


7 Secure USB Drives Reviewed 146
jcatcw writes "Computerworld has reviewed seven USB drives that use either encryption or a physical keypad to protect stored data, and found big differences in I/O speeds, ease of use and strength of security. In the case of the drive using a key pad, the editors were able to break open the device and access the data, bypassing the PIN security. They also state that there is little difference between 128-bit and 256-bit AES encryption because neither has been broken yet. The drives reviewed were the SanDisk Cruzer, the Lexar JumpDrive, the Kingston DataTraveler, the Imation Pivot Plus, the Corsair Survivor, the Corsair Padlock and the IronKey Secure USB Drive. The editors chose the IronKey as the most secure."
For the... (Score:5, Informative)
We dont want to see a little bit of content over 9 pages!
Truecrypt: Linux, OS X, and Windows. Free. (Score:5, Informative)
"Free open-source disk encryption software for Windows Vista/XP, Mac OS X, and Linux"
Re: (Score:2)
All trust the OS, except... Root only to install. (Score:3, Insightful)
All drives except those with separate keypads trust the OS with the password. Hardware keyloggers will see the password if there is no separate keypad. But that's not the problem. The problem is losing the drive. Hopefully the drive would not be lost in the same place someone is using a key logging device.
Root is required only to install TrueCrypt, not run it.
Re:All trust the OS, except... Root only to instal (Score:2, Insightful)
What if you want to read the data on a computer that doesn't have TrueCrypt installed?
Re:All trust the OS, except... Root only to instal (Score:4, Insightful)
But I'd be wary using a secure key on any public PC... you can't trust the PC, and the key could easily be compromised if the machine is. The chain of security is only as strong as it's weakest link.
Format a Flash drive as NTFS (Score:2)
I wonder if that would make the flash drive more reliable, since NTFS is more reliable than FAT?
Don't use Windows OS encryption. According to Microsoft technical support, it is not reliable.
Re: (Score:2)
NTFS higher disk overhead than FAT? (Score:2)
I don't know whether NTFS would have a higher access overhead. I hope someone who reads this can tell us.
Re: (Score:3, Insightful)
Re: (Score:2)
The FAT drivers are geared for quick flush to the drive, so you can yank the drive quickly. NTFS doesn't guarantee everything's flushed unless you use the eject dialog.
So if you yank the drive, or lose power, or hibernate your machine, use the drive on another machine, then go back and plug it in and unhibernate the machine, if you're using NTFS, you're probably going to corrupt the filesystem.
Confusion between permissions and encryption. (Score:2)
I can move NTFS-formatted hard drives in removable USB enclosures to any computer, and read them there. It seems that it should be the same for any NTFS-formatted drive.
Microsoft drive encryption is not reliable, according to MS tech. support people. It should not be used.
Re: (Score:2, Informative)
Basically, the whole point of it is that you can't take some random encrypted drive somewhere else and read it - kind of defeats the purpose of using it on a flash drive, unless you want it (or the specific paths that are encrypted) locked to the PC.
Yes, the NTFS encryption is crap, unless you set up wind
NTFS encryption tied to OS user name and password! (Score:3, Informative)
That means if the user account is damaged, the data is lost forever, unless the user info can be restored from a domain server.
There are complaints on MS user groups from people who have lost months of hard wok that way.
Re: (Score:2)
Re:All trust the OS, except... Root only to instal (Score:2)
If you can't trust the computer you are exposing ALL your files to, you shouldn't make those files accessible to it.
Any malicious program in the computer can read the rest of the files once you unlock the entire encrypted partition for the entire computer to read.
Use a trusted computer to move the files to a different USB drive first.
In the old floppy days, sticking a floppy into
Re: (Score:3, Interesting)
Re: (Score:2)
Re: (Score:2)
The only drawback is that it is not really something you can buy "off the shelf."
Re: (Score:2)
Unless people can tell me reasons otherwise.
Re:Truecrypt: Linux, OS X, and Windows. Free. (Score:5, Funny)
Indeed, our thumb drives utilize gold connectors to ensure the fidelity and privacy of your porn collection. Other thumb drives use cheap, base metals. These are highly susceptible to corruption and thus are insecure. Don't take the risk and go cheap; after all, do you really want the whole world to see your midget clown photo sets?
Re: (Score:2)
It seems to use a randomly generated key (cryptographically the best thing that you can do) to encrypt the flash memory. This do
Re: (Score:2)
We dont want to see a little bit of content over 9 pages!
Solution: (Score:2)
Re: (Score:2)
See this encrypted usb HARD drive:
http://www.heise-online.co.uk/security/Enclosed-but-not-encrypted--/features/110136/0 [heise-online.co.uk]
Some 128 bit encryption was involved, but not implemented a correct way, so it was easy to decrypt beacuse only a xor key was involved.
Re: (Score:2)
TrueCrypt (Score:5, Insightful)
Re: (Score:3, Informative)
Re: (Score:2)
Corsair already does on some of their drives (like the Flash Voyager 32Gb)
Re: (Score:2, Informative)
Short summary (Score:5, Informative)
The Corsair Survivor - no security, so TrueCrypt is needed, but setup instructions for TrueCrypt are included.
The Imation Pivot Plus Flash Drive - uses AES-256, but in the insecure ECB mode. Hey, I suppose it's better than ROT13 at least.
The IronKey Secure Flash Drive - "To use the IronKey flash drive, you need to activate an online account." Well, that sounds like a great idea.
The Kingston DataTraveler Secure -- Privacy Edition - "Kingston refused to say what encryption mode the device runs in, citing that it was proprietary information." So that would be ECB again, then. Or maybe something even more pathetic.
The Lexar JumpDrive Secure II Plus - Special proprietary software is required to use this one.
The SanDisk Cruzer Professional - ECB again.
Really short summary: buy a conventional USB stick and do the encryption yourself using free software that you can trust. Because customers cannot tell the difference between a well secured device and some snake oil junk, there is no incentive to make these things work properly.
Re: (Score:2)
Re: (Score:3, Informative)
The anonymous browsing works well. I haven't had as much luck with the password-keeper feature. Note that so far only basic file access works on OSX, but it works easily.
I opted for the online activation, and used the password recovery successfully - and am glad I got to test that inste
Re: Insecure ECB Mode? (Score:2)
AES in ECB mode is less se
Re: (Score:3, Informative)
Re: (Score:2)
The block-based CBC structures will enhance encryption stre
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
I use LUKS on my USB drives on my Linux boxes, and I understand there's a way to use it from Windows as well although I haven't tried yet.
Re: (Score:2)
The Ironkey sounds really good, but since I need to swap between a Windows and a BSD pc, it's effectively useless.
With TrueCrypt you could make it work cross-platform, but you'd need non-Windows host computers to have TrueCrypt already installed.
Re: (Score:2)
Re: (Score:2)
or
You can also not install anything, and just start it ("traveler mode"), but it must then be able to add it's driver when starting. And that needs admin rights.
So unless the OS already knows about that driver, you do need admin rights.
Re: (Score:2)
Re: (Score:2)
Yeah I glanced these over... (Score:5, Funny)
My condolences... (Score:3, Funny)
...on the loss of your mother, when she happened to pull your USB drive out of one of your pockets before she threw your jeans in the wash.
Easy but inconvenient. (Score:2)
Re: (Score:2)
Plus you could use it as an emergency radioactive boat anchor in a pinch.
Re: (Score:2)
The recognition mechanism sounds tricky but nothing a sub-skin RFID can't solve (you authorize people to use the drive by implanting them with authorized RFIDs).
Except, of course, RFIDs are notoriously insecure—no physical contact needed to glean all the information one could want, unless it's protected again with a reasonable challenge/response system, but is there even one in existence? I suppose you could try biometric information such as full DNA scan, but then, do you really trust your evil twin?
It really comes down to the fact that for a truly good security, a man really needs his own island. With electrified shores.
Re: (Score:2)
Re: (Score:2)
That extra 273 degrees makes the critical difference between this approach and lesser celsius-based systems.
Another analysis (similiar vein) (Score:5, Informative)
http://www.flylogic.net/blog/ [flylogic.net]
They often de-cap the ICs and reverse engineer from a microscope. Really interesting stuff!
IronKey and OSX/Linux/etc (Score:2)
Re: (Score:3, Interesting)
It works wonderfully on the Mac for basic encryptio/decryption/file access, and I am also mounting it to a WinXP virtual image within VMWare Fusion. The VM XP thing works flawlessly, including auto-mounting, and I initialized the key on the VM prior to using it on the Mac.
The company promises Linux drivers soon.
Not yet- but do you care about your data tomorrow? (Score:3, Insightful)
Maybe not yet, but presumably, when they are broken, they're likely to be broken in such a manner that 128-bit falls way before 256-bit. So if you only care about someone not stealing your data right now, they might both be equivalent, but if you're worried about someone stealing your data at any time and then reading it further down the road, one is likely to be much better than the other.
Also, I'm sure there will be some debate on this, but I'm not entirely convinced that if someone like the NSA has thrown a few billion dollars at the problem including having a custom-made super computer with their own unique, dedicated processors that are highly optimized for cracking encryption, that perhaps 128-bit AES is already compromised and we simply don't know. The relative advantages of 128 vs 256 bit might depend both on how long you want to keep your data secure, and on who you're trying to keep it secure from.
Big difference between 128- and 256-bit security (Score:2, Insightful)
With an algorithm like AES, if you need your data to stay secure longer, use a bigger key.
128 vs 256 Bit AES (Score:4, Insightful)
It doesn't matter that much that there's little difference right now between 128-bit and 256-bit AES. It will matter later. There will almost certainly be time after 128-bit AES is broken but before 256-bit is broken. During that time, the extra 128 bits will mean the difference between secure and insecure. And remember, attackers who can read but not crack your messages can still keep them for later when they're crackable. If your messages still have value at that time, they will crack them then.
Of course, even 256-bit AES will eventually be broken. Everything will eventually be broken. But you have to consider that what you're buying for your encryption dollar isn't secrecy, period, but rather secrecy for a period of time. 256-bit AES buys more time.
Re: (Score:2)
Before satellite TV hackers were shut do
Re: (Score:2)
You really didn't offer an argument why a message encrypted with AES-128 could be trusted not to be read after AES-128 is eventually broken. Saying "Vista isn't broken yet" isn't a good argument. For one, only a small fraction
Re: (Score:2)
The notion that "everything will eventually be broken" is one I do not share. If by "broken" you mean the technical cryptological definition of "finding a weakness", then I would agree. But flat-out broken, as in, "I can read all your encrypted messages", then no, I do not agree. Most breaks, certainly the more celebrated ones, have more to do with flawed implementation of the security system as a whole, rather than the vulnerability of the underlying crypto algos.
Broken is a relative term. Even assumin
Re: (Score:2)
Re: (Score:2)
The point I made is that though 128 vs 256 AES cracking shouldn't concern us right now, it could concern us in the future. I don't think Moore's Law is linear for computation over the next 84 years, especially when we're up against so many limits today (heat dissipation, litho scale, tractability of parallel programming complexity). A pessimist would say it'll be slower than linear now that we've got limits. An optimist (who knows about nanosc
not as secure as it could be (Score:5, Interesting)
The vendor assured us it was properly secured, and I got first crack at it. We were quite disappointed.
I found that while each block on the hard drive WAS encrypted (by the firewire-to-ide bridge board), they were each encrypted using the same key, and no salt. This means that every block was encrypted in the same way.
This by itself probably seems harmless, but it reveals information that should not be revealed. Let me propose a scenario:
I engineer myself a position working at a rival company, and get physical access to their R&D lab, unsupervised. I have a 1/2 hr lunch break of time to find the drive containing the comany's secret recipes. I open the cabinet and find 30 of these secured drives. I was intending on taking the drive and copying it, but christ, there's 30 of them. I brought along a portable 1gb drive which would fit maybe 5 of them, but not 30.
So which ones do I copy? The bad news... I can tell which ones to copy.
I can look at the blocks on the disk and immediately spot any drives that have not been formatted, because their first 50 blocks are all going to contain the same random garbage in each block. OK that narrows it down to 8 drives. I can only image 5. So I look further.
I can now tell which drives are formatted FAT32, APS (apple HFS), etc. I can do this because I know what blocks are zeros (because there are a lot of them and they are all the same) and so I can tell which bytes in the other blocks are NOT zeros, and this makes determingin format AND used space trivial. I know the drive I'm looking for is FAT32, and that breaks it down to 3 drives. I could just go with the one drive that clearly has 30 gb used on it, and skip the others that appear very lightly used, but this has given me plenty of time so I happily image the 3 drives to my portable and sneak out in under 20 minutes.
Now of course we have to break the data, but the moral of the story here is, they allowed me way too much information from the supposedly secure drive, and it was enough to make what could have been a fruitless attempt into what may be a very successful attempt.
I brought this issue to the manufacturers, and was brushed off. They did not consider this a problem. riiiiight.
Re: (Score:2)
Re: (Score:2, Insightful)
I agree that salts should apply and keys should be different for every sector, like Truecrypt does. But secure drives should be fully overwritten before use, even then. If the cracker has access to your encrypted data over a period of time, you should al
Re: (Score:2)
Even if we assume the drive was used for quite awhile before I got my hands on it, and thus had what will appear as random information in each block, I can do all sorts of analysis of it. I can still determine what filesystem is on it, and I can even scan the drive for more interesting things like count the number of (potential) files on the drive by
FIPS 140-2 compliance? (Score:2)
Ironkey (Score:3, Insightful)
Seems pretty easy for someone to destroy the drive/data if they wanted to. Even accidentally destroy the drive/data.
Stupid garbage products (Score:4, Insightful)
One of them won't even tell you the full details of the algorithm they use, saying it's 'proprietary' which is another word for "It's secret and it doesn't actually work." in the security industry.
Not only that, but each and every single one of them uses software on my computer to do the encryption. I can get the same thing by using decent drive encryption software like dm-crypt and LUKS. And those are publicly viewable and peer reviewed so they're much more likely to be secure than some stupid random algorithm slapped together by a few techs they paid to do it out of the spare change jar. So that's just totally silly.
I was hoping for something where the encryption was really done in the drive itself and it required me to enter something on a little keypad attached to it in some way in order to decrypt anything. I bet the one that sounds like it might do that just causes the USB device to refuse to talk to the world unless you enter the right thing on the keypad. You could pull that thing apart, attach a few leads and I bet you could read every bit off there (including the PIN) in the clear.
Security isn't that hard to do right. But nobody seems to want to bother. They just want to slap the word on their product, make the user jump through a few hoops and call it good.
Re: (Score:2)
The review article doesn't make that really clear. Hmmm... I'll have to check it out. I'm actually in the market for storage like that that's much, much tinier than IronKey is, but I'll take bigger if that's all I can get. :-)
What I want to use it for is to store hard-drive encryption keys. I can just plug the IronKey into the system and configure LUKS to go look there for the password on bootup.
I apologize if I unfairly painted your product with a broad brush that I felt applied to all of them. The
No BioStik review? (Score:4, Interesting)
Re: (Score:2)
Ahem, Iron Key reliability? (Score:3, Interesting)
Completely worthless review.... (Score:2)
Incompetents.
What a surprise... (Score:3, Interesting)
I'm sure that's just pure coincidence, though.
recent addons -- (Score:2)
My choice: Security through Obscurity (Score:2)
Review lacking (Score:2)
1) Inconsistent tests for the various file copies mentioned - so you can't really compare.
2) No write speeds listed for all.
Write speeds are significant if you are talking about copying GBs of data to the drive.
And for the write tests you have to ensure that it's all copied and written to the usb drive and not just cached somewhere.
Re:A false sense of security is actually worse (Score:5, Insightful)
Re: (Score:2)
Then the IT security policy is:
1) Keep your wallet/purse and their contents safe.
2) If your wallet/purse goes missing, call up IT (after calling the banks to cancel your cards etc) to disable your account till you can be reverified.
If you do this, even if they are given new passwords every 3 months, there's no big change to their workflow.
Re: (Score:3, Insightful)
Their passwords may no longer be feasible to guess/crack, but if they are compromised in some other way - like snooping - you've guaranteed that they will stay permanently compromised.
Re: (Score:2)
Honestly, I figured that this would be obvious, however I underestimated the pedantic nature of some people to pounce on the tiniest flaw in a post (most likely the mis-use of the word "permanent".)
Re: (Score:2)
Re: (Score:2)
I've found a lot of Security Noobs do this, and
Re: (Score:2)
Maybe most admins are really detached from their users and never talk to them/hate them/think they're stupid/whatever, but I'm not.
I TALK to the users, and TRAIN them on WHY they need to choose a good password. If they want to create a new one, and have it never change, they can come and talk to me. I'll sit there and help them remember it for a few minutes, explain WHY they aren't supposed t
Re: (Score:3, Insightful)
Some admins are just working in larger environments where they can't sit down with hundreds or thousands of users and hold their hand and teach them nifty memorization tricks to help them remember their sufficiently complex password.
Re: (Score:2)
Re: (Score:2)
Yes, obviously I DO work in a much smaller environment than I could. But guess what? I LOVE my job, I make more money than the VAST majority of people that work in my field, I get to work my own hours, I get to work on the projects that I WANT to work on, and if somebody tries to implement something stupid, I can change it.
Wanna know why?
Because I am the type of person that DOES take the time to sit down with users and explain WHY things are the way they are (or, if necessary, schedule a trainin
Re: (Score:2)
Now, you could have just accepted that and moved on, but you didn't. You took it as some sort of attack, probably because you were expecting it given that you were basically bad mouthing
Re: (Score:2)
The password is going to meet certain complexity requirements and that is that. There isn't going to be any hand holding. There isn't going to be any explaining the rational behind the decision.
And if they're late to dinner, no fruit cup!
The policy manual should include the strategy for memorizing a good password. Even so, make it too complex or changing too frequently and they WILL write it on a post-it and stick it on their monitor. So will anyone responsable for spotting and punishing the infracti
Re: (Score:2)
Re: (Score:2)
Or you could require 15+ character passphrases and essentially eliminate the problem altogether, along with there being no real reason to force your users to use anything other than lowercase letters.
Re: (Score:2)
What many admins don't understand is that the relation between actual security and the difficulty of authorized access procedures is far from linear. In fact, it usually has a sharp dropoff at one or more thresholds of pain.
From a practical standpoint, it means a password can only get so complex or rotate so often before it WILL be written down no matter what policy says. If policy strictly forbids writing it down, it will be written down and left in any of a number of 'clever' places that anyone can gues
Re: (Score:2)
Sensible 2 factor access control can also be a very good
Re: (Score:2)
Re:A false sense of security is actually worse (Score:4, Insightful)
It is not hard at all to say when discussing Windows systems. Passwords of less than 15 characters can be trivially cracked by OphCrack - no matter how complex they are, assuming the attacker has the appropriate rainbow tables. Passwords greater than that length cannot be cracked this way.
Re:A false sense of security is actually worse (Score:4, Informative)
Thankfully this is set differently by default in both Windows Vista and Windows Server 2008, so the LAN Manager hash is worthless. Of course, this doesn't mean that one can ignore physical security completely, but it raises the bar for password cracking.
To be safe, blincoln has the right idea -- minimum 15 characters, so even if the LAN Manager compatibility gets enabled for some $DEITY-forsaken reason, the passwords are immune to rainbow table cracking.
Long term, unless done already, MS needs to take a page from TrueCrypt's playbook [1], and perhaps offer the ability for passwords to be encoded with a varying number of rounds, (for example, SHA-512 hashing a password with a random salt, repeating a million times.) This will slow down brute forcing as an attack vector significantly.
Re: (Score:2)
Who let the girl on slashdot?
Re: (Score:2)
At work, they generate passwords FOR us, and then we get to pick out of a list which one we want. 8 characters, alphanumeric, mixed case. They expire every 6 months or so. So, I end up with passwords like f3nqDe4C* and the like.
I usually DO have to write it on a Post-It to remember the MixEd cAsE for at least a couple days, but that stays in my wallet, and gets thrown out pretty quickly. Such fun.
--Joe
* Not an actual password, but similar in character to passwords I've had.
Re:Product development cycle (Score:5, Insightful)
Hint: 72693 transistor hardware AES implementation at one word of plaintext to one word of ciphertext per cycle runs much faster than 4978652193 transistor Pentium 4 decoding and executing an instruction set. Same with a dust-size ARM. Using a simple chip that does 1 round and has to be run 16 times might just get you 1MB/s at 4MHz. The chip can be simplified down to having a lookup table taking 4096 bytes of ROM to do 3 stages of a round, operating on 32-bit words in 4 stages; this will block the circuit doing that operation for 4 cycles though, so you could implement the circuit 4 times (4 lookup tables?) for 1MB/s at 1MHz. Also the final XOR would be 4 32-bit XORs or (better) just one 128-bit XOR.
With the 4xLookup optimization and the 128-bit XOR in a pipeline, this simple chip would do one AES block per 16 cycles. By duplicating the circuit and pipelining, you would do 2 rounds per clock. Get creative with it.