Defeating encrypted and deniable file systems: TrueCrypt v5.1a and the case of the tattling OS and applications

  • Authors:
  • Alexei Czeskis;David J. St. Hilaire;Karl Koscher;Steven D. Gribble;Tadayoshi Kohno;Bruce Schneier

  • Affiliations:
  • Dept. of Computer Science and Engineering, Univ. of Washington;Dept. of Computer Science and Engineering, Univ. of Washington;Dept. of Computer Science and Engineering, Univ. of Washington;Dept. of Computer Science and Engineering, Univ. of Washington;Dept. of Computer Science and Engineering, Univ. of Washington;BT

  • Venue:
  • HOTSEC'08 Proceedings of the 3rd conference on Hot topics in security
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

We examine the security requirements for creating a Deniable File System (DFS), and the efficacy with which the TrueCrypt disk-encryption software meets those requirements. We find that the Windows Vista operating system itself, Microsoft Word, and Google Desktop all compromise the deniability of a TrueCrypt DFS. While staged in the context of TrueCrypt, our research highlights several fundamental challenges to the creation and use of any DFS: even when the file system may be deniable in the pure, mathematical sense, we find that the environment surrounding that file system can undermine its deniability, as well as its contents. We hypothesize some extensions of our discoveries to regular (non-deniable) encrypted file systems. Finally, we suggest approaches for overcoming these challenges on modern operating systems like Windows. We analyzed TrueCrypt version 5.1a (latest available version during the writing of the paper); Truecrypt v6 introduces new features, including the ability to create deniable operating systems, which we have not studied.