Overclock.net › Forums › Industry News › Software News › [Princeton] Cold Boot Attacks on Encryption Keys
New Posts  All Forums:Forum Nav:

[Princeton] Cold Boot Attacks on Encryption Keys - Page 3

post #21 of 22
Quote:
Originally Posted by rabidgnome229 View Post
If somebody has physical access to your hardware there are easier ways to break into a system
This isn't about hacking it is about breaking encryption using the key which is held in your RAM.
Lee XT
(17 items)
 
  
CPUMotherboardGraphicsRAM
AMD FX-6300 Asus M5A97 SAPPHIRE Radeon HD 7850 AMD 4GB DDR3 1333MHZ 
RAMRAMRAMHard Drive
AMD 4GB DDR3 1333MHZ AMD 4GB DDR3 1333MHZ AMD 4GB DDR3 1333MHZ OCZ Vertex 4 256GB 
CoolingOSMonitorKeyboard
Corsair H80 Windows 8.1 Pro MCE Dell P2414H WHXV7  Microsoft Generic 
PowerCaseMouseMouse Pad
Ultra 600W Limited Edition NZXT Black Steel Razer Deathadder Razer Goliath 
Audio
Realtek HD Audio 
  hide details  
Reply
Lee XT
(17 items)
 
  
CPUMotherboardGraphicsRAM
AMD FX-6300 Asus M5A97 SAPPHIRE Radeon HD 7850 AMD 4GB DDR3 1333MHZ 
RAMRAMRAMHard Drive
AMD 4GB DDR3 1333MHZ AMD 4GB DDR3 1333MHZ AMD 4GB DDR3 1333MHZ OCZ Vertex 4 256GB 
CoolingOSMonitorKeyboard
Corsair H80 Windows 8.1 Pro MCE Dell P2414H WHXV7  Microsoft Generic 
PowerCaseMouseMouse Pad
Ultra 600W Limited Edition NZXT Black Steel Razer Deathadder Razer Goliath 
Audio
Realtek HD Audio 
  hide details  
Reply
post #22 of 22
Guys, as some of you know I am a Systems Engineer at PGP Corporation. Some of you may know of our software that does Whole Disk Encryption or possibly use it. We have been in the encryption industry for over 15 years and we are the leading encryption company. Just so that you are aware this is old news you have been able to do this for years. PGP actively fights these kind of attacks by switching and reversing keys in the computers memory non-stop. PGP also securely wipes the memory on shutdown or hibernate so that the keys cannot be read. This is a mute point and just another media hype like it always.
Mean Mango Rig
(13 items)
 
  
CPUMotherboardGraphicsRAM
Intel Core 2 Quad Q6600 G0 @ 3.0 GHZ EVGA nForce 680i SLI NF68-T1 Revision 2 2X SLI EVGA GeForce 9800 GT G92 512MB@600Mhz 4GB OCZ DDR2 6400 Platinum R2 1GBx4 
Hard DriveOptical DriveOSMonitor
2x Raptors140GB RAID 0 1x WD 1TB PIONEER DVR-112DBK 18X DVD±RW DL Windows 7 Ultimate x32 Dell 2007 FP 22" 
KeyboardPowerCaseMouse
Dell Extended Black USB OCZ 700W SLI GameXStream Black Honeycomb Cooling Cooler Master Elite 330 Black W/ Dust Screens Logitech MX™ Revolution 
Mouse Pad
Black GelWrist™ Mouse Pad 
  hide details  
Reply
Mean Mango Rig
(13 items)
 
  
CPUMotherboardGraphicsRAM
Intel Core 2 Quad Q6600 G0 @ 3.0 GHZ EVGA nForce 680i SLI NF68-T1 Revision 2 2X SLI EVGA GeForce 9800 GT G92 512MB@600Mhz 4GB OCZ DDR2 6400 Platinum R2 1GBx4 
Hard DriveOptical DriveOSMonitor
2x Raptors140GB RAID 0 1x WD 1TB PIONEER DVR-112DBK 18X DVD±RW DL Windows 7 Ultimate x32 Dell 2007 FP 22" 
KeyboardPowerCaseMouse
Dell Extended Black USB OCZ 700W SLI GameXStream Black Honeycomb Cooling Cooler Master Elite 330 Black W/ Dust Screens Logitech MX™ Revolution 
Mouse Pad
Black GelWrist™ Mouse Pad 
  hide details  
Reply
New Posts  All Forums:Forum Nav:
  Return Home
  Back to Forum: Software News
Overclock.net › Forums › Industry News › Software News › [Princeton] Cold Boot Attacks on Encryption Keys