A recent discussion on another website prompted a proclamation that storing (Tru
ID: 656238 • Letter: A
Question
A recent discussion on another website prompted a proclamation that storing (TrueCrypt, LUKS, DMG, etc) on cloud sync services like Dropbox is unsafe, since a version history is kept of each file, and that the change in the encrypted volume as files are added/remove/changed can be used to leak private information.
Some cursory googling didn't turn anything up regarding this supposed threat.
My question is, does storing these files on versioning cloud services represent any kind of real security risk, and if so, are there any safer alternatives to pass encrypted files around?
Explanation / Answer
XTS sector/block mode (used on Truecrypt, Drivecrypt, etc) has a temporal quality that can certainly leak information. Ferguson says an adversary who observes 4000 writes to an encrypted 4K sector will have obtained access to well over a million (2^20) ciphertext blocks encrypted with the same tweak and key.
I'll add that since most crypto volumes of windows users these days will be formatted NTFS or FAT32, the attacker has a pretty good idea where to look for frequently changing file system structure data that (a) has a defined range of possible known plaintexts; and (b) a predictable location given the size of the volume file.
Putting encrypted volumes in the cloud does all the "work" that the IEEE response said would make the attack on a volume infeasible. The security model was never meant to be solid when you make the entire internet into a potential evil maid who can monitor the changes on the encrypted volume. Even less so if the cloud service is doing the versioning that does even one more step for the attacker (i.e., collect and aggregate just the changed sectors).
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.