Menu

Concerning paper about vulnerability in Hidden OS

2018-02-17
2024-05-29
  • Mounir IDRASSI

    Mounir IDRASSI - 2018-02-17

    I was informed about a paper claiming to defeat plausible deniability of hidden OS feature in VeraCrypt.
    The paper in question is published at http://www.riverpublishers.com/journal_read_html_article.php?j=JSN/2017/1/12

    I will focus on the the one-time access scenario (section 4.3 in the paper) since other scenarios involving attacker's ability to access VeraCrypt volume at several points over time are known to break plausible deniability as documented at https://www.veracrypt.fr/en/Security%20Requirements%20for%20Hidden%20Volumes.html

    In section 4.3, the authors describe how they found two sectors in the outer volume area that have lower entropy than the rest of the sectors and they go on to describe the content of these sectors.
    What is strange in this is that they seem to imply that these 2 sectors are not encrypted and they explicitly write that "this area is not overwritten by VeraCrypt encryption algorithm": this statement is simply false because no data is left unencrypted on the disk and all write operations within hidden OS or the decoy OS are encrypted.
    Another possibility is that they didn't mean that these sectors are left unencrypted and what they are describing is the content of these sectors as seen from within the hidden OS. The language used by the authors is not clear enough and it can be confusing especially the sentence I cited above.
    If this is what they meant then they have found an issue with the standard XTS encryption mode used by VeraCrypt and other disk encryption products since they have found a correlation between the entropy of plain text and encrypted text. This is a huge discovery and I am surprised they did not emphisis this point since this breaks a fondamental property of the XTS encryption mode.

    So we are left with either an issue in the test environement of the authors or a more serious vulnerability affecting the XTS encryption mode. What is sure is that the data mentionned by the authors can not be read from the outer volume without the password of the hidden OS and everybody can check this using simple tools (like HxD).

    Don't hesitate to share any comment. Does anyone knows how to contact the authors to seek clarifications?

     

Log in to post a comment.

Want the latest updates on software, tech news, and AI?
Get latest updates about software, tech news, and AI from SourceForge directly in your inbox once a month.