<<< Date Index >>>     <<< Thread Index >>>

Re: On the Recent PGP and Truecrypt Posting



jon@xxxxxxx wrote:
> [snip]
>
> Simply put, if you change the passphrase on a PGP Virtual Disk, or a 
> Truecrypt volume, or anything else, it does not change the passphrase on 
> backups of that data. If you restore the data from the backup, the passphrase 
> on the restored file is not the passphrase on the changed one.
>
>   
Ignoring the issue of how things were published ....

I think the underlying point is that many users, not understanding the
difference between the bulk key used to encrypt the data and the
passphrase used to protect that bulk key would assume, incorrectly that
changing the passphrase would lock out prior users.

Clearly a users with a backup copy of an encrypted disk for which they
know the passphrase can use the technique described to decode a more
recent image of the same encrypted disk even though the owner of the
disk may think it safe because the passphrase was changed.   In this
situation the old user gain access to newer data that they were not
supposed to be able to access.    This is different from the described
restored backup situation in that the user is using a partial restore to
circumvent a security mechanism.

The re-encyrpt button obviously defeats this attack however it's not
clear that real world users actually understand the need to re-encrypt
to make pass phrase changes meaningful when backup copies exist.   I
think this is mostly a documentation issue and perhaps a user interface
design issue in that users should be strongly advised to re-encrypt when
they change the passphrase.

John