Jump to content

Talk:Cold boot attack

Page contents not supported in other languages.
From Wikipedia, the free encyclopedia

This is an old revision of this page, as edited by 65.65.222.162 (talk) at 08:57, 9 May 2008 (→‎False information?). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

WikiProject iconCryptography: Computer science Unassessed
WikiProject iconThis article is within the scope of WikiProject Cryptography, a collaborative effort to improve the coverage of Cryptography on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
???This article has not yet received a rating on Wikipedia's content assessment scale.
???This article has not yet received a rating on the importance scale.
Taskforce icon
This article is supported by WikiProject Computer science.

I think there should be a criticisms section. I know a lot of debate has been going on about this in the crypto community. Especially the TrueCrypt forums.

False information?

Coreect me if I'm wrong - but doesn't TPM use hardware? However, this article claims that this is a problem with hardware, therefore TPM is weak. Does this imply that TPM is not hardware? It seems to me that this is inaccurate information.  —CobraA1 05:08, 19 March 2008 (UTC)[reply]

No, the hardware that the problem is with is the memory, not the TPM. Socrates2008 (Talk) 06:02, 19 March 2008 (UTC)[reply]
Forgive me for being dense - but if the key is stored on the TPM rather than in memory, then how do they find the key?  —CobraA1 20:55, 19 March 2008 (UTC)[reply]
Unfortunately, you've got to retrieve the key from the TPM at some point and use it. (Decryption/encryption occurs in memory) Socrates2008 (Talk) 21:04, 19 March 2008 (UTC)[reply]
Okay, thanks for the clarification.  —CobraA1 21:25, 19 March 2008 (UTC)[reply]