Cold Boot Attacks on Encryption Keys

April 1, 2008

Whilst I am sitting here testing some new encryption software for my company, it reminds me of an article I was sent by a friend recently regarding the possibility of recovering crypto keys from volatile RAM. Different RAM types have differing characteristics – some may fade over greater or less periods of time, however most take sufficient time for all of the bits to fade – and this can be prolonged considerably using a freezing agent directly onto the chips (for example using an `air duster` aerosol at close proximity). The basic concept is that you can (almost literally..)`freeze` the content of th RAM as it was prior to shutdown, including any loaded encryption keys, clear text data etc. Video example from here

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: