Is USB based bitlocker as safe as tpm based?

1

1

My computer doesn't have TPM

There is an option to turn on bitlocker if only I used USB to store the private key

How would security be affected on that scenario?

will it be as safe as TPM?

If my house got raided by FBI or syariah cops, for example, and they found the USB but doesn't know my windows password, will my data be okay?

If I rarely shut down my computer and only put them to sleep, can I just hide the USB somewhere?

Also how do I explain this

On computers without a compatible TPM, BitLocker can provide encryption, but not the added security of locking keys with the TPM. In this case, the user is required to create a startup key that is stored on a USB flash drive.

http://windows.microsoft.com/en-id/windows-vista/bitlocker-drive-encryption-overview

user4951

Posted 2014-09-11T12:20:51.320

Reputation: 3 015

Answers

2

The USB stick would still need to be used in conjunction with the bitlocker password to decrypt the drive, all the TPM module does is store it on the module so you have no need to carry an easily lost USB stick.

if you don't tell them your Bitlocker password you are just as protected

Fegnoid

Posted 2014-09-11T12:20:51.320

Reputation: 839

But then FBI can get my private key on the USB? – user4951 – 2014-09-11T12:48:29.583

Can anyone confirm this? – user4951 – 2014-09-11T12:48:57.780

Yes they can get your private key, so one in sense its not as secure as TPM but in another sense without the password its just as secure... – CharlesH – 2014-09-11T12:50:16.013

And once they got my private key, FBI can decrypt the drive with it right? – user4951 – 2014-09-11T12:57:29.280

Even though FBI doesn't know the password? – user4951 – 2014-09-11T12:57:52.263

No as the password needs to be used in conjuction with the private key to decrypt the drive – Fegnoid – 2014-09-11T12:58:56.377

Can anyone verify this? Do you have source> – user4951 – 2014-09-11T16:17:56.243

Can anyone verify this? I just bitlock my operating system. However, nowhere is stated that I need password. The key is in the USB and there is no password. – user4951 – 2014-09-12T05:04:14.647

There is no password involved if you bitlock your operating system partition!!!!! – user4951 – 2014-09-12T05:19:34.100

Hmm, it asked me for a password - but I have a TPM module on my laptop - and when I did it to my desktop (just now) that doesn't have one it also asked for a password – Fegnoid – 2014-09-12T07:43:23.663

0

The security model is different. (This answer is a work in progress.)

Startup key on USB flash drive

Pros:

  • No need for a TPM.
  • 2FA: user needs both the startup key (stored on a USB flash drive by default) and the PC, in order to decrypt the system disk.

Cons:

  • You might accidentally overwrite or format your USB flash drive, requiring you to manually enter the recovery key in order to be able to boot Windows. This risk can be mitigated by using a USB flash drive with hardware write-protection.
  • If your USB flash drive is lost or stolen, then an attacker who comes into possession of it can read (and copy) the startup key from it. This particular attack can be mitigated by using a hardware-encrypted USB flash drive (e.g. this; there are other brands available).
  • If your PC is sufficiently compromised, then an attacker could potentially read the startup key from your USB flash drive while it is inserted into the PC during the boot process. This will be true even for hardware-encrypted USB flash drives, as they must be unlocked in order for the PC to boot. However, if your PC were compromised to this extent, then whoever compromised it would probably already be in a position to read everything that BitLocker is protecting, i.e. the startup key would probably be superfluous for them.

TPM

Pros:

  • No need to purchase a USB flash drive.
  • No risk of that USB flash drive being lost or stolen.
  • Unlike USB flash drives, TPMs are intended to prevent the private data that they store from being read. Instead, they use challenge-response mechanisms. As such, an attacker without advanced skills or equipment will not be able to retrieve the private key from a TPM.

Cons:

  • Attackers with advanced skills or equipment, and with electronic or physical access to the PC, may be able to retrieve the private key from a TPM, e.g. by:

  • Attackers with sufficiently advanced skills may be able to fool the TPM into performing the challenge-response successfully even if Windows has been modified by an attacker. (This is more of an attack against "secure boot" than against BitLocker per se.) However, if your PC were compromised to this extent, then whoever compromised it might already be in a position to read everything that BitLocker is protecting.
  • If you move the BitLocker-protected drive to another PC, you will need to manually enter the recovery key.

sampablokuper

Posted 2014-09-11T12:20:51.320

Reputation: 2 389

0

No "USB-based Bitlocker encrypted drive"[1] is not as secure as encrypting a drive with a TPM& because:

Contrary to earlier (expired?) answers, Bitlocker without TPM does not work with multi-factors. So a start-up key on a USB and a Bitlocker password are two independent access 'keys' to the drive. You only need one to unlock the drive.

Such keys are called 'protectors'. For a system drive different protectors are available than for a data drive. An OS drive can have a start-up key. Since a data drive is not booted from, one can use a 'RecoveryKey' protector in that case. Both create a *.bek file which according to the following command...

manage-bde -protectors -add -help

... can be used interchangeably, because they are both 'External Keyfile' protectors. The command will list all possible protectors. (Passwords, SmartCards, Keyfiles, TPM, etc.)

Why is TPM more secure?

Because with a TPM you can add a protector that in itself is depended on multiple 'secrets'. Possible options:

  • TPMAndPIN
  • TPMAndStartupKey
  • TPMAndPINAndStartupKey
  • TPM

The first 3 are in a way mimicking multi-factor behaviour, though the TPM part is bound to the machine and not mobile.


The USB-based experiences were based on a system without TPM. If a booting system sees no USB drive with startup key during startup, Bitlocker will ask you to enter the password, provided a 'Password-protector' exists. If it sees the startup-key, it will simply boot Windows. A USB-drive with LED will allow you to verify if the system if even reading the USB-drive; some USB-ports might not be active pre-boot unless you tweak some bios settings.

Conclusion

If you encrypt the drive with a -TPM only, it only protects the drive if the drive itself is moved to another machine. Anyone can boot the original machine, no additional secrets are required. This would be almost equivalent to the situation of having a USB-drive for non-TPM machines stuck into the USB-port.

If you use -TPMAndPIN you will need to enter a PIN during boot which will be more secure than having a non-TPM USB-drive variant, because the secret is something you know, not something you have; provided your PIN is not your birthday and long.

For the record, you cannot use a TPM for a data drive. But you can daisy-chain drives to the original TPM-protected OS drive.

It is recommended to add more than one protector in case you loose or forget the primary. A Numerical Password (-RecoveryPassword) could be saved in safe location.

If you have only access to a non-TPM system: Configure a Yubikey with a long static-password 25-30 chars. Use that password in addition with something you concatenate before or after the static password (5-10) as a password protector for Bitlocker. This mimics multi-factor authentication, though for purists it is not real MFA.


[1] = from topic starter: drive encrypted with Bitlocker without TPM and with start-up key on USB-drive.

I used the word 'drive'; you may read this as 'partition' as Bitlocker is enabled per partition, not per drive.


https://docs.microsoft.com/nl-nl/windows/security/information-protection/bitlocker/bitlocker-device-encryption-overview-windows-10

A71

Posted 2014-09-11T12:20:51.320

Reputation: 392