[liberationtech] Android Full-Disk Encryption Cracked
Steve Weis
steveweis at gmail.com
Mon Apr 29 12:29:54 PDT 2013
To add to the list of issues here, crypto implementations on mobile devices
may be vulnerable to power analysis side-channel attacks. Attackers may be
able to measure RF signal strength to infer power consumption during crypto
operations, then derive key material. I think Cryptography Research Inc.
has been researching these attacks and working on countermeasures.
On Mon, Apr 29, 2013 at 12:09 PM, Seth David Schoen <schoen at eff.org> wrote:
> ...
>
There are a lot of problems about disk encryption on small
> mobile devices. One that was highlighted by Belenko and
> Sklyarov at Black Hat EU 2012 is that mobile device CPUs are
> relatively slow, so it's difficult to do very large numbers of
> iterations of key derivation functions, which would make
> brute-force cracking slower.
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mailman.stanford.edu/pipermail/liberationtech/attachments/20130429/1f383569/attachment.html>
More information about the liberationtech
mailing list