CRYPTO & DATA ERASURE: After forensic analysis drives should be securely wiped | By Paul Katzoff

| sponsored post |

CRYPTO & DATA ERASURE: After forensic analysis drives should be securely wiped

Executive Summary

Disk encryption is a useful way to secure data, but there are problems with relying on encryption alone to protect data after forensic drive recovery. Using drive wiping in conjunction with cryptographic key erasure solves these problems.

Disk Encryption and Cryptographic Key Erasure

Encryption is the process of encoding a message or information in such a way that only authorized parties can access it. Encryption has become a popular way to secure data both when it is being transferred and when it is at rest (stored on SSD, Flash and HDD).

Most modern hard drives and solid state drives offer encryption either natively (as part of the hardware solution) or using disk encryption software.

There are different levels of sophistication in encryption, but all encrypted data can be unlocked with the corresponding key. With current decryption technologies, losing or erasing the key makes the data effectively unrecoverable, and as a result, some forensic recovery organizations are relying on key erasure (crypto erase) to protect data on drives that are being disposed.

While crypto erasure is quick and encrypted data may seem inaccessible after a crypto erase is performed, it should never be considered “sanitized.” Here are some of the weaknesses of crypto erasure:

Data Persistence

Cryptographic erase relies on removing the encryption key to protect data on a decommissioned hard drive. However, when the key is removed, the data persists on the storage device and thus exposes organizations to the risk that the data may be compromised in the future. For example, if there are advances in decryption technology, the encrypted data may become accessible. It is difficult to say if or when this could occur, but if the data remains on the drive, it remains a target and liability.

Password Weakness

Some encryption technologies rely on passwords to unlock data. Unfortunately, passwords are a notoriously weak form of security because they are often easily guessed or broken. Tools like multi-factor authentication can make password security more effective, but it is critical to not rely solely on a password to prevent a data breach.

Encryption Algorithm Weaknesses

The encryption used on drives and with software tools relies on complex algorithms, and these algorithms vary between vendors in both hardware and software tools. Because there are so many different implementations of the algorithms, any that were implemented poorly or with ulterior motives are at risk to be cracked.

For example, the New York Times recently reported that an algorithm for generating random numbers, which was adopted in 2006 by the National Institute of Standards and Technology (NIST), contains a backdoor for the NSA.

This means vulnerabilities in encryption algorithms already exist and some have not yet been discovered.

For an analysis of more encryption system and algorithm weaknesses, read this article by the International Association for Cryptologic Research: https://eprint.iacr.org/2015/1002.pdf

Decryption Technology Progress

The argument for relying on encryption as a sanitization method points to the strength of 128- or 256-bit encryption and that they could take many years to break given today’s computing power. However, these calculations don’t account for the advancement of decryption technologies and techniques. It is possible that some day decryption technologies will advance to the point where they can break these encryption methods. For example, the US federal government currently has a program to decode encrypted messages with an $11 billion yearly budget and 35,000 employees. Some researchers are investigating whether quantum computing could nearly instantaneously break encryption keys.

As the race to decrypt data progresses, organizations face the risk that cryptographic erasure will become obsolete as a way to protect data on disposed drives.

Software Error

Encryption systems may state they have removed the current key, but it’s possible the technical process did not complete successfully. This would leave the key on the drive, making the data vulnerable to attack. Furthermore, some encryption schemes don’t verify the key has been replaced, meaning forensic recovery organizations would have no method to ensure the cryptographic erase has completed successfully.

Human Error 

In order to perform a crypto erase, a human must properly perform all of the necessary steps to remove and replace the encryption key used on the drive. Each drive’s procedure can be different, and if the steps are not performed properly, the data will still be accessible on the drive.

Procedural Difficulty

Cryptographic erasure is a tedious and time consuming process to set up. It typically requires a technician to individually handle each computer to remove the encryption key. This process typically includes multiple reboots of the system to ensure the encryption key was changed.

Reporting

One of the most important aspects of a reliable data-sanitization process is the ability to keep a secure and accurate record of all activities performed. Having proof that data was properly sanitized can provide legal and regulatory protection and makes the sanitization process easier to audit.

Cryptographic erasure is a multi-step process and it’s important to receive a certificate that the process has successfully completed. Logs or reports should be verified and stored in a protected location or database, allowing access to key IT, regulatory, and legal stakeholders, but some encryption schemes don’t produce proof the key has been removed or provide a method to store such proof in a centralized database. Current self-encrypting drive (SED) solutions don’t provide the robust, secure reporting capabilities required for sanitization tracking. 

Without reporting, it is impossible to be sure that every drive was handled and verified as being sanitized.

Data Erasure by Drive Wiping

Simply deleting an encryption key on an SED is insufficient to provide complete protection for the data on discarded drives. If the data is still there, even in encrypted form, it remains vulnerable.

A more secure way to protect sensitive data during hardware disposition is to overwrite every sector on the drive. There are various patterns and standards for wiping drives, but they all basically achieve the same thing—storing new, meaningless values in every drive sector removes the old, sensitive data and makes it impossible to read.

Data erasure with WipeDrive (www.wipedrive.com) is the best way to ensure the data has been sanitized without destroying the hard drive.

Combined Crypto Erase and Data Erasure

A best practice for data sanitization is redundancy at each level, including methods of data erasure or destruction, multiple levels of data security (such as encryption), and multiple reviews of processes to ensure compliance. At WipeDrive, we like to say you should wear both your belt and suspenders—even if one fails, you won’t be caught with your pants down!

If a secure data erasure tool worked in tandem with cryptographic erase, it would provide an added layer of protection to the data sanitization process.

WhiteCanyon’s WipeDrive software employs a patented process to both replace encryption keys and wipe all data on the disk.

Patented Process for Drive Sanitization

There are three main steps in WipeDrive’s process:

1. Reset the encryption key

By programmatically resetting the encryption key at the beginning of the process, any stored data is instantly rendered unreadable and irretrievable, even to the wiping program.

2. Wipe the hard drive

The drive is overwritten with the desired pattern, eliminating the old data from the drive.

3. Reset the encryption key a second time

Resetting the key again makes any data left in unwritable sectors and even the wipe data irretrievable and prepares the drive for reuse.

Additional details about how the process works and what systems it relies upon can be found in the patent text located here: https://www.google.com/patents/US9396359

Benefits of WipeDrive’s Patented Process

By resetting the encryption key and then wiping the data, WipeDrive realizes the following benefits:

Rapid, Redundant Data Protection

Because the encryption key is reset at the beginning of the process, the data on the drive is protected nearly instantly, even before wiping. The data is also protected in the case that some sectors aren’t writeable during the overwrite passes.

Total Data Removal

Because the data is overwritten, it is no longer on the drive at all, encrypted or not.

Security

Because the drive is wiped, over-reliance on passwords or encryption algorithms is avoided.

Reduction of Human Error

The software performs the encryption key reset(s), which avoids human error in this step of the process.

Ease of Use

WipeDrive makes resetting the encryption key and wiping the data from a SED drive faster and much easier than performing these tasks manually and with other software.

Reporting

WipeDrive provides robust reports on each sanitized drive providing an audit trail for future review.

Summary

Forensic recovery organizations have a unique use case for finding, protecting and erasing data. WipeDrive is a fundamental part of that process with its patented crypto and data erasure. For more information, please contact WhiteCanyon Software at 1 (801) 224-8900 or visit www.WhiteCanyon.com.

November 4, 2019

Leave a Reply

avatar

This site uses Akismet to reduce spam. Learn how your comment data is processed.

  Subscribe  
Notify of
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2013

Privacy Preference Center

Necessary

Cookies that are necessary for the site to function properly. This includes, storing the user's cookie consent state for the current domain, managing users carts to using the content network, Cloudflare, to identify trusted web traffic. See full Cookies declaration

gdpr, PYPF, woocommerce_cart_hash, woocommerce_items_in_cart, _wp_wocommerce_session, __cfduid [x2]

Performance

These are used to track user interaction and detect potential problems. These help us improve our services by providing analytical data on how users use this site.

_global_lucky_opt_out, _lo_np_, _lo_cid, _lo_uid, _lo_rid, _lo_v, __lotr
_ga, _gid, _gat, __utma, __utmt, __utmb, __utmc, __utmz
vuid

Marketing


tr, fr
ads/ga-audiences