- Watermarking attack
In cryptography, a watermarking attack is an attack on
disk encryption methods where the presence of a specially crafted piece of data (e.g., adecoy file) can be detected by an attacker without knowing the encryption key.Problem description
Disk encryption suites generally operate on data in 512-byte sectors which are individually encrypted and decrypted. These 512-byte sectors alone can use any
block cipher mode of operation (typically CBC), but since arbitrary sectors in the middle of the disk need to be accessible individually, they cannot depend on the contents of their preceding/succeeding sectors. Thus, with CBC, each sector alone has to use aninitialization vector (IV). If these IVs are predictable by an attacker, then a specially crafted file can be generated to "NOP -out" the IV, causing different blocks on the encrypted disk to have identical sectors, or at least the first block in a number of sectors to be identical. The sector patterns generated in this way can give away the existence of the file, without any need for the disk to be decrypted first. The problem is analogous to that of using block ciphers in the electronic codebook (ECB) mode, but instead of whole blocks, only the first block in different sectors are identical.This weakness affected many
disk encryption programs, including older versions ofBestCrypt cite paper
author = Chiriliuc, Adal
title = BestCrypt IV generation flaw
date = 2003-10-23
url = http://adal.chiriliuc.com/bc_iv_flaw.php
accessdate = 2006-08-23] as well as the now-deprecatedcryptoloop . [cite web
last = Saarinen
first = Markku-Juhani O.
title = Linux for the Information Smuggler
date =2004-02-19
publisher = Helsinki University of Technology
url = http://mareichelt.de/pub/notmine/diskenc.pdf
format =PDF
accessdate = 2006-10-01]The problem can be relatively easily eliminated by making the IVs unpredictable with, for example,
ESSIV . [cite web
last = Fruhwirth
first = Clemens
title = Linux hard disk encryption settings
url = http://clemens.endorphin.org/LinuxHDEncSettings
accessdate = 2006-01-02 ] Alternatively, one can use modes of operation specifically meant for disk encryption (seedisk encryption theory ).ee also
*
Disk encryption theory
*Initialization vector
*Block cipher modes of operation
*Watermark Notes and references
Wikimedia Foundation. 2010.