Stories
Slash Boxes
Comments

SoylentNews is people

SoylentNews is powered by your submissions, so send in your scoop. Only 15 submissions in the queue.
posted by janrinok on Saturday June 06 2015, @06:34AM   Printer-friendly
from the in-ms-we-trust dept.

The Intercept's Micah Lee wrote a guide explaining how to encrypt a hard drive but was criticized for recommending Microsoft's BitLocker disk encryption utility for Windows users. Microsoft has responded to some of the criticisms by providing more details about how BitLocker works:

The company told me which random number generator BitLocker uses to generate encryption keys, alleviating concerns about a government backdoor in that subsystem; it explained why it removed the Elephant diffuser, citing worries over performance and compatibility that will appease some, but certainly not all, concerned parties; and it said that the government-compromised algorithm it bundles with Windows to generate encryption keys is, by default, not used at all.

Significant questions remain about BitLocker, to be sure, and because the source code for it is not available, those questions will likely remain unanswered. As prominent cryptographer Bruce Schneier has written, "In the cryptography world, we consider open source necessary for good security; we have for decades." Despite all of this, BitLocker still might be the best option for Windows users who want to encrypt their disks.

Microsoft cryptographer Niels Ferguson gave a presentation in 2007 suggesting that Dual_EC_DRBG might have a backdoor. These suspicions were confirmed by the Snowden documents. Microsoft says that the default pseudorandom number generator for Windows is CTR_DRBG, and that BitLocker uses it when it generates a new key.

BitLocker uses an encoding engine, AES-CBC, and originally used the "Elephant diffuser" to protect encrypted files from being modified to become malicious by an attacker with physical access. Microsoft removed the Elephant diffuser because it hurt performance and is not compliant with Federal Information Processing Standards. Linux systems using LUKS disk encryption are vulnerable to the same kind of attack.

Microsoft says that it does not build backdoors into its products, but that it doesn't consider building methods to bypass their security in order to comply with legitimate legal requests "backdoors." It also shares its source code with governments so that they can check for backdoors... or for vulnerabilities which they could use as backdoors. A Microsoft spokesperson would not answer whether Microsoft could comply with a lawful request to unlock a BitLocker-encrypted disk.

TrueCrypt and its VeraCrypt and CipherShed forks do not play well with post-Windows 8 UEFI and GPT partition tables. Bruce Schneier recommends the proprietary BestCrypt full-disk encryption for Windows users. How does he reconcile this recommendation with what he wrote in 1999? "I do recommend BestCrypt because I have met people at the company and I have a good feeling about them. Of course I don't know for sure; this business is all about trust. But right now, given what I know, I trust them."


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 3, Informative) by Anonymous Coward on Saturday June 06 2015, @07:45PM

    by Anonymous Coward on Saturday June 06 2015, @07:45PM (#192980)

    _NSAKEY [wikipedia.org].

    Starting Score:    0  points
    Moderation   +3  
       Informative=3, Total=3
    Extra 'Informative' Modifier   0  

    Total Score:   3  
  • (Score: 2) by Hairyfeet on Saturday June 06 2015, @10:50PM

    by Hairyfeet (75) <bassbeast1968NO@SPAMgmail.com> on Saturday June 06 2015, @10:50PM (#193031) Journal

    So let me get this straight....you are butthurt that MSFT actually followed the laws in their home country [techcrunch.com] instead of telling the government "fuck you we can do what we want"....is THAT your position?

    Well then you should be completely against the MSFT antitrust ruling or any kind of restrictions on any backroom dealing by ANY corp, since they are only doing as you want and flipping the bird to the law of the land.

    --
    ACs are never seen so don't bother. Always ready to show SJWs for the racists they are.
    • (Score: 2) by NCommander on Sunday June 07 2015, @02:28AM

      by NCommander (2) Subscriber Badge <michael@casadevall.pro> on Sunday June 07 2015, @02:28AM (#193110) Homepage Journal

      That was acceptable when the United States disallowed export of secure encryption (Lotus Notes did something similar, 64-bit key, with the top 24 bits given to the NSA. Wikipedia has a reference about it [wikipedia.org]). However, since encryption is no longer export prohibited (for the most part), there's no reason that this needs to exist anymore. I was actually unaware of the NSAKEY in Windows before this post, so ++ to OP.

      --
      Still always moving