captinkrunch Posted May 31, 2012 Posted May 31, 2012 (edited) hello i heard turecrypt was pretty much impossible to crack my question to u is if u format the drive could you then use forensics to dig up info/data??? i realize this is probally a stupid question but i would like to kno thanks!! Edited May 31, 2012 by captinkrunch Quote
Mr-Protocol Posted May 31, 2012 Posted May 31, 2012 hello i heard turecrypt was pretty much impossible to crack my question to u is if u format the drive could you then use forensics to dig up info/data??? i realize this is probally a stupid question but i would like to kno thanks!! http://code.google.com/p/truecrack/ If it was just deleted and overwritten, in theory the truecrypt volume could be recovered. But you would still need to crack the encryption on it to see the real data. Quote
KidBuu Posted May 31, 2012 Posted May 31, 2012 (edited) Technically everything encrypted is crackable, the strength behind an encryption is whether or not it is computationally feasable to recover the key. Basically to decrypt the ciphertext output by encryption algorithms that are called "uncrackable" you would need to enumerate all possible keys in order to recover the original data. For example, suppose that you use an encryption algorithm using a 128-bit key. Then you would need to try 2^128 keys by trying to break the encryption algorithm by brute force (assuming that cryptanalysis doesn't reduce the number of possibilities given a ciphertext), which even on hundreds of super computers would take hundreds of years if not more to break (don't feel like doing the math right now). AES is one of the most secure symmetric encryption algorithms as of now so if you use truecrypt I would probably choose that encryption algorithm. However, I read a research paper a few months ago where they basically found that if someone get's your computer in sleep mode they can examine memory to recover your encryption key (they didn't test truecrypt although). So furthermore, disk encryption is only secure if the computer is not powered on when it is taken. Search "cold booting" if you're interested in the disk encryption vulnerability Edited May 31, 2012 by KidBuu Quote
captinkrunch Posted May 31, 2012 Author Posted May 31, 2012 Technically everything encrypted is crackable, the strength behind an encryption is whether or not it is computationally feasable to recover the key. Basically to decrypt the ciphertext output by encryption algorithms that are called "uncrackable" you would need to enumerate all possible keys in order to recover the original data. For example, suppose that you use an encryption algorithm using a 128-bit key. Then you would need to try 2^128 keys by trying to break the encryption algorithm by brute force (assuming that cryptanalysis doesn't reduce the number of possibilities given a ciphertext), which even on hundreds of super computers would take hundreds of years if not more to break (don't feel like doing the math right now). AES is one of the most secure symmetric encryption algorithms as of now so if you use truecrypt I would probably choose that encryption algorithm. However, I read a research paper a few months ago where they basically found that if someone get's your computer in sleep mode they can examine memory to recover your encryption key (they didn't test truecrypt although). So furthermore, disk encryption is only secure if the computer is not powered on when it is taken. i belive its called cold starting (could be wrong) i also have seen ppl who unplug the comp plug it back in with a thumb drive for some reason or another it can recover the password some how (was awile ago cant rember) i was just woundering if u formated a drive if the encryption was still on the data you could forenscly pick up Quote
Mr-Protocol Posted May 31, 2012 Posted May 31, 2012 i belive its called cold starting (could be wrong) i also have seen ppl who unplug the comp plug it back in with a thumb drive for some reason or another it can recover the password some how (was awile ago cant rember) i was just woundering if u formated a drive if the encryption was still on the data you could forenscly pick up http://forums.hak5.org/index.php?showtopic=26622&view=findpost&p=203514 Quote
whitehat Posted May 31, 2012 Posted May 31, 2012 (edited) You see, Mr. P? Look at you being all helpful! As almost always!! You can't help it! You love it! You didn't tell him to Google it or that you don't spoon-feed or anything. He asked a question and you knew the answer so you answered it. Then he asked ANOTHER question even though he has a perfectly good Google-capable browser and you answered it AGAIN. It's not just bc of the sub-forum either. I can point out you being all helpful in Jasager and probably every area of the forum. You can't help yourself. You're NICE and HELPFUL and you love questions! You even ask them! ;) lolololol <3 <3 <3 Now go tell "science" you're sorry ;) jk! you da man Edited May 31, 2012 by whitehat Quote
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.