Pre-boot authentication

Pre-boot authentication

Pre-Boot Authentication (PBA) serves as an extension of the BIOS or boot firmware and guarantees a secure, tamper-proof environment external to the operating system as a trusted authentication layer. The PBA prevents anything being read from the hard disk such as the operating system until the user has confirmed he/she has the correct password or other credentials.>cite news|url=http://secude.com/htm/707/en/Pre-Boot_Authentication.htm|title=Pre-Boot Authentication|publisher=Secude|date=February 21, 2008|accessdate=2008-02-22]

Benefits of Pre-Boot Authentication

* full disk encryption outside of the operating system level
* encryption of temporary files
* data-at-rest protection

How Pre-Boot Authentication Works

Generic Boot Sequence

# Basic Input Output System
# Master Boot Record Partition Table
# Pre-Boot Authentication
# Operating System Boots

A PBA environment serves as an extension of the BIOS or boot firmware and guarantee a secure, tamper-proof environment external to the operating system as a trusted authentication layer. The PBA prevents Windows or any other operating system from loading until the user has confirmed he/she has the correct password to unlock the door. That trusted layer eliminates the possibility that one of the millions of lines of OS code can compromise the privacy of personal or company data.

Misnomer

Sometimes pre-Boot Authentication is a misnomer since a basic OS can be loaded prior to the main operating system in some implementations. Pre-boot authentication can take on a number of forms, it can be a start up (BIOS) password implemented on the Motherboard, or in on the boot volume itself. In the latter instance the boot sector of a hard drive is overwritten with a small executable which starts the decryption of the drive and hands off the credientals to Windows to continue booting. While, the Truecrypt [http://truecrypt.org] is an full disk encryption system it is also pre-boot authentication since you need to enter a password for the drive to boot.

Pre-Boot Authentication Technologies

Combinations with Full Disk Encryption

Pre-Boot Authentication is generally provided by a variety of full disk encryption vendors, but can be installed separately. Some FDE solutions can function without Pre-Boot Authentication, such as hardware-based full disk encryption. However, without some form of authentication, encryption provides little protection.

Linux-based Pre-Boot Authentication

Linux uses a well-known and proven UNIX-based security model. The enormous pool of developer talent is linked to this subject as a large number of individuals with different desires for an environment are pushing and pulling for the most extensible environment possible. The has made Linux remarkably flexible, with the ability to configure a Linux kernel to easily suit individuals needs. This was key reason that the NSA used Linux as the basis for creating a secure operating system. [ [http://www.nsa.gov/selinux NSA & Linux OS] ]

As an open source solution, there are a great variety of developers seeking to use Linux for a variety of purposes, and that means a large amount of driver development often available for free. Smartcard or biometric vendors can have their devices ported to Linux at no cost to themselves. That means greater compatibility and flexibility for future development. In addition, Linux is well-known for playing nice with installed OSes and BIOS, as well as being widely accepted worldwide by both large and small entities.

There are at least five common CPU architectures, and Linux runs on all of them. Proprietary OSes have advantages, but are limited to those architectures they are actually designed for. By virtue of the fact that its developers have wide-ranging interests and use cases, Linux has been developed to be completely portable to any widely distributed CPU architecture. [ [http://kroah.com/log/2007/01/29/ linux kernel monkey log ] ]

The number of potential conflicts from various security vendors providing their own proprietary operating systems and methodology can interfere with each other and the main Operating System, mean a chaotic mess of race conditions. BIOS incompatibilities, and bootstrap failures.

Authentication Methods

The standard complement of authentication methods exist for Pre-Boot Authentication including:

# Something you know (i.e. username / password)
# Something you have (i.e. smart card or other token)
# Something you are (i.e. biometric data)

References


Wikimedia Foundation. 2010.

Игры ⚽ Нужен реферат?

Look at other dictionaries:

  • Pre-Boot Authentication — Die Pre Boot Authentication (deutsch etwa: Authentifizierung vor dem Startvorgang) ist eine Softwarekomponente aus der Sicherheits /Verschlüsselungssoftware Branche. Die Anmeldung an einem Endgerät findet bei der PBA unmittelbar nach dem BIOS… …   Deutsch Wikipedia

  • Cold boot attack — In cryptography, a cold boot attack (or to a lesser extent, a platform reset attack) is a type of side channel attack in which an attacker with physical access to a computer is able to retrieve encryption keys from a running operating system… …   Wikipedia

  • Comparison of disk encryption software — This is a technical feature comparison of different disk encryption software. Contents 1 Background information 2 Operating systems 3 Features 4 Layering …   Wikipedia

  • Full disk encryption — (or whole disk encryption) is a kind of disk encryption software or hardware which encrypts every bit of data that goes on a disk or disk volume. The term full disk encryption is often used to signify that everything on a disk, including the… …   Wikipedia

  • Disk encryption — uses disk encryption software or hardware to encrypt every bit of data that goes on a disk or disk volume. Disk encryption prevents unauthorized access to data storage. The term full disk encryption (or whole disk encryption) is often used to… …   Wikipedia

  • Full System Encryption — Die Pre Boot Authentication (deutsch etwa: Authentifizierung vor dem Startvorgang) ist eine Softwarekomponente aus der Sicherheits /Verschlüsselungssoftware Branche. Inhaltsverzeichnis 1 Begriffsklärung 2 Synonyme 3 Funktion 4 Produkte mit Pre… …   Deutsch Wikipedia

  • True crypt — TrueCrypt Basisdaten Entwickler: TrueCrypt Foundation Aktuelle Version: 6.1a …   Deutsch Wikipedia

  • Truecrypt — Basisdaten Entwickler: TrueCrypt Foundation Aktuelle Version: 6.1a …   Deutsch Wikipedia

  • Hardware-based full disk encryption — is being pursued by a number of HDD vendors including Intel, Seagate Technology, and Hitachi, Ltd. with the rest of the hard drive industry following. Encryption and the symmetric encryption key is maintained independently from the CPU, thus… …   Wikipedia

  • Free CompuSec — ist eine kostenlose Software zur transparenten Verschlüsselung von Festplatten und Wechseldatenträgern, die von der Firma CE Infosys mit Sitz in Singapur und Deutschland entwickelt wird. Sie ist für Windows XP, Windows Vista, Windows 7, Windows… …   Deutsch Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”