SSD {hardware} encryption, what’s it good for? With Crucial and Samsung… completely nothing

Cyber security

Flaws in SSD {hardware} encryption have been uncovered by researchers within the Netherlands. The research from Radboud University has uncovered critical weak spots in {hardware} encryption, doubtlessly leaving consumer knowledge open to decryption by nefarious beings. The answer: flip {hardware} encryption off and get safer software program.

The paper, authored by researchers Carlo Meijer and Bernard van Gastel, outlines some slightly obtrusive points with the {hardware} encryption employed throughout a handful of Samsung and Micron (Crucial) SSDs. These drives all provide on-drive encryption baked into the {hardware} itself. Encryption keys are subsequently saved solely on the drives, in concept making a self-contained impenetrable lockbox.

But the fact is way from the theoretical implementation, in line with the research. The encrypted drive requires a consumer with legitimate entry (a password) to entry the DEK (knowledge encryption key) to subsequently decrypt and entry the saved recordsdata inside. However, because it seems, anybody hoping to realize entry to the drive with out supplying the password can primarily bypass the password bit with a little bit firmware tweak and get straight to the decryption bit. Oops.

This primarily renders the entire encryption course of out of date on the affected drives. The research’s guinea pigs embrace: Samsung T3, T5, 840 Evo, and 850 Evo drives, and Crucial MX100, MX200, and MX300 drives.

These are affected to various levels, with the 840 and 850 Evo each notably standing up a little bit higher than others. You can see the full list of drives and exact vulnerabilities within the study (PDF warning).

SSD internals

The {hardware} encryption flaws additionally has implications for Microsoft’s BitLocker. This is encryption software program included with each Windows construct supposed to supply customers ingrained knowledge safety performance inside the OS. Due to the implementation of this software program, when an SSD is able to {hardware} encryption, BitLocker merely turns off all software-side encryption measures.

“The results presented in this paper show that one should not rely solely on hardware encryption as offered by SSDs for confidentiality,” the researchers say within the paper. “We recommend users that depend on hardware encryption implemented in SSDs to employ also a software full-disk encryption solution, preferably an open-source and audited one.”

Luckily, the researchers suggest just a few mitigations. One is VeraCrypt: a free and open-source utility that’s able to cohabiting your PC alongside SSD-side {hardware} encryption. Another is to pressure BitLocker to utilise software program encryption even when hardware-side measures can be found. Be warned, nonetheless, this mitigation requires a full-reinstallation and reformat, so won’t be supreme for customers that don’t need to lose all their knowledge.

Van Gastel, in a remark to The Register, outlines how the safety normal the {hardware} distributors tried to satisfy, TCG Opal, is tough to implement appropriately. One potential avenue going ahead can be to make a standardised safety technique less complicated and simpler to implement – which I’m positive is less complicated stated than completed.

 
Source

Gaming hardware

Read also