fbpx
Wikipedia

BitLocker

BitLocker is a full volume encryption feature included with Microsoft Windows versions starting with Windows Vista. It is designed to protect data by providing encryption for entire volumes. By default, it uses the Advanced Encryption Standard (AES) algorithm in cipher block chaining (CBC) or "xor–encrypt–xor (XEX)-based Tweaked codebook mode with ciphertext Stealing" (XTS) mode[1] with a 128-bit or 256-bit key.[2][3] CBC is not used over the whole disk; it is applied to each individual sector.[3]

BitLocker
BitLocker option while encrypting a USB thumb drive.
Other namesDevice Encryption
Developer(s)Microsoft
Initial releaseJanuary 30, 2007; 16 years ago (2007-01-30)
Operating systemMicrosoft Windows
TypeDisk encryption software
Websitelearn.microsoft.com/en-us/windows/security/operating-system-security/data-protection/bitlocker/ 

History edit

BitLocker originated as a part of Microsoft's Next-Generation Secure Computing Base architecture in 2004 as a feature tentatively codenamed "Cornerstone"[4][5] and was designed to protect information on devices, particularly if a device was lost or stolen. Another feature, titled "Code Integrity Rooting", was designed to validate the integrity of Microsoft Windows boot and system files.[4] When used in conjunction with a compatible Trusted Platform Module (TPM), BitLocker can validate the integrity of boot and system files before decrypting a protected volume; an unsuccessful validation will prohibit access to a protected system.[6][7] BitLocker was briefly called Secure Startup before Windows Vista's release to manufacturing.[6]

BitLocker is available on:

Features edit

manage-bde
Developer(s)Microsoft
Initial releaseJanuary 30, 2007; 16 years ago (2007-01-30)
Operating systemMicrosoft Windows
TypeCommand
LicenseProprietary commercial software
Websitemanage-bde

Initially, the graphical BitLocker interface in Windows Vista could only encrypt the operating system volume. Starting with Windows Vista with Service Pack 1 and Windows Server 2008, volumes other than the operating system volume could be encrypted using the graphical tool. Still, some aspects of the BitLocker (such as turning autolocking on or off) had to be managed through a command-line tool called manage-bde.wsf.[13]

The version of BitLocker included in Windows 7 and Windows Server 2008 Release 2 adds the ability to encrypt removable drives. On Windows XP or Windows Vista, read-only access to these drives can be achieved through a program called BitLocker To Go Reader, if FAT16, FAT32 or exFAT filesystems are used.[14] In addition, a new command-line tool called manage-bde replaced the old manage-bde.wsf.[15]

Starting with Windows Server 2012 and Windows 8, Microsoft has complemented BitLocker with the Microsoft Encrypted Hard Drive specification, which allows the cryptographic operations of BitLocker encryption to be offloaded to the storage device's hardware.[16][17] In addition, BitLocker can now be managed through Windows PowerShell.[18] Finally, Windows 8 introduced Windows To Go in its Enterprise edition, which BitLocker can protect.[19]

Device encryption edit

Windows Mobile 6.5, Windows RT and core editions of Windows 8.1 include device encryption, a feature-limited version of BitLocker that encrypts the whole system.[20][21][22] Logging in with a Microsoft account with administrative privileges automatically begins the encryption process. The recovery key is stored to either the Microsoft account or Active Directory (Active Directory requires Pro editions of Windows), allowing it to be retrieved from any computer. While device encryption is offered on all editions of Windows 8.1, unlike BitLocker, device encryption requires that the device meet the InstantGo (formerly Connected Standby) specifications,[22] which requires solid-state drives, non-removable RAM (to protect against cold boot attacks) and a TPM 2.0 chip.[20][23]

Starting with Windows 10 1703, the requirements for device encryption have changed, requiring a TPM 1.2 or 2.0 module with PCR 7 support, UEFI Secure Boot, and that the device meets Modern Standby requirements or HSTI validation.[24]

In September 2019 a new update was released (KB4516071[25]) changing the default setting for BitLocker when encrypting a self-encrypting hard drive. Now, the default is to use software encryption for newly encrypted drives. This is due to hardware encryption flaws and security concerns related to those issues.[26]

Encryption modes edit

Three authentication mechanisms can be used as building blocks to implement BitLocker encryption:[27]

  • Transparent operation mode: This mode uses the capabilities of TPM 1.2 hardware to provide for transparent user experience—the user powers up and logs into Windows as usual. The key used for disk encryption is sealed (encrypted) by the TPM chip and will only be released to the OS loader code if the early boot files appear to be unmodified. The pre-OS components of BitLocker achieve this by implementing a Static Root of Trust Measurement—a methodology specified by the Trusted Computing Group (TCG). This mode is vulnerable to a cold boot attack, as it allows a powered-down machine to be booted by an attacker. It is also vulnerable to a sniffing attack, as the volume encryption key is transferred in plain text from the TPM to the CPU during a successful boot.
  • User authentication mode: This mode requires that the user provide some authentication to the pre-boot environment in the form of a pre-boot PIN or password.
  • USB Key Mode: The user must insert a USB device that contains a startup key into the computer to be able to boot the protected OS. Note that this mode requires that the BIOS on the protected machine supports the reading of USB devices in the pre-OS environment. BitLocker does not support smart cards for pre-boot authentication.[28]

The following combinations of the above authentication mechanisms are supported, all with an optional escrow recovery key:

Operation edit

BitLocker is a logical volume encryption system. (A volume spans part of a hard disk drive, the whole drive or more than one drive.) When enabled, TPM and BitLocker can ensure the integrity of the trusted boot path (e.g. BIOS and boot sector), in order to prevent most offline physical attacks and boot sector malware.[35]

In order for BitLocker to encrypt the volume holding the operating system, at least two NTFS-formatted volumes are required: one for the operating system (usually C:) and another with a minimum size of 100 MB, which remains unencrypted and boots the operating system.[35] (In case of Windows Vista and Windows Server 2008, however, the volume's minimum size is 1.5 GB and must have a drive letter.)[36] Unlike previous versions of Windows, Vista's "diskpart" command-line tool includes the ability to shrink the size of an NTFS volume so that this volume may be created from already allocated space. A tool called the BitLocker Drive Preparation Tool is also available from Microsoft that allows an existing volume on Windows Vista to be shrunk to make room for a new boot volume and for the necessary bootstrapping files to be transferred to it.[37]

Once an alternate boot partition has been created, the TPM module needs to be initialized (assuming that this feature is being used), after which the required disk-encryption key protection mechanisms such as TPM, PIN or USB key are configured.[38] The volume is then encrypted as a background task, something that may take a considerable amount of time with a large disk as every logical sector is read, encrypted and rewritten back to disk.[38] The keys are only protected after the whole volume has been encrypted when the volume is considered secure.[39] BitLocker uses a low-level device driver to encrypt and decrypt all file operations, making interaction with the encrypted volume transparent to applications running on the platform.[38]

Encrypting File System (EFS) may be used in conjunction with BitLocker to provide protection once the operating system is running. Protection of the files from processes and users within the operating system can only be performed using encryption software that operates within Windows, such as EFS. BitLocker and EFS, therefore, offer protection against different classes of attacks.[40]

In Active Directory environments, BitLocker supports optional key escrow to Active Directory, although a schema update may be required for this to work (i.e. if the Active Directory Services are hosted on a Windows version previous to Windows Server 2008).

BitLocker and other full disk encryption systems can be attacked by a rogue boot manager. Once the malicious bootloader captures the secret, it can decrypt the Volume Master Key (VMK), which would then allow access to decrypt or modify any information on an encrypted hard disk. By configuring a TPM to protect the trusted boot pathway, including the BIOS and boot sector, BitLocker can mitigate this threat. (Note that some non-malicious changes to the boot path may cause a Platform Configuration Register check to fail, and thereby generate a false warning.)[35]

Security concerns edit

TPM alone is not enough edit

The "Transparent operation mode" and "User authentication mode" of BitLocker use TPM hardware to detect whether there are unauthorized changes to the pre-boot environment, including the BIOS and MBR. If any unauthorized changes are detected, BitLocker requests a recovery key on a USB device. This cryptographic secret is used to decrypt the Volume Master Key (VMK) and allow the bootup process to continue.[41] However, TPM alone is not enough:

  • In February 2008, a group of security researchers published details of a so-called "cold boot attack" that allows full disk encryption systems such as BitLocker to be compromised by booting the machine from removable media, such as a USB drive, into another operating system, then dumping the contents of pre-boot memory.[42] The attack relies on the fact that DRAM retains information for up to several minutes (or even longer, if cooled) after the power has been removed. The Bress/Menz device, described in US Patent 9,514,789, can accomplish this type of attack.[43] Similar full disk encryption mechanisms of other vendors and other operating systems, including Linux and Mac OS X, are vulnerable to the same attack. The authors recommend that computers be powered down when not in physical control of the owner (rather than be left in a sleep mode) and that the encryption software be configured to require a password to boot the machine.[42]
  • On 10 November 2015, Microsoft released a security update to mitigate a security vulnerability in BitLocker that allowed authentication to be bypassed by employing a malicious Kerberos key distribution center, if the attacker had physical access to the machine, the machine was part of a domain and had no PIN or USB flash drive protection.[44]
  • BitLocker still does not properly support TPM 2.0 security features which, as a result, can lead to a complete bypass of privacy protection when keys are transmitted over Serial Peripheral Interface in a motherboard.[45]

All these attacks require physical access to the system and are thwarted by a secondary protector such as a USB flash drive or PIN code.

Upholding Kerckhoffs's principle edit

Although the AES encryption algorithm used in BitLocker is in the public domain, its implementation in BitLocker, as well as other components of the software, are proprietary; however, the code is available for scrutiny by Microsoft partners and enterprises, subject to a non-disclosure agreement.[46][47]

According to Microsoft sources,[48] BitLocker does not contain an intentionally built-in backdoor, so there is no Microsoft-provided way for law enforcement to have guaranteed access to the data on a user's drive. In 2006, the UK Home Office expressed concern over the lack of a backdoor and tried entering into talks with Microsoft to get one introduced.[49] Microsoft developer and cryptographer Niels Ferguson denied the backdoor request and said, "over my dead body".[50] Microsoft engineers have said that United States Federal Bureau of Investigation agents also put pressure on them in numerous meetings to add a backdoor, although no formal, written request was ever made; Microsoft engineers eventually suggested that agents should look for the hard copy of the encryption key that the BitLocker program suggests that its users make.[51]

Niels Ferguson's position that "back doors are simply not acceptable"[50] is in accordance with Kerckhoffs's principle. Stated by Netherlands-born cryptographer Auguste Kerckhoffs in the 19th century, the principle holds that a cryptosystem should be secure, even if everything about the system, except the encryption key, is public knowledge.

Other concerns edit

Starting with Windows 8 and Windows Server 2012, Microsoft removed the Elephant Diffuser from the BitLocker scheme for no declared reason.[52] Dan Rosendorf's research shows that removing the Elephant Diffuser had an "undeniably negative impact" on the security of BitLocker encryption against a targeted attack.[53] Microsoft later cited performance concerns, and noncompliance with the Federal Information Processing Standards (FIPS), to justify the diffuser's removal.[54] Starting with Windows 10 version 1511, however, Microsoft added a new FIPS-compliant XTS-AES encryption algorithm to BitLocker.[1] Starting with Windows 10 version 1803, Microsoft added a new feature called "Kernel Direct Memory access (DMA) Protection" to BitLocker, to protect against DMA attacks via Thunderbolt 3 ports.[55][56]

In October 2017, it was reported that a flaw enabled private keys to be inferred from public keys, which could allow an attacker to bypass BitLocker encryption when an affected TPM chip is used.[57] The flaw is the Return of Coppersmith's Attack or ROCA vulnerability which is in a code library developed by Infineon and had been in widespread use in security products such as smartcards and TPMs. Microsoft released an updated version of the firmware for Infineon TPM chips that fixes the flaw via Windows Update.[58]

See also edit

References edit

  1. ^ a b Hakala, Trudy (January 29, 2020). "What's new in Windows 10, versions 1507 and 1511". TechNet. Microsoft. Retrieved March 7, 2020.
  2. ^ a b "Windows BitLocker Drive Encryption Frequently Asked Questions". TechNet Library. Microsoft. March 22, 2012. Retrieved March 7, 2020.
  3. ^ a b Ferguson, Niels (August 2006). "AES-CBC + Elephant Diffuser: A Disk Encryption Algorithm for Windows Vista" (PDF). Microsoft. Retrieved March 7, 2020. {{cite journal}}: Cite journal requires |journal= (help)
  4. ^ a b Biddle, Peter (2004). . Microsoft. Archived from the original (PPT) on August 27, 2006. Retrieved March 7, 2020.
  5. ^ Thurrott, Paul (September 9, 2005). . Supersite for Windows. Penton. Archived from the original on April 2, 2015. Retrieved March 7, 2020.
  6. ^ a b Microsoft (April 22, 2005). "Secure Startup–Full Volume Encryption: Technical Overview" (DOC). Retrieved March 7, 2020.
  7. ^ Microsoft (April 21, 2005). "Secure Startup – Full Volume Encryption: Executive Overview" (DOC). Retrieved March 7, 2020.
  8. ^ a b "What's New in BitLocker". TechNet Library. Microsoft. August 31, 2016. Retrieved March 7, 2020.
  9. ^ . TechNet. Microsoft. Archived from the original on November 17, 2016. Retrieved March 7, 2020.
  10. ^ "BitLocker Drive Encryption Overview". TechNet. Microsoft. November 17, 2009. Retrieved March 7, 2020.
  11. ^ "Compare Windows 10 Editions". Windows for Business. Microsoft. Retrieved March 7, 2020.
  12. ^ "Finding your BitLocker recovery key in Windows". Windows support. Microsoft. Retrieved December 2, 2021.
  13. ^ Hynes, Byron (September 8, 2016). "Advances in BitLocker Drive Encryption". TechNet Magazine. Microsoft. Retrieved March 7, 2020.
  14. ^ . Microsoft. Archived from the original on September 24, 2019. Retrieved April 25, 2017.
  15. ^ "Enabling BitLocker by Using the Command Line". TechNet. Microsoft. September 12, 2012. Retrieved March 7, 2020.
  16. ^ "Encrypted Hard Drive". TechNet. Microsoft. August 31, 2016. Retrieved March 7, 2020.
  17. ^ "Encrypted Hard Drive Device Guide". MSDN. Microsoft. June 1, 2017. Retrieved March 7, 2020.
  18. ^ "BitLocker". TechNet. Microsoft. Retrieved March 7, 2020.
  19. ^ "Windows To Go: Frequently Asked Questions". TechNet. Microsoft. October 23, 2013. Retrieved March 7, 2020.
  20. ^ a b "Device Encryption". Device Encryption. Microsoft. November 18, 2015. Retrieved March 7, 2020.
  21. ^ Cunningham, Andrew (October 17, 2013). "Windows 8.1 includes seamless, automatic disk encryption—if your PC supports it". Ars Technica. Condé Nast. Retrieved March 7, 2020.
  22. ^ a b . Windows Help portal. Microsoft. Archived from the original on May 2, 2016. Retrieved March 7, 2020.
  23. ^ Thurrott, Paul (June 4, 2013). . Paul Thurrott's SuperSite for Windows. Penton Media. Archived from the original on June 9, 2013. Retrieved March 7, 2020.
  24. ^ "BitLocker drive encryption in Windows 10 for OEMs". docs.microsoft.com. November 16, 2018. Retrieved March 7, 2020.
  25. ^ "September 24, 2019—KB4516071 (OS Build 16299.1420)". support.microsoft.com. Retrieved March 7, 2020.
  26. ^ Cimpanu, Catalin (November 5, 2018). "Flaws in self-encrypting SSDs let attackers bypass disk encryption". www.zdnet.com. Retrieved March 7, 2020.
  27. ^ . Data Encryption Toolkit for Mobile PCs: Security Analysis. Microsoft. April 4, 2007. Archived from the original on October 23, 2007. Retrieved March 7, 2020.
  28. ^ Dansimp. "Using BitLocker with other programs FAQ (Windows 10) - Windows security". docs.microsoft.com. Retrieved July 27, 2022.
  29. ^ "ProtectKeyWithTPM method of the Win32_EncryptableVolume class". MSDN Library. Microsoft. March 31, 2018. Retrieved March 7, 2020.
  30. ^ "ProtectKeyWithTPMAndPIN method of the Win32_EncryptableVolume class". MSDN Library. Microsoft. March 31, 2018. Retrieved March 7, 2020.
  31. ^ "ProtectKeyWithTPMAndPINAndStartupKey method of the Win32_EncryptableVolume class". MSDN Library. Microsoft. March 31, 2018. Retrieved March 7, 2020.
  32. ^ "ProtectKeyWithTPMAndStartupKey method of the Win32_EncryptableVolume class". MSDN Library. Microsoft. March 31, 2018. Retrieved March 7, 2020.
  33. ^ "ProtectKeyWithExternalKey method of the Win32_EncryptableVolume class". MSDN Library. Microsoft. March 31, 2018. Retrieved March 7, 2020.
  34. ^ "ProtectKeyWithNumericalPassword method of the Win32_EncryptableVolume class". MSDN Library. Microsoft. March 31, 2018. Retrieved March 7, 2020.
  35. ^ a b c "BitLocker Drive Encryption in Windows 7: Frequently Asked Questions". TechNet. Microsoft. September 12, 2012. Retrieved March 7, 2020.
  36. ^ "Windows BitLocker Drive Encryption Step-by-Step Guide". TechNet. Microsoft. July 2, 2012. Retrieved March 7, 2020.
  37. ^ "Description of the BitLocker Drive Preparation Tool". Microsoft. December 21, 2011. Retrieved March 7, 2020.
  38. ^ a b c Andrew, Bettany; Halsey, Mike (2013). Exam Ref 70-687: Configuring Windows 8 (1 ed.). Microsoft Press. p. 307. ISBN 978-0-7356-7392-2. OCLC 851209981.
  39. ^ Jerry, Honeycutt (2012). Introducing Windows 8: An Overview for IT professionals. Microsoft. p. 121. ISBN 978-0-7356-7050-1. OCLC 819519777.
  40. ^ Ou, George (February 28, 2007). "Prevent data theft with Windows Vista's Encrypted File System (EFS) and BitLocker". TechRepublic. CBS Interactive. Retrieved March 7, 2020.
  41. ^ Byron, Hynes (September 7, 2016). "Keys to Protecting Data with BitLocker Drive Encryption". TechNet Magazine. Microsoft. Retrieved March 7, 2020.
  42. ^ a b Halderman, J. Alex; Schoen, Seth D.; Heninger, Nadia; Clarkson, William; Paul, William; Calandrino, Joseph A.; Feldman, Ariel J.; Appelbaum, Jacob; Felten, Edward W (February 21, 2008). Lest We Remember: Cold Boot Attacks on Encryption Keys (PDF) (Thesis). Princeton University. Retrieved March 7, 2020.
  43. ^ "Systems and methods for safely moving short term memory devices while preserving, protecting and examining their digital data". Retrieved March 7, 2020.
  44. ^ "Microsoft Security Bulletin MS15-122 – Important". Security TechCenter. Microsoft. October 11, 2017. Retrieved March 7, 2020.
  45. ^ "From Stolen Laptop to Inside the Company Network". Dolos Group. July 28, 2021. Retrieved December 2, 2021.
  46. ^ Thurrott, Paul (June 10, 2015). "No Back Doors: Microsoft Opens Windows Source Code to EU Governments". Petri. Retrieved March 7, 2020.
  47. ^ "Shared Source Initiative". www.microsoft.com. Retrieved March 7, 2020.
  48. ^ "Back-door nonsense". System Integrity Team Blog. Microsoft. March 2, 2006. Retrieved March 7, 2020.
  49. ^ Stone-Lee, Ollie (February 16, 2006). "UK holds Microsoft security talks". BBC. Retrieved March 7, 2020.
  50. ^ a b Evers, Joris (March 6, 2006). "Microsoft: Vista won't get a backdoor". CNET. CBS Interactive. Retrieved March 7, 2020.
  51. ^ Franceschi-Bicchierai, Lorenzo (September 11, 2013). "Did the FBI Lean On Microsoft for Access to Its Encryption Software?". Mashable. Retrieved March 7, 2020.
  52. ^ "BitLocker Overview". technet.microsoft.com. August 31, 2016. Retrieved March 7, 2020.
  53. ^ Rosendorf, Dan (May 23, 2013). (PDF). Archived from the original (PDF) on October 22, 2021. Retrieved March 7, 2020.
  54. ^ Lee, Micah (June 4, 2015). "Microsoft Gives Details About Its Controversial Disk Encryption". The Intercept. Retrieved March 7, 2020.
  55. ^ "Blocking the SBP-2 driver and Thunderbolt controllers to reduce 1394 DMA and Thunderbolt DMA threats to BitLocker". Microsoft. November 7, 2018. Retrieved March 7, 2020.
  56. ^ "Kernel DMA Protection for Thunderbolt™ 3". Microsoft. March 26, 2019. Retrieved March 16, 2020.
  57. ^ Goodin, Dan (October 16, 2017). "Millions of high-security crypto keys crippled by newly discovered flaw". Ars Technica. Condé Nast. Retrieved March 7, 2020.
  58. ^ Busvine, Douglas (October 16, 2017). "Infineon says has fixed encryption flaw found by researchers". Reuters. Retrieved March 7, 2020.

External links edit

  • BitLocker Drive Encryption Technical Overview
  • System Integrity Team Blog

bitlocker, full, volume, encryption, feature, included, with, microsoft, windows, versions, starting, with, windows, vista, designed, protect, data, providing, encryption, entire, volumes, default, uses, advanced, encryption, standard, algorithm, cipher, block. BitLocker is a full volume encryption feature included with Microsoft Windows versions starting with Windows Vista It is designed to protect data by providing encryption for entire volumes By default it uses the Advanced Encryption Standard AES algorithm in cipher block chaining CBC or xor encrypt xor XEX based Tweaked codebook mode with ciphertext Stealing XTS mode 1 with a 128 bit or 256 bit key 2 3 CBC is not used over the whole disk it is applied to each individual sector 3 BitLockerBitLocker option while encrypting a USB thumb drive Other namesDevice EncryptionDeveloper s MicrosoftInitial releaseJanuary 30 2007 16 years ago 2007 01 30 Operating systemMicrosoft WindowsTypeDisk encryption softwareWebsitelearn wbr microsoft wbr com wbr en us wbr windows wbr security wbr operating system security wbr data protection wbr bitlocker wbr Contents 1 History 2 Features 2 1 Device encryption 2 2 Encryption modes 3 Operation 4 Security concerns 4 1 TPM alone is not enough 4 2 Upholding Kerckhoffs s principle 4 3 Other concerns 5 See also 6 References 7 External linksHistory editBitLocker originated as a part of Microsoft s Next Generation Secure Computing Base architecture in 2004 as a feature tentatively codenamed Cornerstone 4 5 and was designed to protect information on devices particularly if a device was lost or stolen Another feature titled Code Integrity Rooting was designed to validate the integrity of Microsoft Windows boot and system files 4 When used in conjunction with a compatible Trusted Platform Module TPM BitLocker can validate the integrity of boot and system files before decrypting a protected volume an unsuccessful validation will prohibit access to a protected system 6 7 BitLocker was briefly called Secure Startup before Windows Vista s release to manufacturing 6 BitLocker is available on Enterprise and Ultimate editions of Windows Vista and Windows 7 Pro and Enterprise editions of Windows 8 and 8 1 8 2 Windows Server 2008 9 and later 10 8 Pro Enterprise and Education editions of Windows 10 11 Pro Enterprise and Education editions of Windows 11 12 Features editmanage bdeDeveloper s MicrosoftInitial releaseJanuary 30 2007 16 years ago 2007 01 30 Operating systemMicrosoft WindowsTypeCommandLicenseProprietary commercial softwareWebsitemanage bdeInitially the graphical BitLocker interface in Windows Vista could only encrypt the operating system volume Starting with Windows Vista with Service Pack 1 and Windows Server 2008 volumes other than the operating system volume could be encrypted using the graphical tool Still some aspects of the BitLocker such as turning autolocking on or off had to be managed through a command line tool called manage bde wsf 13 The version of BitLocker included in Windows 7 and Windows Server 2008 Release 2 adds the ability to encrypt removable drives On Windows XP or Windows Vista read only access to these drives can be achieved through a program called BitLocker To Go Reader if FAT16 FAT32 or exFAT filesystems are used 14 In addition a new command line tool called manage bde replaced the old manage bde wsf 15 Starting with Windows Server 2012 and Windows 8 Microsoft has complemented BitLocker with the Microsoft Encrypted Hard Drive specification which allows the cryptographic operations of BitLocker encryption to be offloaded to the storage device s hardware 16 17 In addition BitLocker can now be managed through Windows PowerShell 18 Finally Windows 8 introduced Windows To Go in its Enterprise edition which BitLocker can protect 19 Device encryption edit Windows Mobile 6 5 Windows RT and core editions of Windows 8 1 include device encryption a feature limited version of BitLocker that encrypts the whole system 20 21 22 Logging in with a Microsoft account with administrative privileges automatically begins the encryption process The recovery key is stored to either the Microsoft account or Active Directory Active Directory requires Pro editions of Windows allowing it to be retrieved from any computer While device encryption is offered on all editions of Windows 8 1 unlike BitLocker device encryption requires that the device meet the InstantGo formerly Connected Standby specifications 22 which requires solid state drives non removable RAM to protect against cold boot attacks and a TPM 2 0 chip 20 23 Starting with Windows 10 1703 the requirements for device encryption have changed requiring a TPM 1 2 or 2 0 module with PCR 7 support UEFI Secure Boot and that the device meets Modern Standby requirements or HSTI validation 24 In September 2019 a new update was released KB4516071 25 changing the default setting for BitLocker when encrypting a self encrypting hard drive Now the default is to use software encryption for newly encrypted drives This is due to hardware encryption flaws and security concerns related to those issues 26 Encryption modes edit Three authentication mechanisms can be used as building blocks to implement BitLocker encryption 27 Transparent operation mode This mode uses the capabilities of TPM 1 2 hardware to provide for transparent user experience the user powers up and logs into Windows as usual The key used for disk encryption is sealed encrypted by the TPM chip and will only be released to the OS loader code if the early boot files appear to be unmodified The pre OS components of BitLocker achieve this by implementing a Static Root of Trust Measurement a methodology specified by the Trusted Computing Group TCG This mode is vulnerable to a cold boot attack as it allows a powered down machine to be booted by an attacker It is also vulnerable to a sniffing attack as the volume encryption key is transferred in plain text from the TPM to the CPU during a successful boot User authentication mode This mode requires that the user provide some authentication to the pre boot environment in the form of a pre boot PIN or password USB Key Mode The user must insert a USB device that contains a startup key into the computer to be able to boot the protected OS Note that this mode requires that the BIOS on the protected machine supports the reading of USB devices in the pre OS environment BitLocker does not support smart cards for pre boot authentication 28 The following combinations of the above authentication mechanisms are supported all with an optional escrow recovery key TPM only 29 TPM PIN 30 TPM PIN USB Key 31 TPM USB Key 32 USB Key 33 Password only 34 Operation editBitLocker is a logical volume encryption system A volume spans part of a hard disk drive the whole drive or more than one drive When enabled TPM and BitLocker can ensure the integrity of the trusted boot path e g BIOS and boot sector in order to prevent most offline physical attacks and boot sector malware 35 In order for BitLocker to encrypt the volume holding the operating system at least two NTFS formatted volumes are required one for the operating system usually C and another with a minimum size of 100 MB which remains unencrypted and boots the operating system 35 In case of Windows Vista and Windows Server 2008 however the volume s minimum size is 1 5 GB and must have a drive letter 36 Unlike previous versions of Windows Vista s diskpart command line tool includes the ability to shrink the size of an NTFS volume so that this volume may be created from already allocated space A tool called the BitLocker Drive Preparation Tool is also available from Microsoft that allows an existing volume on Windows Vista to be shrunk to make room for a new boot volume and for the necessary bootstrapping files to be transferred to it 37 Once an alternate boot partition has been created the TPM module needs to be initialized assuming that this feature is being used after which the required disk encryption key protection mechanisms such as TPM PIN or USB key are configured 38 The volume is then encrypted as a background task something that may take a considerable amount of time with a large disk as every logical sector is read encrypted and rewritten back to disk 38 The keys are only protected after the whole volume has been encrypted when the volume is considered secure 39 BitLocker uses a low level device driver to encrypt and decrypt all file operations making interaction with the encrypted volume transparent to applications running on the platform 38 Encrypting File System EFS may be used in conjunction with BitLocker to provide protection once the operating system is running Protection of the files from processes and users within the operating system can only be performed using encryption software that operates within Windows such as EFS BitLocker and EFS therefore offer protection against different classes of attacks 40 In Active Directory environments BitLocker supports optional key escrow to Active Directory although a schema update may be required for this to work i e if the Active Directory Services are hosted on a Windows version previous to Windows Server 2008 BitLocker and other full disk encryption systems can be attacked by a rogue boot manager Once the malicious bootloader captures the secret it can decrypt the Volume Master Key VMK which would then allow access to decrypt or modify any information on an encrypted hard disk By configuring a TPM to protect the trusted boot pathway including the BIOS and boot sector BitLocker can mitigate this threat Note that some non malicious changes to the boot path may cause a Platform Configuration Register check to fail and thereby generate a false warning 35 Security concerns editTPM alone is not enough edit The Transparent operation mode and User authentication mode of BitLocker use TPM hardware to detect whether there are unauthorized changes to the pre boot environment including the BIOS and MBR If any unauthorized changes are detected BitLocker requests a recovery key on a USB device This cryptographic secret is used to decrypt the Volume Master Key VMK and allow the bootup process to continue 41 However TPM alone is not enough In February 2008 a group of security researchers published details of a so called cold boot attack that allows full disk encryption systems such as BitLocker to be compromised by booting the machine from removable media such as a USB drive into another operating system then dumping the contents of pre boot memory 42 The attack relies on the fact that DRAM retains information for up to several minutes or even longer if cooled after the power has been removed The Bress Menz device described in US Patent 9 514 789 can accomplish this type of attack 43 Similar full disk encryption mechanisms of other vendors and other operating systems including Linux and Mac OS X are vulnerable to the same attack The authors recommend that computers be powered down when not in physical control of the owner rather than be left in a sleep mode and that the encryption software be configured to require a password to boot the machine 42 On 10 November 2015 Microsoft released a security update to mitigate a security vulnerability in BitLocker that allowed authentication to be bypassed by employing a malicious Kerberos key distribution center if the attacker had physical access to the machine the machine was part of a domain and had no PIN or USB flash drive protection 44 BitLocker still does not properly support TPM 2 0 security features which as a result can lead to a complete bypass of privacy protection when keys are transmitted over Serial Peripheral Interface in a motherboard 45 All these attacks require physical access to the system and are thwarted by a secondary protector such as a USB flash drive or PIN code Upholding Kerckhoffs s principle edit Although the AES encryption algorithm used in BitLocker is in the public domain its implementation in BitLocker as well as other components of the software are proprietary however the code is available for scrutiny by Microsoft partners and enterprises subject to a non disclosure agreement 46 47 According to Microsoft sources 48 BitLocker does not contain an intentionally built in backdoor so there is no Microsoft provided way for law enforcement to have guaranteed access to the data on a user s drive In 2006 the UK Home Office expressed concern over the lack of a backdoor and tried entering into talks with Microsoft to get one introduced 49 Microsoft developer and cryptographer Niels Ferguson denied the backdoor request and said over my dead body 50 Microsoft engineers have said that United States Federal Bureau of Investigation agents also put pressure on them in numerous meetings to add a backdoor although no formal written request was ever made Microsoft engineers eventually suggested that agents should look for the hard copy of the encryption key that the BitLocker program suggests that its users make 51 Niels Ferguson s position that back doors are simply not acceptable 50 is in accordance with Kerckhoffs s principle Stated by Netherlands born cryptographer Auguste Kerckhoffs in the 19th century the principle holds that a cryptosystem should be secure even if everything about the system except the encryption key is public knowledge Other concerns edit Starting with Windows 8 and Windows Server 2012 Microsoft removed the Elephant Diffuser from the BitLocker scheme for no declared reason 52 Dan Rosendorf s research shows that removing the Elephant Diffuser had an undeniably negative impact on the security of BitLocker encryption against a targeted attack 53 Microsoft later cited performance concerns and noncompliance with the Federal Information Processing Standards FIPS to justify the diffuser s removal 54 Starting with Windows 10 version 1511 however Microsoft added a new FIPS compliant XTS AES encryption algorithm to BitLocker 1 Starting with Windows 10 version 1803 Microsoft added a new feature called Kernel Direct Memory access DMA Protection to BitLocker to protect against DMA attacks via Thunderbolt 3 ports 55 56 In October 2017 it was reported that a flaw enabled private keys to be inferred from public keys which could allow an attacker to bypass BitLocker encryption when an affected TPM chip is used 57 The flaw is the Return of Coppersmith s Attack or ROCA vulnerability which is in a code library developed by Infineon and had been in widespread use in security products such as smartcards and TPMs Microsoft released an updated version of the firmware for Infineon TPM chips that fixes the flaw via Windows Update 58 See also editFeatures new to Windows Vista List of Microsoft Windows components Windows Vista I O technologies Next Generation Secure Computing Base FileVaultReferences edit a b Hakala Trudy January 29 2020 What s new in Windows 10 versions 1507 and 1511 TechNet Microsoft Retrieved March 7 2020 a b Windows BitLocker Drive Encryption Frequently Asked Questions TechNet Library Microsoft March 22 2012 Retrieved March 7 2020 a b Ferguson Niels August 2006 AES CBC Elephant Diffuser A Disk Encryption Algorithm for Windows Vista PDF Microsoft Retrieved March 7 2020 a href Template Cite journal html title Template Cite journal cite journal a Cite journal requires journal help a b Biddle Peter 2004 Next Generation Secure Computing Base Microsoft Archived from the original PPT on August 27 2006 Retrieved March 7 2020 Thurrott Paul September 9 2005 Pre PDC Exclusive Windows Vista Product Editions Supersite for Windows Penton Archived from the original on April 2 2015 Retrieved March 7 2020 a b Microsoft April 22 2005 Secure Startup Full Volume Encryption Technical Overview DOC Retrieved March 7 2020 Microsoft April 21 2005 Secure Startup Full Volume Encryption Executive Overview DOC Retrieved March 7 2020 a b What s New in BitLocker TechNet Library Microsoft August 31 2016 Retrieved March 7 2020 BitLocker Drive Encryption in Windows Vista TechNet Microsoft Archived from the original on November 17 2016 Retrieved March 7 2020 BitLocker Drive Encryption Overview TechNet Microsoft November 17 2009 Retrieved March 7 2020 Compare Windows 10 Editions Windows for Business Microsoft Retrieved March 7 2020 Finding your BitLocker recovery key in Windows Windows support Microsoft Retrieved December 2 2021 Hynes Byron September 8 2016 Advances in BitLocker Drive Encryption TechNet Magazine Microsoft Retrieved March 7 2020 Description of BitLocker To Go Reader Microsoft Archived from the original on September 24 2019 Retrieved April 25 2017 Enabling BitLocker by Using the Command Line TechNet Microsoft September 12 2012 Retrieved March 7 2020 Encrypted Hard Drive TechNet Microsoft August 31 2016 Retrieved March 7 2020 Encrypted Hard Drive Device Guide MSDN Microsoft June 1 2017 Retrieved March 7 2020 BitLocker TechNet Microsoft Retrieved March 7 2020 Windows To Go Frequently Asked Questions TechNet Microsoft October 23 2013 Retrieved March 7 2020 a b Device Encryption Device Encryption Microsoft November 18 2015 Retrieved March 7 2020 Cunningham Andrew October 17 2013 Windows 8 1 includes seamless automatic disk encryption if your PC supports it Ars Technica Conde Nast Retrieved March 7 2020 a b Help protect your files with device encryption Windows Help portal Microsoft Archived from the original on May 2 2016 Retrieved March 7 2020 Thurrott Paul June 4 2013 In Blue Device Encryption Paul Thurrott s SuperSite for Windows Penton Media Archived from the original on June 9 2013 Retrieved March 7 2020 BitLocker drive encryption in Windows 10 for OEMs docs microsoft com November 16 2018 Retrieved March 7 2020 September 24 2019 KB4516071 OS Build 16299 1420 support microsoft com Retrieved March 7 2020 Cimpanu Catalin November 5 2018 Flaws in self encrypting SSDs let attackers bypass disk encryption www zdnet com Retrieved March 7 2020 BitLocker Drive Encryption Data Encryption Toolkit for Mobile PCs Security Analysis Microsoft April 4 2007 Archived from the original on October 23 2007 Retrieved March 7 2020 Dansimp Using BitLocker with other programs FAQ Windows 10 Windows security docs microsoft com Retrieved July 27 2022 ProtectKeyWithTPM method of the Win32 EncryptableVolume class MSDN Library Microsoft March 31 2018 Retrieved March 7 2020 ProtectKeyWithTPMAndPIN method of the Win32 EncryptableVolume class MSDN Library Microsoft March 31 2018 Retrieved March 7 2020 ProtectKeyWithTPMAndPINAndStartupKey method of the Win32 EncryptableVolume class MSDN Library Microsoft March 31 2018 Retrieved March 7 2020 ProtectKeyWithTPMAndStartupKey method of the Win32 EncryptableVolume class MSDN Library Microsoft March 31 2018 Retrieved March 7 2020 ProtectKeyWithExternalKey method of the Win32 EncryptableVolume class MSDN Library Microsoft March 31 2018 Retrieved March 7 2020 ProtectKeyWithNumericalPassword method of the Win32 EncryptableVolume class MSDN Library Microsoft March 31 2018 Retrieved March 7 2020 a b c BitLocker Drive Encryption in Windows 7 Frequently Asked Questions TechNet Microsoft September 12 2012 Retrieved March 7 2020 Windows BitLocker Drive Encryption Step by Step Guide TechNet Microsoft July 2 2012 Retrieved March 7 2020 Description of the BitLocker Drive Preparation Tool Microsoft December 21 2011 Retrieved March 7 2020 a b c Andrew Bettany Halsey Mike 2013 Exam Ref 70 687 Configuring Windows 8 1 ed Microsoft Press p 307 ISBN 978 0 7356 7392 2 OCLC 851209981 Jerry Honeycutt 2012 Introducing Windows 8 An Overview for IT professionals Microsoft p 121 ISBN 978 0 7356 7050 1 OCLC 819519777 Ou George February 28 2007 Prevent data theft with Windows Vista s Encrypted File System EFS and BitLocker TechRepublic CBS Interactive Retrieved March 7 2020 Byron Hynes September 7 2016 Keys to Protecting Data with BitLocker Drive Encryption TechNet Magazine Microsoft Retrieved March 7 2020 a b Halderman J Alex Schoen Seth D Heninger Nadia Clarkson William Paul William Calandrino Joseph A Feldman Ariel J Appelbaum Jacob Felten Edward W February 21 2008 Lest We Remember Cold Boot Attacks on Encryption Keys PDF Thesis Princeton University Retrieved March 7 2020 Systems and methods for safely moving short term memory devices while preserving protecting and examining their digital data Retrieved March 7 2020 Microsoft Security Bulletin MS15 122 Important Security TechCenter Microsoft October 11 2017 Retrieved March 7 2020 From Stolen Laptop to Inside the Company Network Dolos Group July 28 2021 Retrieved December 2 2021 Thurrott Paul June 10 2015 No Back Doors Microsoft Opens Windows Source Code to EU Governments Petri Retrieved March 7 2020 Shared Source Initiative www microsoft com Retrieved March 7 2020 Back door nonsense System Integrity Team Blog Microsoft March 2 2006 Retrieved March 7 2020 Stone Lee Ollie February 16 2006 UK holds Microsoft security talks BBC Retrieved March 7 2020 a b Evers Joris March 6 2006 Microsoft Vista won t get a backdoor CNET CBS Interactive Retrieved March 7 2020 Franceschi Bicchierai Lorenzo September 11 2013 Did the FBI Lean On Microsoft for Access to Its Encryption Software Mashable Retrieved March 7 2020 BitLocker Overview technet microsoft com August 31 2016 Retrieved March 7 2020 Rosendorf Dan May 23 2013 Bitlocker A little about the internals and what changed in Windows 8 PDF Archived from the original PDF on October 22 2021 Retrieved March 7 2020 Lee Micah June 4 2015 Microsoft Gives Details About Its Controversial Disk Encryption The Intercept Retrieved March 7 2020 Blocking the SBP 2 driver and Thunderbolt controllers to reduce 1394 DMA and Thunderbolt DMA threats to BitLocker Microsoft November 7 2018 Retrieved March 7 2020 Kernel DMA Protection for Thunderbolt 3 Microsoft March 26 2019 Retrieved March 16 2020 Goodin Dan October 16 2017 Millions of high security crypto keys crippled by newly discovered flaw Ars Technica Conde Nast Retrieved March 7 2020 Busvine Douglas October 16 2017 Infineon says has fixed encryption flaw found by researchers Reuters Retrieved March 7 2020 External links edit nbsp Wikibooks has a book on the topic of Guide to Windows Commands BitLocker Drive Encryption Technical Overview System Integrity Team Blog Retrieved from https en wikipedia org w index php title BitLocker amp oldid 1178694175, wikipedia, wiki, book, books, library,

article

, read, download, free, free download, mp3, video, mp4, 3gp, jpg, jpeg, gif, png, picture, music, song, movie, book, game, games.