Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

Watermarking attack

From Wikipedia, the free encyclopedia
Attack on disk encryption methods

In cryptography, awatermarking attack is an attack ondisk encryption methods where the presence of a specially crafted piece of data can be detected by an attacker without knowing the encryptionkey.

Problem description

[edit]

Disk encryption suites generally operate on data in 512-bytesectors which are individually encrypted and decrypted. These 512-byte sectors alone can use anyblock cipher mode of operation (typicallyCBC), but since arbitrary sectors in the middle of the disk need to be accessible individually, they cannot depend on the contents of their preceding/succeeding sectors. Thus, with CBC, each sector has to have its owninitialization vector (IV). If these IVs are predictable by an attacker (and thefilesystem reliably starts file content at the same offset to the start of each sector, and files are likely to be largely contiguous), then there is achosen plaintext attack which can reveal the existence of encrypted data.

The problem is analogous to that of using block ciphers in theelectronic codebook (ECB) mode, but instead of whole blocks, only the first block in different sectors are identical. The problem can be relatively easily eliminated by making the IVs unpredictable with, for example,ESSIV.[1]

Alternatively, one can use modes of operation specifically designed for disk encryption (seedisk encryption theory). This weakness affected manydisk encryption programs, including older versions ofBestCrypt[2] as well as the now-deprecatedcryptoloop.[3]

To carry out the attack, a specially crafted plaintext file is created for encryption in the system under attack, to "NOP-out" the IV[4]such that the first ciphertext block in two or more sectors is identical. This requires that the input to the cipher (plaintext,P{\displaystyle \scriptstyle P},XOR initialisation vector,IV{\displaystyle \scriptstyle IV}) for each block must be the same; i.e.,P1IV1=P2IV2{\displaystyle \scriptstyle P_{1}\,\oplus \,IV_{1}\;=\;P_{2}\,\oplus \,IV_{2}}. Thus, we must choose plaintexts,P1,P2{\displaystyle \scriptstyle P_{1},\,P_{2}} such thatP1P2=IV1IV2{\displaystyle \scriptstyle P_{1}\,\oplus \,P_{2}\;=\;IV_{1}\,\oplus \,IV_{2}}.

The ciphertext block patterns generated in this way give away the existence of the file, without any need for the disk to be decrypted first.

See also

[edit]

References

[edit]
  1. ^Fruhwirth, Clemens."Linux hard disk encryption settings". Retrieved2006-01-02.
  2. ^Chiriliuc, Adal (2003-10-23)."BestCrypt IV generation flaw". Retrieved2023-05-21.
  3. ^Saarinen, Markku-Juhani O. (2004-02-19)."Linux for the Information Smuggler". Helsinki University of Technology.CiteSeerX 10.1.1.117.4062. Retrieved2006-10-01.
  4. ^Markus Gattol."Redundancy, the Watermarking Attack and its Countermeasures".
Retrieved from "https://en.wikipedia.org/w/index.php?title=Watermarking_attack&oldid=1211228532"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2026 Movatter.jp