Global IP Telecommunications, a leading manufacturer of Voice-over-IP (VoIP) software telephones, PMC Ciphers, a leading specialist for ultimate ciphers, and CyProtect AG, a leading internet security specialist, have announced today that they’ve published research describing a new attack on disk encryption software that reveals the entire key when an encrypted volume is being mounted. The attack was named “Mount IOCTL Attack” by the author.
In order to mount a virtual encrypted disk, the user interface application of a disk encryption software passes volume file path information, the selected encryption algorithm as well as the highly secret password, in the clear to a software driver through the DeviceIoControl() function, which is the only function for this purpose in an operating system. A tampered version of the DeviceIoControl() function would easily allow an attacker to get hold of the key used to mount the encrypted volume by a simple comparison for equality of a 32 bit number - the IO Control Code of the mount request.
In the paper, "Attack on mount control code of commercial on-the-fly disk encryption software and efficient countermeasure”, the companies used the publically available source code of a popular disk encryption software for their peer review. A hypothetically tampered version of the DeviceIOControl() function could easily wait for a specific IO Control Code (e.g. 466944d = 00072000h) and each time this IOCTL is passed to the function, log the entire set of parameters that is passed along with the function call. These parameters include the entire key required to access the encrypted volume to be mounted IN PLAINTEXT.
The companies further disclosed that an SSL-like Diffie-Hellman key exchange between encryption driver and user interface application of a disk encryption software enable for henceforth encrypted communication with the encryption driver, resulting in complete immunity from Mount IOCTL Attack.
This countermeasure is already built into the new version of the disk encryption software “TurboCrypt”. Existing users of earlier “TurboCrypt” or “Global Safe Disk” versions are advised to migrate to the new “TurboCrypt” as soon as possible. The new software is already available online for Windows XP, Vista 32 and Vista 64 operating systems at the following URL:
http://downloads.turbocrypt.com/...
or
http://www.cyprotect.com/...
The paper, "Attack on mount control code of commercial on-the-fly disk encryption software and efficient countermeasure” is accessible through the following URL:
http://www.turbocrypt.com/...