Rubberhose (file system)

In computing, rubberhose (also known by its development codename Marutukku)[1] is a deniable encryption archive containing multiple file systems whose existence can only be verified using the appropriate cryptographic key.

Name and history

The project was originally named Rubberhose, as it was designed to be resistant to attacks by people willing to use torture on those who knew the encryption keys. This is a reference to the rubber-hose cryptanalysis euphemism.

It was written in 1997–2000 by Julian Assange, Suelette Dreyfus, and Ralf Weinmann.[2][3]

Technical

The following paragraphs are extracts from the project's documentation:

Rubberhose works by initially writing random characters to an entire hard drive or other dynamic storage device. This random noise is indistinguishable from the encrypted data to be stored on that disk. If you have a 1 GB drive and want to have two Rubberhose encrypted portions of 400 MB and 200 MB, it assumes that each aspect (as the encrypted partitions are called) will be 1 GB and fill the entire drive. It will keep doing this until the drive is really filled to capacity with encrypted material. It breaks up the pieces of each aspect into small pieces and scatters them across the entire 1 GB drive in a random manner, with each aspect looking as if it is actually 1 GB in size upon decryption.

Each aspect has its own passphrase that must be separately decrypted, and if a hard drive is seized neither mathematical analysis nor physical disk testing can reveal how many aspects actually exist. Internal maps are used to locate where the data is stored amongst the random characters, with each aspect having its own map which can only be decrypted via its specific passphrase. Therefore, a Rubberhose disk can only be safely written to after all the passphrases have been entered. Everything works on a "need to know" basis, i.e. each aspect knows nothing about the others other than when to avoid writing over the top of another.

Status

Rubberhose is not actively maintained, although it is available for Linux kernel 2.2, NetBSD and FreeBSD. The latest version available, still in alpha stage, is v0.8.3.[4]

gollark: You likely *don't* have a disk with that.
gollark: But only on this server! And you can turn it back on!
gollark: I had to turn off the spread to floppies thing after 3d6 complained.
gollark: Oh, that, yes.
gollark: That's not network *boot*.

See also

References

  1. Suelette Dreyfus (2012-10-29). "The Idiot Savants' Guide to Rubberhose". Archived from the original on 2012-10-29.
  2. Ralf Weinmann biography at https://cryptolux.org/Ralf-Philipp_Weinmann Archived September 29, 2011, at the Wayback Machine
  3. "Rubberhose cryptographically deniable transparent disk encryption system". Archived from the original on September 15, 2010. Retrieved 21 October 2010.
  4. https://web.archive.org/web/20120716034441/http://marutukku.org/
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.