post'. See http://www.humbug.org.au/
More information about the General
mailing list