BitLocker
Screenshot of the BitLocker Drive Encryption utility
Other namesDevice Encryption
DeveloperMicrosoft
Initial releaseNovember 30, 2006 (2006-11-30)
Operating systemWindows Vista and later
TypeDisk encryption software
Websitelearn.microsoft.com/en-us/windows/security/operating-system-security/data-protection/bitlocker/ 

BitLocker is a full volume encryption feature included with Microsoft Windows versions starting with Windows Vista. It is designed to protect data by providing encryption for entire volumes. By default, it uses the Advanced Encryption Standard (AES) algorithm in cipher block chaining (CBC) or "xor–encrypt–xor (XEX)-based tweaked codebook mode with ciphertext stealing" (XTS) mode[1] with a 128-bit or 256-bit key.[2][3] CBC is not used over the whole disk; it is applied to each individual sector.[3]

History

BitLocker originated as a part of Microsoft's Next-Generation Secure Computing Base architecture in 2004 as a feature tentatively codenamed "Cornerstone"[4][5] and was designed to protect information on devices, particularly if a device was lost or stolen. Another feature, titled "Code Integrity Rooting", was designed to validate the integrity of Microsoft Windows boot and system files.[4] When used in conjunction with a compatible Trusted Platform Module (TPM), BitLocker can validate the integrity of boot and system files before decrypting a protected volume; an unsuccessful validation will prohibit access to a protected system.[6][7] BitLocker was briefly called Secure Startup before Windows Vista's release to manufacturing.[6]

BitLocker is available on:

Features

manage-bde
DeveloperMicrosoft
Initial releaseJanuary 30, 2007 (2007-01-30)
Operating systemMicrosoft Windows
TypeCommand
LicenseProprietary commercial software
Websitemanage-bde

Initially, the graphical BitLocker interface in Windows Vista could only encrypt the operating system volume.[13] Starting with Windows Vista with Service Pack 1 and Windows Server 2008, volumes other than the operating system volume could be encrypted using the graphical tool. Still, some aspects of the BitLocker (such as turning autolocking on or off) had to be managed through a command-line tool called manage-bde.wsf.[14]

The version of BitLocker included in Windows 7 and Windows Server 2008 Release 2 adds the ability to encrypt removable drives. On Windows XP or Windows Vista, read-only access to these drives can be achieved through a program called BitLocker To Go Reader, if FAT16, FAT32 or exFAT filesystems are used.[15] In addition, a new command-line tool called manage-bde replaced the old manage-bde.wsf.[16]

Starting with Windows Server 2012 and Windows 8, Microsoft has complemented BitLocker with the Microsoft Encrypted Hard Drive specification, which allows the cryptographic operations of BitLocker encryption to be offloaded to the storage device's hardware, for example, self-encrypting drives.[17][18] In addition, BitLocker can now be managed through Windows PowerShell.[19] Finally, Windows 8 introduced Windows To Go in its Enterprise edition, which BitLocker can protect.[20]

Device encryption

Windows Mobile 6.5, Windows RT and core editions of Windows 8.1 include device encryption, a feature-limited version of BitLocker that encrypts the whole system.[21][22][23] Logging in with a Microsoft account with administrative privileges automatically begins the encryption process. The recovery key is stored to either the Microsoft account or Active Directory (Active Directory requires Pro editions of Windows), allowing it to be retrieved from any computer. While device encryption is offered on all editions of Windows 8.1, unlike BitLocker, device encryption requires that the device meet the InstantGo (formerly Connected Standby) specifications,[23] which requires solid-state drives and a TPM 2.0 chip.[21][24]

Starting with Windows 10 1703, the requirements for device encryption have changed, requiring a TPM 1.2 or 2.0 module with PCR 7 support, UEFI Secure Boot, and that the device meets Modern Standby requirements or HSTI validation.[25]

Device encryption requirements were relaxed in Windows 11 24H2, with the Modern Standby, HSTI and Secure Boot compliance no longer required and the DMA interfaces blocklist removed.[26] And device encryption will be enabled by default by clean installation of Windows 11 24H2, called auto device encryption.[27]

In September 2019 a new update was released (KB4516071[28]) changing the default setting for BitLocker when encrypting a self-encrypting drive. Now, the default is to use software encryption for newly encrypted drives. This is due to hardware encryption flaws and security concerns related to those issues.[29]

Encryption modes

Three authentication mechanisms can be used as building blocks to implement BitLocker encryption:[30]

The following combinations of the above authentication mechanisms are supported, all with an optional escrow recovery key:

Operation

BitLocker is a logical volume encryption system. (A volume spans part of a hard disk drive, the whole drive or more than one drive.) When enabled, TPM and BitLocker can ensure the integrity of the trusted boot path (e.g. BIOS and boot sector), in order to prevent most offline physical attacks and boot sector malware.[38]

In order for BitLocker to encrypt the volume holding the operating system, at least two NTFS-formatted volumes are required: one for the operating system (usually C:) and another with a minimum size of 100 MB, which remains unencrypted and boots the operating system.[38] (In case of Windows Vista and Windows Server 2008, however, the volume's minimum size is 1.5 GB and must have a drive letter.)[39] Unlike previous versions of Windows, Vista's "diskpart" command-line tool includes the ability to shrink the size of an NTFS volume so that this volume may be created from already allocated space. A tool called the BitLocker Drive Preparation Tool is also available from Microsoft that allows an existing volume on Windows Vista to be shrunk to make room for a new boot volume and for the necessary bootstrapping files to be transferred to it.[40]

Once an alternate boot partition has been created, the TPM module needs to be initialized (assuming that this feature is being used), after which the required disk-encryption key protection mechanisms such as TPM, PIN or USB key are configured.[41] The volume is then encrypted as a background task, something that may take a considerable amount of time with a large disk as every logical sector is read, encrypted and rewritten back to disk.[41] The keys are only protected after the whole volume has been encrypted when the volume is considered secure.[42] BitLocker uses a low-level device driver to encrypt and decrypt all file operations, making interaction with the encrypted volume transparent to applications running on the platform.[41]

Encrypting File System (EFS) may be used in conjunction with BitLocker to provide protection once the operating system is running. Protection of the files from processes and users within the operating system can only be performed using encryption software that operates within Windows, such as EFS. BitLocker and EFS, therefore, offer protection against different classes of attacks.[43]

In Active Directory environments, BitLocker supports optional key escrow to Active Directory, although a schema update may be required for this to work (i.e. if the Active Directory Services are hosted on a Windows version previous to Windows Server 2008).

BitLocker and other full disk encryption systems can be attacked by a rogue boot manager. Once the malicious bootloader captures the secret, it can decrypt the Volume Master Key (VMK), which would then allow access to decrypt or modify any information on an encrypted hard disk. By configuring a TPM to protect the trusted boot pathway, including the BIOS and boot sector, BitLocker can mitigate this threat. (Note that some non-malicious changes to the boot path may cause a Platform Configuration Register check to fail, and thereby generate a false warning.)[38]

Security concerns

TPM alone is not enough

The "Transparent operation mode" and "User authentication mode" of BitLocker use TPM hardware to detect whether there are unauthorized changes to the pre-boot environment, including the BIOS and MBR. If any unauthorized changes are detected, BitLocker requests a recovery key on a USB device. This cryptographic secret is used to decrypt the Volume Master Key (VMK) and allow the bootup process to continue.[44] However, TPM alone is not enough:

All these attacks require physical access to the system and are thwarted by a secondary protector such as a USB flash drive or PIN code.

Upholding Kerckhoffs's principle

Although the AES encryption algorithm used in BitLocker is in the public domain, its implementation in BitLocker, as well as other components of the software, are proprietary; however, the code is available for scrutiny by Microsoft partners and enterprises, subject to a non-disclosure agreement.[49][50]

According to Microsoft sources,[51] BitLocker does not contain an intentionally built-in backdoor, so there is no Microsoft-provided way for law enforcement to have guaranteed access to the data on a user's drive. In 2006, the UK Home Office expressed concern over the lack of a backdoor and tried entering into talks with Microsoft to get one introduced.[52] Microsoft developer and cryptographer Niels Ferguson denied the backdoor request and said, "over my dead body".[53] Microsoft engineers have said that United States Federal Bureau of Investigation agents also put pressure on them in numerous meetings to add a backdoor, although no formal, written request was ever made; Microsoft engineers eventually suggested that agents should look for the hard copy of the encryption key that the BitLocker program suggests that its users make.[54]

Niels Ferguson's position that "back doors are simply not acceptable"[53] is in accordance with Kerckhoffs's principle. Stated by Netherlands-born cryptographer Auguste Kerckhoffs in the 19th century, the principle holds that a cryptosystem should be secure, even if everything about the system, except the encryption key, is public knowledge.

Since 2014, BitLocker's method and data structure is public knowledge due to reverse engineering; the Linux dislocker program is capable of reading and writing BitLocker-protected drives given the key; since 2020, this can also be done with cryptsetup.[55][56]

Other concerns

Starting with Windows 8 and Windows Server 2012, Microsoft removed the Elephant Diffuser from the BitLocker scheme for no declared reason.[57] Dan Rosendorf's research shows that removing the Elephant Diffuser had an "undeniably negative impact" on the security of BitLocker encryption against a targeted attack.[58] Microsoft later cited performance concerns, and noncompliance with the Federal Information Processing Standards (FIPS), to justify the diffuser's removal.[59] Starting with Windows 10 version 1511, however, Microsoft added a new FIPS-compliant XTS-AES encryption algorithm to BitLocker.[1] Starting with Windows 10 version 1803, Microsoft added a new feature called "Kernel Direct Memory access (DMA) Protection" to BitLocker, to protect against DMA attacks via Thunderbolt 3 ports.[60][61] "Kernel Direct Memory access (DMA) Protection" only protects against attacks through Thunderbolt. Direct Memory Access is also possible through PCI Express. In this type of attack an attacker would connect a malicious PCI Express Device,[62] which can in turn write directly to the memory and bypass the Windows login. To protect against this type of attack, Microsoft introduced "Virtualization-based Security".[63][64]

In October 2017, it was reported that a flaw enabled private keys to be inferred from public keys, which could allow an attacker to bypass BitLocker encryption when an affected TPM chip is used.[65] The flaw is the Return of Coppersmith's Attack or ROCA vulnerability which is in a code library developed by Infineon and had been in widespread use in security products such as smartcards and TPMs. Microsoft released an updated version of the firmware for Infineon TPM chips that fixes the flaw via Windows Update.[66]

See also

References

  1. Hakala, Trudy (January 29, 2020). "What's new in Windows 10, versions 1507 and 1511". TechNet. Microsoft.
  2. "Windows BitLocker Drive Encryption Frequently Asked Questions". TechNet Library. Microsoft. March 22, 2012.
  3. Ferguson, Niels (August 2006). "AES-CBC + Elephant Diffuser: A Disk Encryption Algorithm for Windows Vista" (PDF). Microsoft.
  4. Biddle, Peter (2004). "Next-Generation Secure Computing Base". Microsoft. Archived from the original (PPT) on August 27, 2006.
  5. Thurrott, Paul (September 9, 2005). "Pre-PDC Exclusive: Windows Vista Product Editions". Supersite for Windows. Penton. Archived from the original on April 2, 2015.
  6. Microsoft (April 22, 2005). "Secure Startup–Full Volume Encryption: Technical Overview" (DOC).
  7. Microsoft (April 21, 2005). "Secure Startup – Full Volume Encryption: Executive Overview" (DOC).
  8. "What's New in BitLocker". TechNet Library. Microsoft. August 31, 2016.
  9. "BitLocker Drive Encryption in Windows Vista". TechNet. Microsoft. Archived from the original on November 17, 2016.
  10. "BitLocker Drive Encryption Overview". TechNet. Microsoft. November 17, 2009.
  11. "Compare Windows 10 Editions". Windows for Business. Microsoft.
  12. "Finding your BitLocker recovery key in Windows". Windows support. Microsoft.
  13. Yegulalp, Serdar (August 7, 2007). "Vista's BitLocker Encryption". Computerworld.
  14. Hynes, Byron (September 8, 2016). "Advances in BitLocker Drive Encryption". TechNet Magazine. Microsoft.
  15. "Description of BitLocker To Go Reader". Microsoft. Archived from the original on September 24, 2019.
  16. "Enabling BitLocker by Using the Command Line". TechNet. Microsoft. September 12, 2012.
  17. "Encrypted Hard Drive". TechNet. Microsoft. August 31, 2016.
  18. "Encrypted Hard Drive Device Guide". MSDN. Microsoft. June 1, 2017.
  19. "BitLocker". TechNet. Microsoft.
  20. "Windows To Go: Frequently Asked Questions". TechNet. Microsoft. October 23, 2013.
  21. "Device Encryption". Device Encryption. Microsoft. November 18, 2015.
  22. Cunningham, Andrew (October 17, 2013). "Windows 8.1 includes seamless, automatic disk encryption—if your PC supports it". Ars Technica. Condé Nast.
  23. "Help protect your files with device encryption". Windows Help portal. Microsoft. Archived from the original on May 2, 2016.
  24. Thurrott, Paul (June 4, 2013). "In Blue: Device Encryption". Paul Thurrott's SuperSite for Windows. Penton Media. Archived from the original on June 9, 2013.
  25. "BitLocker drive encryption in Windows 10 for OEMs". docs.microsoft.com. November 16, 2018.
  26. "BitLocker drive encryption in Windows 11 for OEMs". learn.microsoft.com. May 22, 2024.
  27. "Microsoft confirms Windows 11 24H2 turns on Device Encryption by default". May 8, 2024.
  28. "September 24, 2019—KB4516071 (OS Build 16299.1420)". support.microsoft.com.
  29. Cimpanu, Catalin (November 5, 2018). "Flaws in self-encrypting SSDs let attackers bypass disk encryption". ZDNet.
  30. "BitLocker Drive Encryption". Data Encryption Toolkit for Mobile PCs: Security Analysis. Microsoft. April 4, 2007. Archived from the original on October 23, 2007.
  31. Dansimp. "Using BitLocker with other programs FAQ (Windows 10) - Windows security". docs.microsoft.com.
  32. "ProtectKeyWithTPM method of the Win32_EncryptableVolume class". MSDN Library. Microsoft. March 31, 2018.
  33. "ProtectKeyWithTPMAndPIN method of the Win32_EncryptableVolume class". MSDN Library. Microsoft. March 31, 2018.
  34. "ProtectKeyWithTPMAndPINAndStartupKey method of the Win32_EncryptableVolume class". MSDN Library. Microsoft. March 31, 2018.
  35. "ProtectKeyWithTPMAndStartupKey method of the Win32_EncryptableVolume class". MSDN Library. Microsoft. March 31, 2018.
  36. "ProtectKeyWithExternalKey method of the Win32_EncryptableVolume class". MSDN Library. Microsoft. March 31, 2018.
  37. "ProtectKeyWithNumericalPassword method of the Win32_EncryptableVolume class". MSDN Library. Microsoft. March 31, 2018.
  38. "BitLocker Drive Encryption in Windows 7: Frequently Asked Questions". TechNet. Microsoft. September 12, 2012.
  39. "Windows BitLocker Drive Encryption Step-by-Step Guide". TechNet. Microsoft. July 2, 2012.
  40. "Description of the BitLocker Drive Preparation Tool". Microsoft. December 21, 2011.
  41. Andrew, Bettany; Halsey, Mike (2013). Exam Ref 70-687: Configuring Windows 8 (1 ed.). Microsoft Press. p. 307. ISBN 978-0-7356-7392-2. OCLC 851209981.
  42. Jerry, Honeycutt (2012). Introducing Windows 8: An Overview for IT professionals. Microsoft. p. 121. ISBN 978-0-7356-7050-1. OCLC 819519777.
  43. Ou, George (February 28, 2007). "Prevent data theft with Windows Vista's Encrypted File System (EFS) and BitLocker". TechRepublic. CBS Interactive.
  44. Byron, Hynes (September 7, 2016). "Keys to Protecting Data with BitLocker Drive Encryption". TechNet Magazine. Microsoft.
  45. Halderman, J. Alex; Schoen, Seth D.; Heninger, Nadia; Clarkson, William; Paul, William; Calandrino, Joseph A.; Feldman, Ariel J.; Appelbaum, Jacob; Felten, Edward W (February 21, 2008). Lest We Remember: Cold Boot Attacks on Encryption Keys (PDF) (Thesis). Princeton University.
  46. "Systems and methods for safely moving short term memory devices while preserving, protecting and examining their digital data".
  47. "Microsoft Security Bulletin MS15-122 – Important". Security TechCenter. Microsoft. October 11, 2017.
  48. "From Stolen Laptop to Inside the Company Network". Dolos Group. July 28, 2021. Archived from the original on May 8, 2024.
  49. Thurrott, Paul (June 10, 2015). "No Back Doors: Microsoft Opens Windows Source Code to EU Governments". Petri.
  50. "Shared Source Initiative". www.microsoft.com.
  51. "Back-door nonsense". System Integrity Team Blog. Microsoft. March 2, 2006.
  52. Stone-Lee, Ollie (February 16, 2006). "UK holds Microsoft security talks". BBC.
  53. Evers, Joris (March 6, 2006). "Microsoft: Vista won't get a backdoor". CNET. CBS Interactive.
  54. Franceschi-Bicchierai, Lorenzo (September 11, 2013). "Did the FBI Lean On Microsoft for Access to Its Encryption Software?". Mashable.
  55. Csaba, Fitzl (April 22, 2014), Using dislocker to mount bitlocker
  56. Trefny, Vojtech (January 25, 2020). BitLocker disk encryption on Linux (PDF). DevConf CZ.
  57. "BitLocker Overview". technet.microsoft.com. August 31, 2016.
  58. Rosendorf, Dan (May 23, 2013). "Bitlocker: A little about the internals and what changed in Windows 8" (PDF). Archived from the original (PDF) on May 3, 2020.
  59. Lee, Micah (June 4, 2015). "Microsoft Gives Details About Its Controversial Disk Encryption". The Intercept.
  60. "Blocking the SBP-2 driver and Thunderbolt controllers to reduce 1394 DMA and Thunderbolt DMA threats to BitLocker". Microsoft. November 7, 2018.
  61. "Kernel DMA Protection for Thunderbolt 3". Microsoft. March 26, 2019.
  62. "PCILeech". Ulf Frisk. June 6, 2024.
  63. "Securing BitLocker: Initial Setup and Defending Against Attacks". VidraSec. March 15, 2024.
  64. "PCILeech". Microsoft. March 20, 2023.
  65. Goodin, Dan (October 16, 2017). "Millions of high-security crypto keys crippled by newly discovered flaw". Ars Technica. Condé Nast.
  66. Busvine, Douglas (October 16, 2017). "Infineon says has fixed encryption flaw found by researchers". Reuters.
Wikibooks has a book on the topic of: Guide to Windows Commands