Shattered Crypto Key: Don't Rush for New Guardians
Shattered Crypto Key: Don’t Rush for New Guardians
Disclaimer: This post includes affiliate links
If you click on a link and make a purchase, I may receive a commission at no extra cost to you.
Quick Links
Key Takeaways
- BitLocker’s encryption keys can be stolen with a Raspberry Pi Pico, but the exploit only works with external TPMs using the LPC bus.
- Most modern hardware integrates the TPM, making it more difficult to extract BitLocker keys. AMD and Intel CPUs are likely safe.
- Despite the exploit, BitLocker’s AES-128 or AES-256 encryption is still secure, so there’s no need to abandon it.
Microsoft’s BitLocker is one of the most popular full-disk encryption tools, and is built into Windows 10 and 11 Pro providing an easy encryption option for millions of Windows users worldwide. But BitLocker’s reputation as a leading encryption tool could be under threat after a YouTuber successfully stole encryption keys and decrypted private data in just 43 seconds—using a Raspberry Pi Pico costing $6.
How Was BitLocker’s Encryption Broken?
BitLocker’s encryption was broken by YouTuber Stacksmashing, who posted a video detailing how he intercepted BitLocker data, extracted decryption keys, and successfully exploited the BitLocker encryption process.
Stacksmashing’s exploit involves the external Trusted Platform Module (TPM)—the same TPM chip that stops Windows 11 upgrades—found on some laptops and computers. While many motherboards integrate the TPM chip and modern CPUs integrate the TPM into their design, other machines still use an external TPM.
Now, here’s the issue and the exploit discovered by Stacksmashing. External TPMs communicate with the CPU using what’s known as an LPC bus (Low Pin Count), which is a way for low-bandwidth devices to maintain communication with other hardware without creating a performance overhead.
However, Stacksmashing found that while the data on the TPM is secure, during the boot-up process, the communication channels (the LPC bus) between the TPM and CPU are completely unencrypted. With the right tools, an attacker can intercept data sent between the TPM and CPU containing insecure encryption keys.
Tools like the Raspberry Pi Pico, the minute $6 single-board computer that has a bunch of uses. In this case, Stacksmashing connected a Raspberry Pi Pico to unused connectors on a test laptop and managed to read the binary data as the machine booted. The resulting data contained the Volume Master Key stored on the TPM, which he could then use to decrypt other data.
Is It Time to Ditch BitLocker?
Interestingly, Microsoft was already aware of the potential for this attack. However, this is the first time a practical attack has surfaced at large, illustrating just how fast BitLocker encryption keys can be stolen.
It raises the vital question of whether you should consider switching to a BitLocker alternative, like the free and open-source VeraCrypt . The good news is that you don’t need to jump ship for a few reasons.
First, the exploit only works with external TPMs that request data from the module using the LPC bus. Most modern hardware integrates the TPM. While a motherboard-based TPM could theoretically be exploited, it would require more time, effort, and an extensive period with the target device. Extracting BitLocker Volume Master Key data from a TPM becomes even more difficult if the module is integrated into the CPU.
AMD CPUs have integrated TPM 2.0 since 2016 (with the launch of AM4, known as fTPM), while Intel CPUs integrated TPM 2.0 with the launch of its 8th Generation Coffee Lake CPUs in 2017 (known as PTT). Suffice to say, if you’re using a machine with an AMD or Intel CPU manufacturer after those dates, you’re most likely safe.
It’s also worth noting that despite this exploit, BitLocker remains secure, and the actual encryption underpinning it, AES-128 or AES-256, is still secure.
Also read:
- [New] In 2024, Building Personalized Instagram Feed Outlines
- Enlightening Windows Users on Camera Memory Issues
- Expert Insights Into Efficient LunaPic Usage
- In 2024, Best Video Chatting Tools for Remote Team Interactions
- Insta-TikTik Mastery Uniting Two Social Giants for 2024
- Lenovo IdeaPad 3 15-Inch (I7, GTX 1660 Ti) - In-Depth Analysis of an Affordable Powerhouse for Gamers
- Mastering Fast Download Rates for Epic Launcher
- Navigating Through Failed Discord Setup in Windows 11
- Professional Video Editing Does M1 MacBook Air Hold Up, In 2024
- Struggling with Erratic Key Presses in Windows 11? Discover Effective Remedies Now!
- Tailoring Functionalities of FN Keys on Windows 11 Devices
- The Finest Alternatives to Microsoft's Core Applications
- Unlock Your Full Potential with Network Traffic Insight via Win11's Netstat
- Unveiling Bing - An Alternative Powerhouse in Web Search Technology by Microsoft
- ViVeTool Breakdown: How to Pre-Emptive Access Updates
- Title: Shattered Crypto Key: Don't Rush for New Guardians
- Author: David
- Created at : 2024-10-09 22:04:10
- Updated at : 2024-10-15 21:29:24
- Link: https://win11.techidaily.com/shattered-crypto-key-dont-rush-for-new-guardians/
- License: This work is licensed under CC BY-NC-SA 4.0.