Written: 2nd January 2000
Last updated: 24th January 2000
Since ScramDisk creates two copies of a key part of each volume it creates within the volume file, it is possible to "reset" the passwords on a ScramDisk volume to whatever they were when the volume was originally created.
When ScramDisk creates a new volume, it generates a random "master key" which is used for encrypting/decrypting data read/written to the volume. This master key is encrypted with the user's password(s), and then two copies of the encrypted master key are then written to the volume file. The first starting from offsets 0x0000 (0 decimal) within the volume, and the second from 0x1800 (6144 decimal). The size is 1024 bytes for initialization vectors and whitening values plus the encryption key length.
When the user changes their password(s), only the first copy of the encrypted master key is re-encrypted with the new password(s) before being written back to the volume file.
This raises a serious security problem; it is trivial for an attacker to swap the two key blocks around, and mount the volume using the original password(s) used when the volume was originally created.
Additionally, it is quite possible (and indeed probable) that some users first starting out with ScramDisk, may initially have created one or more volume files to try the software out with, and see how ScramDisk works. Since any such volumes would obviously not be used to secure any valuable information, a simple "low security", easily remembered password may well have been used (for example, the word "password" may have been used). Later, the same user may have gained enough confidence in ScramDisk to warrant changing the password to something more secure (e.g. a random collection of alphanumeric characters), before writing sensitive information to the volume, and generally trusting ScramDisk to secure their data.
Having done so, and beginning to use the encrypted volume more seriously, the user may mistakenly believe that after changing the original "low security" password, their data is safe, while not realising that it is still possible to access the volume by swapping the two key blocks over, and then using the original password.
It should be noted that ".WAV" files with ScramDisk data do not have this second table, and are therefore do not have this problem.
An explanation as to why this error in ScramDisk occured is perhaps best given by the author:
"The only reason the backup data was not updated on password changes is because of an oversight on my part, when I added password changes, which (v)2.00 did not support."- Aman
Optional: Try to mount the volume using "password ONE" as the password. Observe that this password will not work.
The (1024+32) bytes at offsets 0x000 and 0x1800 will then be swapped over
Workaround: There are two ways of addressing this problem:
Do remember to destroy your note of the original passwords afterwards!
Please see also ScramDisk Volumes Can Contain Duplicate Information
Email me at: sdean12@mailcity.com
Return to the Attacking OTFE; Known Security Flaws in Certain OTFE Systems page