[149155] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: [Cryptography] one-time pads

daemon@ATHENA.MIT.EDU (Tom Mitchell)
Tue Jan 21 02:49:16 2014

X-Original-To: cryptography@metzdowd.com
In-Reply-To: <7666157A-E1A0-4509-858A-273298267D0D@gmail.com>
Date: Mon, 20 Jan 2014 20:13:06 -0800
From: Tom Mitchell <mitch@niftyegg.com>
To: Philip Shaw <wahspilihp@gmail.com>
Cc: John Kelsey <crypto.jmk@gmail.com>,
	"cryptography@metzdowd.com" <cryptography@metzdowd.com>,
	Bill Frantz <frantz@pwpconsult.com>
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com

On Mon, Jan 20, 2014 at 6:42 PM, Philip Shaw <wahspilihp@gmail.com> wrote:
>
> On 21 Jan 2014, at 5:11 , Tom Mitchell <mitch@niftyegg.com> wrote:
>> The top to bottom structure of the pad makes them a stream
...snip....
> Of course, that makes the reader totally obvious to anyone who looked, bu=
t IIRC the device was for use inside embassies or similar facilities, so th=
e pads could be transported by diplomatic courier anyway.
>
> I have had the idea of producing something compatible with an SD reader
.....snip...
> It still wouldn=92t be deniable, but it would be trivial to destroy in a =
hurry.

Trivial to destroy --- Older flash memory had properties that erase
prior to write
was a block operation.   Writing could be bit as a time... any single bit c=
an be
set and other bits remain constant.   This property made for some interesti=
ng
file system designs.  Physical cracking the silicon die of a microSD
card with toe
nail clippers, vanishing in grass or any place all are easy because of
the size.  SD card
adaptors are free.   This permits used data to be changed as used
without a block erase.

For tomorrow's embassy:
A modern device would look like a solid state disk but the disk
controller would be modified/ replaced.   Normal SATA read commands
would return then clobber data (pad pages used).   Random read would
be spoofed (spoofable).
Partition data and tables would omit most of the device so common OS
inspection would ignore the bits.   Any modern SATA spinning media
could have the onboard controller modified to 'lie' and match the
external sticker.

A MacBook pro could be modified to be a OTP by cracking the case
replacing the disk with an "improved" device and modified OS.
Keeping a large key internal on a tamper triggered self modifying
device.   The result of tampering is a spiteful pile of angle grinder
abused bits on the desk/ floor of some agency.

One of the jobs I worked on as a contractor was a disk media and disk
head test fixture.   The task was simple once we coerced the
controller to be a tester.  TLA agency budgets would make short work
of this whole process. So disks spinning and SS could all be improved/
hacked/ secured by controler enhancements with modest effort.

The blocks of flash in many Chromebooks are fair game.









-- =

  T o m    M i t c h e l l
_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography

home help back first fref pref prev next nref lref last post