general encryption question

Special K

Diamond Member
Jun 18, 2000
7,098
0
76
I currently use KeePass to store all of my passwords and am investigating using TrueCrypt to protect my data. As I was reading thorugh the documentation for both KeePass and TrueCrypt, I had a question:

Aren't these encryption tools only as safe as the master password you use to unlock them? For example, the documentation for KeePass says the following:


KeePass is a free open source password manager, which helps you to manage your passwords in a secure way. You can put all your passwords in one database, which is locked with one master key or a key file. So you only have to remember one single master password or select the key file to unlock the whole database. The databases are encrypted using the best and most secure encryption algorithms currently known (AES and Twofish).

Isn't the weak point always going to be the master password used to secure the encrypted database, and not the encryption itself? Why should it matter what encryption the database uses if a hacker can just crack the master password protecting it using brute force or some other method?

In other words, what is the encryption really protecting me from? It seems a non-encrypted database with a strong password would be much more secure than an encrypted database with a weak password, provided of course that the data in the non encrypted database wasn't stored in plain text format, otherwise the hacker could just open the database in a hex editing utility and access the protected data that way.

What am I missing here?
 

lxskllr

No Lifer
Nov 30, 2004
57,659
7,893
126
In other words, what is the encryption really protecting me from? It seems a non-encrypted database with a strong password would be much more secure than an encrypted database with a weak password, provided of course that the data in the non encrypted database wasn't stored in plain text format, otherwise the hacker could just open the database in a hex editing utility and access the protected data that way.

What am I missing here?

I think this is the answer. A lot of stuff you want private would be retrievable without a terrible amount of difficulty. If you're cognizant enough to use encryption, it's assumed you're using a better password than "password". You're right that a crappy password is easily breakable, but a great password protecting encryption is unbeatable barring extraordinary measures.
 

Special K

Diamond Member
Jun 18, 2000
7,098
0
76
I think this is the answer. A lot of stuff you want private would be retrievable without a terrible amount of difficulty. If you're cognizant enough to use encryption, it's assumed you're using a better password than "password". You're right that a crappy password is easily breakable, but a great password protecting encryption is unbeatable barring extraordinary measures.

Right, it just seems like the password is what's really providing the protection, not the encryption. That just makes me wonder: why have the encryption in the first place?

I don't know anything about database design, but if an unencrypted, password-protected database with data stored in binary format is easy to parse using a hex editor and/or some other unconventional method (i.e. bypassing the database's native application and password protection), then I suppose I could see the point of encrypting the database to protect against those types of attacks.

Even in that case though, it seems the encryption would only be useful if the master password protecting the database were at least as difficult to crack as the encryption itself, otherwise a would-be hacker would simply try to crack the password protecting the database rather than try to access the data directly using some other method that bypasses the password.
 

Nothinman

Elite Member
Sep 14, 2001
30,672
0
0
Right, it just seems like the password is what's really providing the protection, not the encryption. That just makes me wonder: why have the encryption in the first place?

I don't know anything about database design, but if an unencrypted, password-protected database with data stored in binary format is easy to parse using a hex editor and/or some other unconventional method (i.e. bypassing the database's native application and password protection), then I suppose I could see the point of encrypting the database to protect against those types of attacks.

Even in that case though, it seems the encryption would only be useful if the master password protecting the database were at least as difficult to crack as the encryption itself, otherwise a would-be hacker would simply try to crack the password protecting the database rather than try to access the data directly using some other method that bypasses the password.

If you're fine with your data just being obfuscated to keep it from those who don't really care to steal it, then sure. But an encrypted database will always be better because they still have to bruteforce the password to decrypt it before they can begin to use the tools to display the binary data. Do you also think that painting a lock on your front door would be good enough security?

Choosing a poor password like 'cat' is always a bad idea, regardless of the application of the password.
 

Special K

Diamond Member
Jun 18, 2000
7,098
0
76
If you're fine with your data just being obfuscated to keep it from those who don't really care to steal it, then sure. But an encrypted database will always be better because they still have to bruteforce the password to decrypt it before they can begin to use the tools to display the binary data. Do you also think that painting a lock on your front door would be good enough security?

Choosing a poor password like 'cat' is always a bad idea, regardless of the application of the password.

In the case of TrueCrypt, all that is required to mount an encrypted volume is to enter the master password. Once that has been done, all of the data held in the volume is available for access in its unencrypted format. The same is true for KeePass - once the master password has been entered, all user names, passwords, etc. are available in plain text format.

In these two instances, what benefit is the encryption providing above and beyond the master password?
 

lxskllr

No Lifer
Nov 30, 2004
57,659
7,893
126
In these two instances, what benefit is the encryption providing above and beyond the master password?

It's preventing forensic tools from being used to look at your data. A password is fine for say a coffee shop, where physical access is brief and limited. The password could be bypassed though, if someone has the whole machine, or hd. Encryption will prevent someone with unlimited access from accessing your data.
 

theevilsharpie

Platinum Member
Nov 2, 2009
2,322
14
81
Right, it just seems like the password is what's really providing the protection, not the encryption. That just makes me wonder: why have the encryption in the first place?

Imagine that an encrypted data store is a bank vault, and the door to the vault is the master password. Removing the encryption while keeping the password is like removing the walls of the vault while keeping the door in place. Yeah, the door is still there, but no one cares about the door; they want the contents of the vault.

A password on an unencrypted data store is completely pointless, as anyone can bypass whatever method controls access and get at the data directly.
 

Special K

Diamond Member
Jun 18, 2000
7,098
0
76
Imagine that an encrypted data store is a bank vault, and the door to the vault is the master password. Removing the encryption while keeping the password is like removing the walls of the vault while keeping the door in place. Yeah, the door is still there, but no one cares about the door; they want the contents of the vault.

A password on an unencrypted data store is completely pointless, as anyone can bypass whatever method controls access and get at the data directly.

Thanks, that analogy makes sense. I guess that does support my previous statement that the master password needs to provide protection comparable to that of the encryption in order for both to be effective.

Having said that, if my KeePass database uses AES+twofish encryption but I use a 10 character master password to protect it, is there any way the master password could provide protection comparable to the encryption? It seems like it would be much easier to crack a 10 character password than it would be to bypass the password and try and break the AES + twofish encryption to access the data.
 

theevilsharpie

Platinum Member
Nov 2, 2009
2,322
14
81
Thanks, that analogy makes sense. I guess that does support my previous statement that the master password needs to provide protection comparable to that of the encryption in order for both to be effective.

Having said that, if my KeePass database uses AES+twofish encryption but I use a 10 character master password to protect it, is there any way the master password could provide protection comparable to the encryption? It seems like it would be much easier to crack a 10 character password than it would be to bypass the password and try and break the AES + twofish encryption to access the data.

You're right, it would be easier to crack.

That's why you don't use 10-character passwords ^_^
 

lxskllr

No Lifer
Nov 30, 2004
57,659
7,893
126
It seems like it would be much easier to crack a 10 character password than it would be to bypass the password and try and break the AES + twofish encryption to access the data.

Not sure I understand. If someone breaks your password, the magic encryption doors open up. What I /think/ you're saying is a password is weaker than the underlying encryption, and that's true. A password can only be so complex before you forget what it is. An awesome password would be taking the bible, starting in the middle, and alternating all the words back and forth until you get to the ends. Great password, not very memorable. You have to use your best judgment for what you can remember, and strength desired. It's an imperfect system, but it's the best we've got.
 

Special K

Diamond Member
Jun 18, 2000
7,098
0
76
You're right, it would be easier to crack.

That's why you don't use 10-character passwords ^_^

Well a 10 character password could still be ~100^10 combinations (more if you count symbols and upper ANSI characters, I'm just using 100 as a nice round number), although that number would drop dramatically if the password was a dictionary word or some other easily-guessable word or derivation.

Is there any way to equate a password's effectiveness with a particular encryption method, i.e. "this 10 character password provides equivalent protection to 64-bit AES encryption" or something like that?
 
Last edited:

Chiefcrowe

Diamond Member
Sep 15, 2008
5,049
182
116
In an ideal world you'd have to use two factor or more authentication to unlock your encrypted files, or in Keepass have it use a password plus a keyfile. That would be quite secure.
 

theevilsharpie

Platinum Member
Nov 2, 2009
2,322
14
81
Is there any way to equate a password's effectiveness with a particular encryption method...

No. They're different things. Going back to our bank vault analogy, you've just asked if there's any way the vault key can provide equivalent protection to the vault walls.
 

Special K

Diamond Member
Jun 18, 2000
7,098
0
76
Not sure I understand. If someone breaks your password, the magic encryption doors open up. What I /think/ you're saying is a password is weaker than the underlying encryption, and that's true. A password can only be so complex before you forget what it is. An awesome password would be taking the bible, starting in the middle, and alternating all the words back and forth until you get to the ends. Great password, not very memorable. You have to use your best judgment for what you can remember, and strength desired. It's an imperfect system, but it's the best we've got.

Right, what I meant was that in the case of TrueCrypt and KeePass, and presumably many other encryption programs, if someone cracks your master password, all of the protected data is available in plain text format. The encryption is useless at that point.

The encryption is only helpful for protecting against indirect attacks that bypass the password and standard methods of access, correct?
 
Last edited:

BrightCandle

Diamond Member
Mar 15, 2007
4,762
0
76
In order to be able to decrypt something that has been encrypted there must be something you know that no one else does. Right now passwords are that fact.

Rather than hacking the password however its important to realise its just easy to beat the password out of you. If they ever make it fingerprint, retina scan etc that just takes the brutality to another level.
 

Nothinman

Elite Member
Sep 14, 2001
30,672
0
0
Right, what I meant was that in the case of TrueCrypt and KeePass, and presumably many other encryption programs, if someone cracks your master password, all of the protected data is available in plain text format. The encryption is useless at that point.

The encryption is only helpful for protecting against indirect attacks that bypass the password and standard methods of access, correct?

The encryption is never useless, it's doing its job regardless of the password. If you chose a poor key, that's on you. If 1 level of protection isn't enough for you there are other options like multiple levels of encryption (e.g. Keypass DB in a TrueCrypt file) or 2 factor authentication if the app supports it.
 

Special K

Diamond Member
Jun 18, 2000
7,098
0
76
No. They're different things. Going back to our bank vault analogy, you've just asked if there's any way the vault key can provide equivalent protection to the vault walls.

OK, here's what I was thinking of (notice the quality bar below measured in bits):


After doing some searching, it seems that Quality bar corresponds to the entropy of the password:

http://en.wikipedia.org/wiki/Password_strength (scroll to the section titled "Entropy as a measure of password strength".
 
Last edited:

beginner99

Diamond Member
Jun 2, 2009
5,223
1,598
136
Rather than hacking the password however its important to realise its just easy to beat the password out of you. If they ever make it fingerprint, retina scan etc that just takes the brutality to another level.

exactly.

However a very secure (or clever) system should always offer the option for a "false" password that seems to work correctly for the attacker and show content but it actually just shows some fake content. The attacker then thinks he has what he wanted and lets you alone...(in the ideal world, in the real world you might just catch a bullet ).

But OP is right, the password is the insecure part.

I'm not sure if I'm wrong but it seems safer to use the same (complex) password everywhere instead of such a "password keeper". In both cases only 1 password must be cracked and in the later the App also show the attacker exactly were to look for stuff, eg for which websites and application you are registered.
 
Last edited:

Special K

Diamond Member
Jun 18, 2000
7,098
0
76
exactly.

However a very secure (or clever) system should always offer the option for a "false" password that seems to work correctly for the attacker and show content but it actually just shows some fake content. The attacker then thinks he has what he wanted and lets you alone...(in the ideal world, in the real world you might just catch a bullet ).

Right. TrueCrypt has a "plausible deniability" feature for just that purpose:

http://www.truecrypt.org/docs/?s=plausible-deniability
 

Chiefcrowe

Diamond Member
Sep 15, 2008
5,049
182
116
I think that your premise of using the same complex password everywhere is not a good one and here is why:
If somehow the password were to be leaked or broken into as a result of being stored in an insecure fashion on a website, then you're screwed. I think it's best to use a unique password in as many places as possible.


exactly.

However a very secure (or clever) system should always offer the option for a "false" password that seems to work correctly for the attacker and show content but it actually just shows some fake content. The attacker then thinks he has what he wanted and lets you alone...(in the ideal world, in the real world you might just catch a bullet ).

But OP is right, the password is the insecure part.

I'm not sure if I'm wrong but it seems safer to use the same (complex) password everywhere instead of such a "password keeper". In both cases only 1 password must be cracked and in the later the App also show the attacker exactly were to look for stuff, eg for which websites and application you are registered.
 

Special K

Diamond Member
Jun 18, 2000
7,098
0
76
beginner99 said:
I think that your premise of using the same complex password everywhere is not I'm not sure if I'm wrong but it seems safer to use the same (complex) password everywhere instead of such a "password keeper". In both cases only 1 password must be cracked and in the later the App also show the attacker exactly were to look for stuff, eg for which websites and application you are registered.

I originally switched to KeePass because my gmail account was hacked. At that time, I was using the same password everywhere, password rules permitting. Most likely what happened was one of my forum accounts was hacked, giving the hacker access to my password and registered email address. I'm not sure how secure forum software is, or how user information is stored in its database, but I think it's far more likely my information was stolen from there rather than a bank, for example.

You are correct that with a password manager all that stands between a hacker and all of my secure information is a single password. Yet I actually feel more secure with the password manager becuase the only place I ever enter my master password is at my home computer or on my smart phone. If I were to put the KeePass database inside a TrueCrypt volume (not sure if TrueCrypt supports android yet), that would add yet another layer of protection.

No security system is perfect, but I feel safer with the system I have now than the one I had before.
 

Chiefcrowe

Diamond Member
Sep 15, 2008
5,049
182
116
Since your gmail was hacked, have you considered turning on 2 factor authentication for the account? Should be a lot safer.



I originally switched to KeePass because my gmail account was hacked. At that time, I was using the same password everywhere, password rules permitting. Most likely what happened was one of my forum accounts was hacked, giving the hacker access to my password and registered email address. I'm not sure how secure forum software is, or how user information is stored in its database, but I think it's far more likely my information was stolen from there rather than a bank, for example.

You are correct that with a password manager all that stands between a hacker and all of my secure information is a single password. Yet I actually feel more secure with the password manager becuase the only place I ever enter my master password is at my home computer or on my smart phone. If I were to put the KeePass database inside a TrueCrypt volume (not sure if TrueCrypt supports android yet), that would add yet another layer of protection.

No security system is perfect, but I feel safer with the system I have now than the one I had before.
 

Gooberlx2

Lifer
May 4, 2001
15,381
6
91
It seems like it would be much easier to crack a 10 character password than it would be to bypass the password and try and break the AES + twofish encryption to access the data.

When you start making complex passwords that are, say, 24 characters long, mixed case, using alphanumeric and special characters, it's going to take any brute forcing tools ages to break (until parallel/quantum computing is a reality...and affordable).

Take a phrase: "Clifford the big red dog is huge!" and turn it in to cliff0rDth#biGr#dd0GiShug#!.

That's 27 mixed alphanumeric and special characters, and still easy to remember. All I did was capitalize the last letter of each word and substitute o=0, e=# -- but I'd say that's a pretty secure password. According to the tool here, at 17 billions tries per hour per machine, it would take ~1.81 Quintillion years to crack with 100,000 machines processing.

As mentioned, enabling two-factor authentication for your google account will improve its security. Most bank websites I've used require this.
 
Last edited:

beginner99

Diamond Member
Jun 2, 2009
5,223
1,598
136
I think that your premise of using the same complex password everywhere is not a good one and here is why:
If somehow the password were to be leaked or broken into as a result of being stored in an insecure fashion on a website, then you're screwed. I think it's best to use a unique password in as many places as possible.

Well if someone steals my password I have here, how would he know on which other sites I have accounts? And why would that hacker guy concentrate on my accoutn in the first place?

I originally switched to KeePass because my gmail account was hacked. At that time, I was using the same password everywhere, password rules permitting. Most likely what happened was one of my forum accounts was hacked, giving the hacker access to my password and registered email address. I'm not sure how secure forum software is, or how user information is stored in its database, but I think it's far more likely my information was stolen from there rather than a bank, for example.

You are correct that with a password manager all that stands between a hacker and all of my secure information is a single password. Yet I actually feel more secure with the password manager becuase the only place I ever enter my master password is at my home computer or on my smart phone. If I were to put the KeePass database inside a TrueCrypt volume (not sure if TrueCrypt supports android yet), that would add yet another layer of protection.

No security system is perfect, but I feel safer with the system I have now than the one I had before.




While i said i use the same password everywhere I don't. But for anonymous forums like this and others it's just easier to have 1 common password. And what to I care if someone steals my account here?

There are 2 important passwords: The one for online banking and the one for your email. Because in the email the attacker will potential see on which forums etc, you are registered and can just let the site send a new password.
(ok you can also add other stuff like facebook. Don't want that to be hacked easily)

My email is different, this is a no brainer, I mean anyone could setup a forum and then read out email address and password and check if they match or in the case the site is hacked, thats probably what the attacker will try...


And online banking is a no brainer too, obviously. But there you have additional measures.
 
sale-70-410-exam    | Exam-200-125-pdf    | we-sale-70-410-exam    | hot-sale-70-410-exam    | Latest-exam-700-603-Dumps    | Dumps-98-363-exams-date    | Certs-200-125-date    | Dumps-300-075-exams-date    | hot-sale-book-C8010-726-book    | Hot-Sale-200-310-Exam    | Exam-Description-200-310-dumps?    | hot-sale-book-200-125-book    | Latest-Updated-300-209-Exam    | Dumps-210-260-exams-date    | Download-200-125-Exam-PDF    | Exam-Description-300-101-dumps    | Certs-300-101-date    | Hot-Sale-300-075-Exam    | Latest-exam-200-125-Dumps    | Exam-Description-200-125-dumps    | Latest-Updated-300-075-Exam    | hot-sale-book-210-260-book    | Dumps-200-901-exams-date    | Certs-200-901-date    | Latest-exam-1Z0-062-Dumps    | Hot-Sale-1Z0-062-Exam    | Certs-CSSLP-date    | 100%-Pass-70-383-Exams    | Latest-JN0-360-real-exam-questions    | 100%-Pass-4A0-100-Real-Exam-Questions    | Dumps-300-135-exams-date    | Passed-200-105-Tech-Exams    | Latest-Updated-200-310-Exam    | Download-300-070-Exam-PDF    | Hot-Sale-JN0-360-Exam    | 100%-Pass-JN0-360-Exams    | 100%-Pass-JN0-360-Real-Exam-Questions    | Dumps-JN0-360-exams-date    | Exam-Description-1Z0-876-dumps    | Latest-exam-1Z0-876-Dumps    | Dumps-HPE0-Y53-exams-date    | 2017-Latest-HPE0-Y53-Exam    | 100%-Pass-HPE0-Y53-Real-Exam-Questions    | Pass-4A0-100-Exam    | Latest-4A0-100-Questions    | Dumps-98-365-exams-date    | 2017-Latest-98-365-Exam    | 100%-Pass-VCS-254-Exams    | 2017-Latest-VCS-273-Exam    | Dumps-200-355-exams-date    | 2017-Latest-300-320-Exam    | Pass-300-101-Exam    | 100%-Pass-300-115-Exams    |
http://www.portvapes.co.uk/    | http://www.portvapes.co.uk/    |