Which is more secure winrar or bitlocker?

Status
Not open for further replies.

Hulk

Diamond Member
Oct 9, 1999
4,374
2,251
136
I have been using winrar to secure my important files for quite a few years now and I am thinking about moving over to bitlocker. Assuming both are using a sufficiently hardened key which is more secure?

It would be nice not to have to decrypt/encrypt these files when I need to access/modify them. But I've heard that winrar is nearly unbreakable. And I don't want to have to stress if I lose my USB Flashdrive with all my stuff on it someday. Or my laptop gets stolen...
 

Ayah

Platinum Member
Jan 1, 2006
2,512
1
81
Google says winrar uses 128-bit AES and that bitlocker can use 256-bit AES.

Have you considered TrueCrypt using something like AES-Twofish-Serpent?

There isn't really a way to secure files and be able to access/modify them without decryption as far as I know.
 

Jeff7

Lifer
Jan 4, 2001
41,599
19
81
http://rarsoft.com/rar_archiver.htm
Yup, 128-bit AES encryption.


WinRAR supports files and archives up to 8,589 billion gigabytes in size.
So if you ever want to compress and encrypt everything humanity currently knows, WinRAR can do it.

TrueCrypt with 3-layer encryption: Yes, this is probably your best bet for keeping data secure. Protect it with a nice, long password too.
Heck, I think aaaaaaaaaa10aaaaaaaaaa would be a pretty touch password to crack. 22 characters long, but the person doing the cracking of the file doesn't know that, nor do they know its composition.

Or this one could work as a password:
"Have fun cracking this password without a quantum computer. "

59 characters.

(TrueCrypt "only" supports 64 characters for a password, so mind your sentence length. )
 

Hulk

Diamond Member
Oct 9, 1999
4,374
2,251
136
I read something about doing a memory dump with Bitlocker and then being able to find the key. Is this possible with TrueCrypt or Winrar?
 

Mark R

Diamond Member
Oct 9, 1999
8,513
14
81
Yes. It is always possible to dump memory and find an encryption key if it currently held in RAM.

In the case of something like WinRAR where you need to enter the password every time you decrypt/encrypt a file, the key is likely erased from memory after it is finished with. (You'd hope it was, but WInRAR is closed source, so this isn't independently known).

With bitlocker, the key has to be held in RAM while the OS is running, so that files can be immediately decrypted/encrypted.

If you use a hacking technique to dump RAM (e.g. use a firewire hacking tool - an oversight during the design process of firewire, allows a firewire peripheral direct access to system RAM, bypassing all OS and CPU RAM protection systems. You can now buy tools that use this). A dongle containing a hard drive is connected to a firewire port and a button pressed on the dongle. The Dongle reads the entire host system RAM and saves it to a hard-drive connected to the dongle. You can then use a forensic analysis tool to examine the snapshot and recover encryption keys - e.g. there are commercially available (under $500) tools that can scan a snapshot file and retrieve bitlocker keys. Theoretically, the same could be done with Truecrypt, but I don't know if any commercial tools are available for it - although I'm sure certain consultancy firms could provide a custom tool, or extract truecrypt keys manually from a dump, for a price.

If you really are handling highly confidential information, firewire ports are a massive security hole. If you don't need them for work, keep them disconnected or fill them with glue to deactivate them.

As to encryption techniques:
AES-128 is known to be very strong, and is overkill for any conceivable commercial and most government needs. The algorithm is sufficiently simple that it has been subject to very extensive analysis with no real significant weaknesses.

AES-256 is similar to AES-128, but it was designed rather as an afterthought, and several weaknesses have been discovered in the bit of algorithm changed between 128 and 256. It is still thought to be at least as strong as AES-128 in all cases. However, because of the more complex algorithm, it has had less extensive analysis than AES-128.

As AES-128's strength is already ludicrous overkill, and the algorithm is simpler and has been most thoroughly analysed, there's a lot to be said for preferring AES-128 over AES-256. There is little benefit in going to AES-256 from AES-128. AES-128 is already such extreme overkill that any additional theoretical strength from AES-256 is negligible when compared to other unrelated security issues (e.g. a hidden microphone picking up the sounds of you typing your password, and allowing a listener to decode the password from the sound).

The same goes for multi-algorithm encryption or the use of alternative algorithms in software such as TrueCrypt. Twofish is arguably a significantly better algorithm than AES (Twofish was a finalist against AES in the competition, but AES won because it was simpler and better suited to smart-cards and ultra-low power mobile devices/RFID chips). However, most security experts would advise the use of AES rather than Twofish (even the inventors of Twofish recommend this), for the simple reason that AES has been better examined and investigated, and no relevant defects have been found despite this intense scrutiny.
 
Last edited:

Hulk

Diamond Member
Oct 9, 1999
4,374
2,251
136
Mark R,

Thanks so much for the detailed information. Exactly what I was looking for. I"m going to stay with Winrar.
 

intx13

Member
Apr 3, 2013
33
0
0
Any time you're looking at encryption solutions, you have to start by defining the threat-level against which you want to defend. For most of us mere mortals, the choice of cipher is more or less irrelevant unless you think somebody is really going to try and crack your encryption.

Far more important to most of us is ease-of-use, speed, cross-system support, and deniability. So go with what's available on all the operating systems you like to use, works quick, doesn't get in your way, and doesn't shout "HEY THIS GUY IS ENCRYPTING STUFF". If it uses any modern popular cipher under the hood, it's probably good enough from a cryptography standpoint, unless you're really concerned about state level threats.
 

Hulk

Diamond Member
Oct 9, 1999
4,374
2,251
136
As I wrote above, the threat level is losing or having my laptop stolen and being able to sleep at night afterward.
 

Mark R

Diamond Member
Oct 9, 1999
8,513
14
81
As I wrote above, the threat level is losing or having my laptop stolen and being able to sleep at night afterward.

In reality, any choice would be adequate.

However, depending on what type of confidential data you use and how you use it, there are advantages to using a full disk encryption system such as bitlocker.

If you use a tool such as winrar for temporary storage, rather than archiving and transport, then you introduce a potential security problem. Winrar is not transparent, in that you need to decompress/decrypt files onto a local drive for access. Even though you may delete the temporary clear file after use, traces may remain on the hard drive (either through recycle bin, or within deallocated sectors on the hard drive).

The advantage of bitlocker in this circumstance is that everything gets encrypted, even temporary files, page file, etc.
 

Gargen

Golden Member
May 13, 2008
1,435
0
71
Any time you're looking at encryption solutions, you have to start by defining the threat-level against which you want to defend. For most of us mere mortals, the choice of cipher is more or less irrelevant unless you think somebody is really going to try and crack your encryption.

Far more important to most of us is ease-of-use, speed, cross-system support, and deniability. So go with what's available on all the operating systems you like to use, works quick, doesn't get in your way, and doesn't shout "HEY THIS GUY IS ENCRYPTING STUFF". If it uses any modern popular cipher under the hood, it's probably good enough from a cryptography standpoint, unless you're really concerned about state level threats.

Reminds me of this: http://xkcd.com/538/
 
Status
Not open for further replies.
sale-70-410-exam    | Exam-200-125-pdf    | we-sale-70-410-exam    | hot-sale-70-410-exam    | Latest-exam-700-603-Dumps    | Dumps-98-363-exams-date    | Certs-200-125-date    | Dumps-300-075-exams-date    | hot-sale-book-C8010-726-book    | Hot-Sale-200-310-Exam    | Exam-Description-200-310-dumps?    | hot-sale-book-200-125-book    | Latest-Updated-300-209-Exam    | Dumps-210-260-exams-date    | Download-200-125-Exam-PDF    | Exam-Description-300-101-dumps    | Certs-300-101-date    | Hot-Sale-300-075-Exam    | Latest-exam-200-125-Dumps    | Exam-Description-200-125-dumps    | Latest-Updated-300-075-Exam    | hot-sale-book-210-260-book    | Dumps-200-901-exams-date    | Certs-200-901-date    | Latest-exam-1Z0-062-Dumps    | Hot-Sale-1Z0-062-Exam    | Certs-CSSLP-date    | 100%-Pass-70-383-Exams    | Latest-JN0-360-real-exam-questions    | 100%-Pass-4A0-100-Real-Exam-Questions    | Dumps-300-135-exams-date    | Passed-200-105-Tech-Exams    | Latest-Updated-200-310-Exam    | Download-300-070-Exam-PDF    | Hot-Sale-JN0-360-Exam    | 100%-Pass-JN0-360-Exams    | 100%-Pass-JN0-360-Real-Exam-Questions    | Dumps-JN0-360-exams-date    | Exam-Description-1Z0-876-dumps    | Latest-exam-1Z0-876-Dumps    | Dumps-HPE0-Y53-exams-date    | 2017-Latest-HPE0-Y53-Exam    | 100%-Pass-HPE0-Y53-Real-Exam-Questions    | Pass-4A0-100-Exam    | Latest-4A0-100-Questions    | Dumps-98-365-exams-date    | 2017-Latest-98-365-Exam    | 100%-Pass-VCS-254-Exams    | 2017-Latest-VCS-273-Exam    | Dumps-200-355-exams-date    | 2017-Latest-300-320-Exam    | Pass-300-101-Exam    | 100%-Pass-300-115-Exams    |
http://www.portvapes.co.uk/    | http://www.portvapes.co.uk/    |