[Cryptography] Security on TRIM for full-disk encrypted SSDs

Peter Fairbrother peter at m-o-o-t.org
Thu Apr 21 17:19:31 EDT 2016


On 20/04/16 20:17, RB wrote:
> On Wed, Apr 20, 2016 at 11:52 AM, james hughes <hughejp at me.com> wrote:
>>
>> On Apr 19, 2016, at 5:03 PM, Valmiky Arquissandas
>> <crypto-metzdowd at kayvlim.com> wrote:
>>
>> I understand at least some of the theory - encrypted information is supposed
>> to be indistinguishable from random noise, and TRIM reveals patterns; and a
>> plausible deniability scenario would probably be unacceptable.
>>
>>
>> Can you please explain?
>>
>> Assuming reasonable encryption, I do not understand what patters are being
>> revealed.
>
> It all depends on your threat model.  The most paranoid threat model
> possible for most disk-level encryption assumes that an attacker
> knowing both your FS type and the amount of data you have encrypted is
> unacceptable.  Hence, you encrypt your entire block device (fill it up
> with encrypted data or noise) and keep opaque the actual volume of
> encrypted data and any other indicators of its structure.
>
> For the average user that's probably not true, and for them TRIM
> should be perfectly acceptable.  This is why, for example, I don't
> "pre-encrypt" VeraCrypt volumes: I ship a lot of disk images around,
> it's a known quantity.  My main interest is confidentiality, and it
> matters not one whit whether I'm sending a 500GB or a 1TB image on
> that 2TB external.


You think that an attacker knowing how much data you send doesn't affect 
confidentiality?

hmmm, how many files on t'internet are 2798954788 bytes long?



-- Peter Fairbrother





My opponent already knows the gist of what I'm
> transmitting, so I avoid writing 2TB of NULs over a slow bus in order
> to hide that I'm sending less than 2TB.
>
> Your mileage (and threat model) may vary.
> _______________________________________________
> The cryptography mailing list
> cryptography at metzdowd.com
> http://www.metzdowd.com/mailman/listinfo/cryptography
>



More information about the cryptography mailing list