Watermarking Attack
   HOME

TheInfoList



OR:

In cryptography, a watermarking attack is an attack on
disk encryption Disk encryption is a technology which protects information by converting it into code that cannot be deciphered easily by unauthorized people or processes. Disk encryption uses disk encryption software or disk encryption hardware, hardware to encry ...
methods where the presence of a specially crafted piece of data can be detected by an attacker without knowing the encryption key.


Problem description

Disk encryption suites generally operate on data in 512-byte
sector Sector may refer to: Places * Sector, West Virginia, U.S. Geometry * Circular sector, the portion of a disc enclosed by two radii and a circular arc * Hyperbolic sector, a region enclosed by two radii and a hyperbolic arc * Spherical sector, a po ...
s which are individually encrypted and decrypted. These 512-byte sectors alone can use any
block cipher mode of operation In cryptography, a block cipher mode of operation is an algorithm that uses a block cipher to provide information security such as confidentiality or authenticity. A block cipher by itself is only suitable for the secure cryptographic transfor ...
(typically
CBC CBC may refer to: Media * Cadena Baja California or Grupo Cadena, a radio and television broadcaster in Mexico * Canadian Broadcasting Corporation, Canada's radio and television public broadcaster ** CBC Television ** CBC Radio One ** CBC Music ** ...
), but since arbitrary sectors in the middle of the disk need to be accessible individually, they cannot depend on the contents of their preceding/succeeding sectors. Thus, with CBC, each sector has to have its own
initialization vector In cryptography, an initialization vector (IV) or starting variable is an input to a cryptographic primitive being used to provide the initial state. The IV is typically required to be random or pseudorandom, but sometimes an IV only needs to be un ...
(IV). If these IVs are predictable by an attacker (and the filesystem reliably starts file content at the same offset to the start of each sector, and files are likely to be largely contiguous), then there is a
chosen plaintext attack A chosen-plaintext attack (CPA) is an attack model for cryptanalysis which presumes that the attacker can obtain the ciphertexts for arbitrary plaintexts.Ross Anderson, ''Security Engineering: A Guide to Building Dependable Distributed Systems''. ...
which can reveal the existence of encrypted data. The problem is analogous to that of using block ciphers in the electronic codebook (ECB) mode, but instead of whole blocks, only the first block in different sectors are identical. The problem can be relatively easily eliminated by making the IVs unpredictable with, for example, ESSIV. Alternatively, one can use modes of operation specifically designed for disk encryption (see
disk encryption theory Disk encryption is a special case of data at rest protection when the storage medium is a sector-addressable device (e.g., a hard disk). This article presents cryptographic aspects of the problem. For an overview, see disk encryption. For discussi ...
). This weakness affected many
disk encryption Disk encryption is a technology which protects information by converting it into code that cannot be deciphered easily by unauthorized people or processes. Disk encryption uses disk encryption software or disk encryption hardware, hardware to encry ...
programs, including older versions of
BestCrypt BestCrypt, developed bJetico is a commercial disk encryption app available for Windows, Linux, macOS and Android. BestCrypt comes in two editions: BestCrypt Volume Encryption to encrypt entire disk volumes; BestCrypt Container Encryption to ...
as well as the now-deprecated cryptoloop. To carry out the attack, a specially crafted plaintext file is created for encryption in the system under attack, to " NOP-out" the IV Markus Gattol
"Redundancy, the Watermarking Attack and its Countermeasures"
such that the first ciphertext block in two or more sectors is identical. This requires that the input to the cipher (plaintext, \scriptstyle P,
XOR Exclusive or, exclusive disjunction, exclusive alternation, logical non-equivalence, or logical inequality is a logical operator whose negation is the logical biconditional. With two inputs, XOR is true if and only if the inputs differ (one ...
initialisation vector, \scriptstyle IV) for each block must be the same; i.e., \scriptstyle P_1 \,\oplus\, IV_1 \;=\; P_2 \,\oplus\, IV_2. Thus, we must choose plaintexts, \scriptstyle P_1,\, P_2 such that \scriptstyle P_1 \,\oplus\, P_2 \;=\; IV_1 \,\oplus\, IV_2. The ciphertext block patterns generated in this way give away the existence of the file, without any need for the disk to be decrypted first.


See also

*
Disk encryption theory Disk encryption is a special case of data at rest protection when the storage medium is a sector-addressable device (e.g., a hard disk). This article presents cryptographic aspects of the problem. For an overview, see disk encryption. For discussi ...
*
Initialization vector In cryptography, an initialization vector (IV) or starting variable is an input to a cryptographic primitive being used to provide the initial state. The IV is typically required to be random or pseudorandom, but sometimes an IV only needs to be un ...
*
Block cipher modes of operation In cryptography, a block cipher mode of operation is an algorithm that uses a block cipher to provide information security such as confidentiality or authenticity. A block cipher by itself is only suitable for the secure cryptographic transfor ...
*
Watermark A watermark is an identifying image or pattern in paper that appears as various shades of lightness/darkness when viewed by transmitted light (or when viewed by reflected light, atop a dark background), caused by thickness or density variations i ...


References

{{Reflist Cryptographic attacks Disk encryption