Reply to post: Re: TPM and Bitlocker

Microsoft brings Trusted Platform Module functionality directly to CPUs under securo-silicon architecture Pluton

Norman Nescio Silver badge

Re: TPM and Bitlocker

TPM Bitlocker is meant to block physical transplanting of the drive (think an Evil Maintenance Guy attack), and if set accordingly there's no way to bypass it. If it isn't in the same machine as that specific TPM, it's no-go, full stop.

That's not actually completely correct. If you have the Volume Master Key (or indeed the Full Volume Encryption Key), you can decrypt the storage device without the TPM.

The Full Volume Encryption Key (FVEK) is encrypted with the Volume Master Key (VMK) , and stored on the storage device. What's more, if you have a recovery key enabled, then the Volume Master Key is encrypted with the Recovery Key and stored on the storage device. So far, no TPM involvement.

So if you have the FVEK, you can decrypt the device.

If you have the VMK, you can decrypt the device.

If you know the recovery key (and that function is enabled), you can decrypt the device.

All without the TPM.

Getting hold of the above is quite possibly difficult, but not impossible.

Pulse Security: Extracting BitLocker keys from a TPM

Elcomsoft: Unlocking BitLocker: Can You Break That Password?

Note that:

If you have a modern device that supports automatic device encryption, the recovery key will most likely be in your Microsoft account. For more, see Device encryption in Windows 10.

From: Microsoft: Finding your BitLocker recovery key in Windows 10

So getting hold of your storage device's recovery key could be 'as simple' as compromising your Microsoft Account.

NN

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon