Friday, February 13, 2015

Proprietary vs open-source encryption/security software


I just had an argument with colleagues about the usefulness of Microsoft BitLocker drive encryption for keeping representatives of the state (FBI etc.) out of data. They were convinced that vendors of proprietary software have backdoors in their algorithms which can be used in severe cases, i.e. suspicion of terrorism etc.


The alternative is of course TrueCrypt, because in theory, the code is open and can be reviewed by the public. In practice, even though I know the programming language, I do not have enough knowledge of the algorithm to be able to spot a possible backdoor or a feature which might give an advantage to a deliberate cryptographic attack. Does anyone know if the code has been reviewed by a trustworthy 3rd party? And if so, how is their trustworthyness established?


So, to come to the general questions:



  1. How would a company which really, really wants to keep their files completely secret decide upon their cryptographic solution? They cannot be 100% sure that BitLocker is safe, can they? However, would they in practice be able to make sure that TrueCrypt is?


  2. How would you estimate the chance that Microsoft and similar companies work with government agencies and give them an advantage to breaking their security so that it doesn't take 1000s of years to break (is that how long BitLocker should take)?



Answer



Microsoft have pretty much stated that there is no backdoor in Bitlocker, and I don't think it is in their best interest to as the backlash would be huge.


The leak of the Microsoft COFFEE tools basically packages a lot of methods already known to the security industry in an easy to use product for law enforcement, but no where is a hack/backdoor for Bitlocker.


I am not saying it doesn't exist, but I find it highly unlikely.


There is nothing stopping you for using a Bitlocker drive and then having a Truecrypt encrypted file inside it!


I think the most likely way encryption like this will be broken is through pure brute force through super computer power.


No comments:

Post a Comment

linux - How to SSH to ec2 instance in VPC private subnet via NAT server

I have created a VPC in aws with a public subnet and a private subnet. The private subnet does not have direct access to external network. S...