Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Design flaw breaks Android storage encryption
iTnews (AUS) ^ | Jul 5 2016 10:40AM | Juha Saarinen

Posted on 07/06/2016 9:49:42 PM PDT by Utilizer

The full disk encryption used to safeguard information stored on Google Android devices can be broken, an independent researcher has found.

Gal Beniamini spent several years analysing the TrustZone platform found on Qualcomm chipsets, and utilised previously gained knowledge to run code that is able to extract the encryption keys used to scramble stored data on Android devices.

The researcher discovered that encryption keys derived from the TrustZone feature could be extracted by software and cracked by brute force outside the Android devices, thus bypassing security mechanisms that limit the number of password guesses that can be made.

(Excerpt) Read more at itnews.com.au ...


TOPICS: Business/Economy; Computers/Internet
KEYWORDS: android; compromised; hacking; phone; security; storage
More problems, it would appear, for the Android users out there. Is cracking the encryption as simple really as this article makes it out to be?
1 posted on 07/06/2016 9:49:42 PM PDT by Utilizer
[ Post Reply | Private Reply | View Replies]

To: ThunderSleeps

Ping!


2 posted on 07/06/2016 9:57:07 PM PDT by Utilizer (Bacon A'kbar! - In world today are only peaceful people, and the muzrims trying to kill them)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Utilizer

NSA approved.


3 posted on 07/06/2016 9:57:10 PM PDT by Yo-Yo (Is the /sarc tag really necessary?)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Utilizer

How do you crack code by using brute force? This sounds like an incorrect Autocorrect correction.


4 posted on 07/06/2016 9:59:59 PM PDT by Crucial
[ Post Reply | Private Reply | To 1 | View Replies]

To: Crucial

At first guess? By throwing numbers at it.

Been done in the past.


5 posted on 07/06/2016 10:16:01 PM PDT by Utilizer (Bacon A'kbar! - In world today are only peaceful people, and the muzrims trying to kill them)
[ Post Reply | Private Reply | To 4 | View Replies]

To: Crucial

Sometimes/Often the effective key space of crypto keys may be less than the theoretical maximum (2 raised to the number of bits in key).

Sometimes bad crypto sets up the keys such that you can make predictions/short-cuts that narrow the key space enough to make brute forces attacks feasible.

If Android has a max-retries value that if exceeded wipes the storage, pulling the keys outside the system lets an attacker try as many times as he wants to guess to the password.


6 posted on 07/06/2016 10:17:27 PM PDT by 13foxtrot
[ Post Reply | Private Reply | To 4 | View Replies]

To: Yo-Yo

Google implemented.


7 posted on 07/06/2016 10:41:06 PM PDT by Utilizer (Bacon A'kbar! - In world today are only peaceful people, and the muzrims trying to kill them)
[ Post Reply | Private Reply | To 3 | View Replies]

To: Crucial

Brute force = repeated attempts.


8 posted on 07/06/2016 10:43:28 PM PDT by dinodino
[ Post Reply | Private Reply | To 4 | View Replies]

To: dinodino

Which, if you have enough computing power behind it, does indeed work. Strains the brains, ‘ay mate?


9 posted on 07/06/2016 11:01:13 PM PDT by Utilizer (Bacon A'kbar! - In world today are only peaceful people, and the muzrims trying to kill them)
[ Post Reply | Private Reply | To 8 | View Replies]

To: Utilizer

Android = Google = NSA


10 posted on 07/07/2016 2:21:57 AM PDT by Enlightened1
[ Post Reply | Private Reply | To 1 | View Replies]

To: Utilizer

for real security,

pre-encrypt with a
(at least) 256 bit symmetric-key block-cypher


11 posted on 07/07/2016 2:51:17 AM PDT by RockyTx
[ Post Reply | Private Reply | To 1 | View Replies]

To: Utilizer

Of course it can. The NSA would not have it any other way.


12 posted on 07/07/2016 5:19:19 AM PDT by E. Pluribus Unum ("It's okay to commit felonies as long as breaking the law isn't your primary objective." James Comey)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Crucial

https://en.wikipedia.org/wiki/Brute-force_attack

In cryptography, a brute-force attack consists of an attacker trying many passwords or passphrases with the hope of eventually guessing correctly. The attacker systematically checks all possible passwords and passphrases until the correct one is found. Alternatively, the attacker can attempt to guess the key which is typically created from the password using a key derivation function. This is known as an exhaustive key search.


13 posted on 07/07/2016 5:20:29 AM PDT by E. Pluribus Unum ("It's okay to commit felonies as long as breaking the law isn't your primary objective." James Comey)
[ Post Reply | Private Reply | To 4 | View Replies]

To: Utilizer
In this case, we're talking about storage on the device, correct?

This encrypts the data while it is on the device, but not if the data is moved via some transport mechanism (WiFi, Cellular, etc). In other words, TrustZone protects data at rest, not data in motion.

Seems to me the key here is physical control and security.

The 3rd Law of the 10 Immutable Laws of Computer Security is:

#3: If I can get physical access to your computer, it's no longer your computer.

I know this doesn't help if the device is lost, stolen or used by some malicious player, but if I could get a copy of even something as secure as a Windows domain controller's NTDS.DIT file, I could brute force and hack at it at leisure.

So the 3rd law still very much applies.

14 posted on 07/07/2016 5:29:20 AM PDT by Alas Babylon!
[ Post Reply | Private Reply | To 1 | View Replies]

To: Utilizer

Thanks for the heads up. I’ll post to the list this weekend when I get home. On the road, and I forgot to bring the latest list with me or put it up on docs...smh


15 posted on 07/07/2016 9:12:32 AM PDT by ThunderSleeps (Stop obarma now! Stop the hussein - insane agenda!)
[ Post Reply | Private Reply | To 2 | View Replies]

To: 109ACS; aimhigh; bajabaja; Bikkuri; Bobalu; Bookwoman; Bullish; Carpe Cerevisi; DarthDilbert; ...
Android device encryption can be broken - ANDROID PING!

Android Ping!
If you want on or off the Android Ping List, Freepmail me.

My take: I don't encrypt my device, but then I don't store anything valuable on it either. I don't use the electronic pay, I don't use the same passwords on any email accounts as on my bank site, etc.
16 posted on 07/15/2016 5:48:17 AM PDT by ThunderSleeps (Stop obarma now! Stop the hussein - insane agenda!)
[ Post Reply | Private Reply | To 2 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson