Shattring Your Secrets: Coercion-Resistant Full Disk Encryption, and More!

Presented at ToorCon San Diego 16 (2014), Oct. 25, 2014, noon (50 minutes)

Law enforcement organizations are increasingly performing warrantless searches of electronic devices. While strong, whole-disk encryption can prevent them from easily obtaining your data, they may try to coerce you (or possibly even legally compel you) to hand over your decryption keys. This talk introduces a tool, called Shattr, that lets you avoid this situation altogether by making it technically impossible to comply. Instead, your keys are “shattered” into shards and distributed among trusted friends, potentially across diverse legal jurisdictions. Then, when you safely arrive at your destination, you can use a secure ephemeral communication system (such as one based on ZRTP) to retrieve shards of your key. Using the magic of Shamir Secret Sharing, only a predetermined number of shards are needed to recover the entire key, but any less than that reveals no information about the key. Of course, m-of-n threshold secret sharing is useful for much more than protecting your hard drive from prying eyes. An organization could use it to safely back up their keys for disaster recovery by distributing the shards among executives or board members. Or they could use it to require the cooperation of multiple people to digitally sign data. In fact, ICANN uses threshold secret sharing to sign the DNS root zone and back up the key! This talk will introduce Shattr, a web site (and static HTML file) that makes it easy to shatter your secrets. I’ll cover some of the design decisions and security considerations, including why I don’t think it’s a horrible idea to make this as a web app. I’ll also briefly cover the theory behind Shamir Secret Sharing. Finally, I’ll conclude with a few demos of Shattr covering a handful of different applications.


Presenters:

  • Karl Koscher / supersat as Karl Koscher
    Karl Koscher is a freshly minted PhD from the University of Washington where he specialized in embedded systems security. He is now continuing his research on embedded systems security as a postdoc at the University of California San Diego.

Similar Presentations: