博士生导师是什么级别| l1椎体在什么位置| 原浆是什么意思| bbs是什么意思| 高抬腿运动有什么好处| 虚恋是什么意思| 争辩的近义词是什么| 小儿病毒性感冒吃什么药效果好| 胸闷气短是什么原因引起的| 1971年是什么年| 三乙醇胺是什么东西| 痔疮最怕吃什么| 风疹病毒是什么| 酥油是什么做的| 彪子是什么意思| 瘦了是什么原因| 孕妇喝什么汤| 麻腮风是什么| 银花指什么生肖| 儿童查微量元素挂什么科| 11月29是什么星座| xswl是什么意思| 脚底痒是什么原因| 槐花蜜是什么颜色| 吃二甲双胍为什么会瘦| 为什么嘴唇发紫| apl是什么意思| 孕妇血压低吃什么能补上来| 氨气是什么| 生长激素由什么分泌| 7月1号是什么节日| 打呼噜挂什么科| 白带有血是什么原因| 绿豆跟什么一起煮最好| 3代表什么意思| 酒不醉人人自醉是什么意思| 出来混迟早要还的什么意思| 一戴套就软是什么原因| 虾头部黄黄的是什么| 公因数是什么意思| 五味子不适合什么人喝| 刺梨是什么水果| 泡脚时间长了有什么坏处| 老年人晚上夜尿多是什么原因| 卵巢囊肿吃什么药好得最快| 学的偏旁部首是什么| 什么牌子的冰箱好用又省电| 孕妇什么时候有奶水| 朋友生日送什么礼物| 树脂是什么材质| 12朵玫瑰代表什么意思| 什么叫柞蚕丝| 子宫颈肥大有什么危害| 高什么亮什么| dxm是什么药| 膀胱炎做什么检查能看出来| 小朋友喜欢玩什么| 手麻是什么引起的| 今年22岁属什么生肖| 舌炎吃什么药效果最好| b超检查前要注意什么| 张学良为什么被囚禁| 丁克族是什么意思| 女生第一次是什么感觉| 白萝卜煮水喝有什么功效| 荟字五行属什么| 小孩早上起床咳嗽是什么原因| 芒种是什么时候| 没有胎心胎芽是什么原因造成的| 小舌头学名叫什么| 梅毒是什么样的| 眩晕吃什么药好| 低血钾是什么原因引起的| 痛风吃什么蔬菜好| 链球菌感染是什么病| 尿酸低是什么意思| 如日中天的意思是什么| 上面一个四下面一个正念什么| 木梳子梳头有什么好处| 木瓜什么味道| 八髎区疼是什么原因| 床单是什么| 恐龙什么时候灭绝的| 宝宝干呕是什么原因| 静修是什么意思| 什么水果含硒量最高| 7月8号是什么日子| 日本豆腐是用什么做的| 银环蛇咬伤后什么症状| 式可以加什么偏旁| 马来西亚人为什么会说中文| 1999年发生了什么事| 孕妇腰疼是什么原因| 热毒吃什么药好得快| 黄芪什么季节喝最好| 夜不能寐什么意思| 眼睛看东西模糊是什么原因| 21三体高风险是什么意思| 喝豆浆拉肚子什么原因| 90岁叫什么| 障碍是什么意思| 阴壁有许多颗粒是什么原因| 甲状腺在什么位置| 乳头是什么| 元宵节有什么活动| 生产是什么意思| 散光是什么原因造成的| 蝗虫的呼吸器官是什么| 细菌性前列腺炎有什么症状| 什么是信念| 吃茶叶蛋有什么好处和坏处| 普陀山求什么最灵| 鸡拉白色稀粪吃什么药| 人生三件大事是指什么| 唾液是什么| 腋窝淋巴结肿大挂什么科| 尿亚硝酸盐阳性是什么意思| 马英九是什么生肖| 空调外机风扇不转是什么原因| 不是什么| 常吐痰是什么原因| 抗心磷脂抗体是什么| 鸳鸯浴是什么意思| 低钾会出现什么症状| 手淫过多会导致什么| 喇蛄和小龙虾什么区别| ca125是什么意思| 尖湿锐吃什么药最好| 老放屁吃什么药好| 阅后即焚什么意思| 飞机什么时候开始登机| 肾虚吃什么补| 动不动就出汗是什么原因| 混圈是什么意思| 什么饮料解渴| 非洲讲什么语言| 乳头痒是怎么回事是什么原因| 艾灸是什么| 拉抽屉是什么现象| 克罗心是什么意思| 鼹鼠吃什么| 夏季吃什么好| asia是什么意思| 自言自语是什么原因导致| 35年属什么生肖| 贼不走空什么意思| 红色的对比色是什么颜色| 闺蜜什么意思| 马牛羊鸡犬豕中的豕指的是什么| 五月出生是什么星座| 口腔异味吃什么药| 梦见滑雪是什么意思| mom是什么意思| 什么食物含铁量最高| 支气管扩张是什么意思| 喝中药能吃什么水果| 商量是什么意思| 棉是什么面料| 肌酐高是什么意思| 散光轴位是什么| 堂号是什么意思| 悟性高是什么意思| 做梦梦到吵架是什么意思| 吗啡是什么| 家里为什么突然有床虱| 发条是什么意思| 1997年属什么生肖年| 勾魂是什么意思| 什么叫细胞| 副部级是什么级别| 命格是什么意思| 出汗太多会对身体造成什么伤害| 荞麦长什么样子图片| 李商隐是什么朝代的| 贝壳像什么| 男命七杀代表什么| 神经过敏是什么意思| 检查尿酸挂什么科| 高傲什么意思| 什么叫间质性肺病| anxiety什么意思| 脸色发青是什么原因引起的| 总蛋白低是什么意思| 春茶是什么茶| 瘦的快是什么原因| 门可罗雀是什么意思| 麻腮风是什么| 枸杞不能和什么一起吃| 白脸红脸代表什么| 幻觉幻听是什么症状| 什么样的防晒霜比较好| 甲沟炎去医院挂什么科| 打歌是什么意思| 失去抚养权意味着什么| 阿司匹林什么时候吃| 荷花的寓意是什么| 黑豆加红枣有什么功效| 舌吻有什么好处| 天蝎座后面是什么星座| 猪八戒是什么生肖| 乙状结肠腺瘤是什么病| cr值是什么| 无缘是什么意思| 妇炎康片主要治什么妇科病| 气血不足吃什么东西| 糖尿病人能吃什么| 穿模是什么意思| 痱子粉什么牌子好| 中午吃什么| 震颤是什么症状| 孕妇梦见鱼是什么意思| 幼稚细胞是什么意思| 插肩袖是什么意思| 四月八日是什么星座| 脖子上长痘痘是什么原因| 老是打喷嚏是什么原因| 眼干眼涩眼疲劳用什么眼药水| 办离婚证需要带什么证件| 我低头向山沟是什么歌| 茶壶嘴为什么不能对着人| 很什么很什么| 为什么天空是蓝色的| 天天喝奶茶有什么危害| 裸车是什么意思| 什么阻力| 医院的特需门诊是什么意思| 吃什么水果能长高| 脑门疼是什么原因| 盐酸莫西沙星主治什么| 246是什么意思| 眼有眼屎是什么原因| nuxe是什么牌子护肤品| 什么情况做肠镜| 血小板压积偏低是什么原因| 1866年属什么生肖| 喉咙干燥吃什么药| 南瓜和什么食物相克| 头秃了一块是什么原因| 通草是什么| 偏袒是什么意思| 阿司匹林肠溶片治什么病| 右眼皮上长痣代表什么| 白带有血丝是什么情况| 游龙斑是什么鱼| 胃不好吃什么| 女人乳房疼是什么原因| 黑洞里面有什么| 1月26是什么星座| 三拜九叩是什么意思| 头昏脑涨是什么原因| 一如既往什么意思| 一暴十寒什么意思| crl是什么意思| 搞破鞋是什么意思| 慢性肠炎是什么症状| 什么食物含钾多| 身上到处痒是什么原因| 1971年属猪的是什么命| 痛风挂号什么科| 吃什么对牙齿好| 小黄人是什么意思| 腿膝盖后面的窝窝疼是什么原因| 喉咙长期有痰是什么原因| 覆水难收什么意思| 百度Jump to content

为了人民重托——记政府工作报告起草

This is a good article. Click here for more information.
From Wikipedia, the free encyclopedia
百度 形成“指向精准”的意见建议,是建言献策的关键所在。

BitLocker
Other namesDevice Encryption
Developer(s)Microsoft
Initial releaseJanuary 30, 2007; 18 years ago (2025-08-06)
Operating systemMicrosoft Windows
TypeDisk encryption software
Websitelearn.microsoft.com/en-us/windows/security/operating-system-security/data-protection/bitlocker/ Edit this on Wikidata

BitLocker is a full volume encryption feature included with Microsoft Windows versions starting with Windows Vista. It is designed to protect data by providing encryption for entire volumes. By default, it uses the Advanced Encryption Standard (AES) algorithm in cipher block chaining (CBC) or "xor–encrypt–xor (XEX)-based tweaked codebook mode with ciphertext stealing" (XTS) mode[1] with a 128-bit or 256-bit key.[2][3] CBC is not used over the whole disk; it is applied to each individual sector.[3]

History

[edit]

BitLocker originated as a part of Microsoft's Next-Generation Secure Computing Base architecture in 2004 as a feature tentatively codenamed "Cornerstone"[4][5] and was designed to protect information on devices, particularly if a device was lost or stolen. Another feature, titled "Code Integrity Rooting", was designed to validate the integrity of Microsoft Windows boot and system files.[4] When used in conjunction with a compatible Trusted Platform Module (TPM), BitLocker can validate the integrity of boot and system files before decrypting a protected volume; an unsuccessful validation will prohibit access to a protected system.[6][7] BitLocker was briefly called Secure Startup before Windows Vista's release to manufacturing.[6]

BitLocker is available on:

Features

[edit]
manage-bde
Developer(s)Microsoft
Initial releaseJanuary 30, 2007; 18 years ago (2025-08-06)
Operating systemMicrosoft Windows
TypeCommand
LicenseProprietary commercial software
Websitemanage-bde

Initially, the graphical BitLocker interface in Windows Vista could only encrypt the operating system volume.[13] Starting with Windows Vista with Service Pack 1 and Windows Server 2008, volumes other than the operating system volume could be encrypted using the graphical tool. Still, some aspects of the BitLocker (such as turning autolocking on or off) had to be managed through a command-line tool called manage-bde.wsf.[14]

The version of BitLocker included in Windows 7 and Windows Server 2008 Release 2 adds the ability to encrypt removable drives. On Windows XP or Windows Vista, read-only access to these drives can be achieved through a program called BitLocker To Go Reader, if FAT16, FAT32 or exFAT filesystems are used.[15] In addition, a new command-line tool called manage-bde replaced the old manage-bde.wsf.[16]

Starting with Windows Server 2012 and Windows 8, Microsoft has complemented BitLocker with the Microsoft Encrypted Hard Drive specification, which allows the cryptographic operations of BitLocker encryption to be offloaded to the storage device's hardware, for example, self-encrypting drives.[17][18] In addition, BitLocker can now be managed through Windows PowerShell.[19] Finally, Windows 8 introduced Windows To Go in its Enterprise edition, which BitLocker can protect.[20]

Device encryption

[edit]

Windows Mobile 6.5, Windows RT and core editions of Windows 8.1 include device encryption, a feature-limited version of BitLocker that encrypts the whole system.[21][22][23] Logging in with a Microsoft account with administrative privileges automatically begins the encryption process. The recovery key is stored to either the Microsoft account or Active Directory (Active Directory requires Pro editions of Windows), allowing it to be retrieved from any computer. While device encryption is offered on all editions of Windows 8.1, unlike BitLocker, device encryption requires that the device meet the InstantGo (formerly Connected Standby) specifications,[23] which requires solid-state drives and a TPM 2.0 chip.[21][24]

Starting with Windows 10 1703, the requirements for device encryption have changed, requiring a TPM 1.2 or 2.0 module with PCR 7 support, UEFI Secure Boot, and that the device meets Modern Standby requirements or HSTI validation.[25]

Device encryption requirements were relaxed in Windows 11 24H2, with the Modern Standby, HSTI and Secure Boot compliance no longer required and the DMA interfaces blocklist removed.[26] And device encryption will be enabled by default by clean installation of Windows 11 24H2, called auto device encryption.[27]

In September 2019 a new update was released (KB4516071[28]) changing the default setting for BitLocker when encrypting a self-encrypting drive. Now, the default is to use software encryption for newly encrypted drives. This is due to hardware encryption flaws and security concerns related to those issues.[29]

Encryption modes

[edit]

Three authentication mechanisms can be used as building blocks to implement BitLocker encryption:[30]

  • Transparent operation mode: This mode uses the capabilities of TPM 1.2 hardware to provide for transparent user experience—the user powers up and logs into Windows as usual. The key used for disk encryption is sealed (encrypted) by the TPM chip and will only be released to the OS loader code if the early boot files appear to be unmodified. The pre-OS components of BitLocker achieve this by implementing a Static Root of Trust Measurement—a methodology specified by the Trusted Computing Group (TCG). This mode is vulnerable to a cold boot attack, as it allows a powered-down machine to be booted by an attacker. It is also vulnerable to a sniffing attack, as the volume encryption key is transferred in plain text from the TPM to the CPU during a successful boot.
  • User authentication mode: This mode requires that the user provide some authentication to the pre-boot environment in the form of a pre-boot PIN or password.
  • USB Key Mode: The user must insert a USB device that contains a startup key into the computer to be able to boot the protected OS. Note that this mode requires that the BIOS on the protected machine supports the reading of USB devices in the pre-OS environment. BitLocker does not support smart cards for pre-boot authentication.[31]

The following combinations of the above authentication mechanisms are supported, all with an optional escrow recovery key:

Operation

[edit]

BitLocker is a logical volume encryption system. (A volume spans part of a hard disk drive, the whole drive or more than one drive.) When enabled, TPM and BitLocker can ensure the integrity of the trusted boot path (e.g. BIOS and boot sector), in order to prevent most offline physical attacks and boot sector malware.[38]

In order for BitLocker to encrypt the volume holding the operating system, at least two NTFS-formatted volumes are required: one for the operating system (usually C:) and another with a minimum size of 100 MB, which remains unencrypted and boots the operating system.[38] (In case of Windows Vista and Windows Server 2008, however, the volume's minimum size is 1.5 GB and must have a drive letter.)[39] Unlike previous versions of Windows, Vista's "diskpart" command-line tool includes the ability to shrink the size of an NTFS volume so that this volume may be created from already allocated space. A tool called the BitLocker Drive Preparation Tool is also available from Microsoft that allows an existing volume on Windows Vista to be shrunk to make room for a new boot volume and for the necessary bootstrapping files to be transferred to it.[40]

Once an alternate boot partition has been created, the TPM module needs to be initialized (assuming that this feature is being used), after which the required disk-encryption key protection mechanisms such as TPM, PIN or USB key are configured.[41] The volume is then encrypted as a background task, something that may take a considerable amount of time with a large disk as every logical sector is read, encrypted and rewritten back to disk.[41] The keys are only protected after the whole volume has been encrypted when the volume is considered secure.[42] BitLocker uses a low-level device driver to encrypt and decrypt all file operations, making interaction with the encrypted volume transparent to applications running on the platform.[41]

Encrypting File System (EFS) may be used in conjunction with BitLocker to provide protection once the operating system is running. Protection of the files from processes and users within the operating system can only be performed using encryption software that operates within Windows, such as EFS. BitLocker and EFS, therefore, offer protection against different classes of attacks.[43]

In Active Directory environments, BitLocker supports optional key escrow to Active Directory, although a schema update may be required for this to work (i.e. if the Active Directory Services are hosted on a Windows version previous to Windows Server 2008).

BitLocker and other full disk encryption systems can be attacked by a rogue boot manager. Once the malicious bootloader captures the secret, it can decrypt the Volume Master Key (VMK), which would then allow access to decrypt or modify any information on an encrypted hard disk. By configuring a TPM to protect the trusted boot pathway, including the BIOS and boot sector, BitLocker can mitigate this threat. (Note that some non-malicious changes to the boot path may cause a Platform Configuration Register check to fail, and thereby generate a false warning.)[38]

Security concerns

[edit]

TPM alone is not enough

[edit]

The "Transparent operation mode" and "User authentication mode" of BitLocker use TPM hardware to detect whether there are unauthorized changes to the pre-boot environment, including the BIOS and MBR. If any unauthorized changes are detected, BitLocker requests a recovery key on a USB device. This cryptographic secret is used to decrypt the Volume Master Key (VMK) and allow the bootup process to continue.[44] However, TPM alone is not enough:

  • In February 2008, a group of security researchers published details of a so-called "cold boot attack" that allows full disk encryption systems such as BitLocker to be compromised by booting the machine from removable media, such as a USB drive, into another operating system, then dumping the contents of pre-boot memory.[45] The attack relies on the fact that DRAM retains information for up to several minutes (or even longer, if cooled) after the power has been removed. The Bress/Menz device, described in US Patent 9,514,789, can accomplish this type of attack.[46] Similar full disk encryption mechanisms of other vendors and other operating systems, including Linux and Mac OS X, are vulnerable to the same attack. The authors recommend that computers be powered down when not in physical control of the owner (rather than be left in a sleep mode) and that the encryption software be configured to require a password to boot the machine.[45]
  • On 10 November 2015, Microsoft released a security update to mitigate a security vulnerability in BitLocker that allowed authentication to be bypassed by employing a malicious Kerberos key distribution center, if the attacker had physical access to the machine, the machine was part of a domain and had no PIN or USB flash drive protection.[47]
  • BitLocker still does not properly support TPM 2.0 security features which, as a result, can lead to a complete bypass of privacy protection when keys are transmitted over Serial Peripheral Interface in a motherboard.[48]

All these attacks require physical access to the system and are thwarted by a secondary protector such as a USB flash drive or PIN code.

Upholding Kerckhoffs's principle

[edit]

Although the AES encryption algorithm used in BitLocker is in the public domain, its implementation in BitLocker, as well as other components of the software, are proprietary; however, the code is available for scrutiny by Microsoft partners and enterprises, subject to a non-disclosure agreement.[49][50]

According to Microsoft sources,[51] BitLocker does not contain an intentionally built-in backdoor, so there is no Microsoft-provided way for law enforcement to have guaranteed access to the data on a user's drive. In 2006, the UK Home Office expressed concern over the lack of a backdoor and tried entering into talks with Microsoft to get one introduced.[52] Microsoft developer and cryptographer Niels Ferguson denied the backdoor request and said, "over my dead body".[53] Microsoft engineers have said that United States Federal Bureau of Investigation agents also put pressure on them in numerous meetings to add a backdoor, although no formal, written request was ever made; Microsoft engineers eventually suggested that agents should look for the hard copy of the encryption key that the BitLocker program suggests that its users make.[54]

Niels Ferguson's position that "back doors are simply not acceptable"[53] is in accordance with Kerckhoffs's principle. Stated by Netherlands-born cryptographer Auguste Kerckhoffs in the 19th century, the principle holds that a cryptosystem should be secure, even if everything about the system, except the encryption key, is public knowledge.

Since 2020, BitLocker's method and data structure is public knowledge due to reverse engineering; the Linux cryptsetup program is capable of reading and writing BitLocker-protected drives given the key.[55]

Other concerns

[edit]

Starting with Windows 8 and Windows Server 2012, Microsoft removed the Elephant Diffuser from the BitLocker scheme for no declared reason.[56] Dan Rosendorf's research shows that removing the Elephant Diffuser had an "undeniably negative impact" on the security of BitLocker encryption against a targeted attack.[57] Microsoft later cited performance concerns, and noncompliance with the Federal Information Processing Standards (FIPS), to justify the diffuser's removal.[58] Starting with Windows 10 version 1511, however, Microsoft added a new FIPS-compliant XTS-AES encryption algorithm to BitLocker.[1] Starting with Windows 10 version 1803, Microsoft added a new feature called "Kernel Direct Memory access (DMA) Protection" to BitLocker, to protect against DMA attacks via Thunderbolt 3 ports.[59][60] "Kernel Direct Memory access (DMA) Protection" only protects against attacks through Thunderbolt. Direct Memory Access is also possible through PCI Express. In this type of attack an attacker would connect a malicious PCI Express Device,[61] which can in turn write directly to the memory and bypass the Windows login. To protect again this type of attack, Microsoft introduced "Virtualization-based Security".[62][63]

In October 2017, it was reported that a flaw enabled private keys to be inferred from public keys, which could allow an attacker to bypass BitLocker encryption when an affected TPM chip is used.[64] The flaw is the Return of Coppersmith's Attack or ROCA vulnerability which is in a code library developed by Infineon and had been in widespread use in security products such as smartcards and TPMs. Microsoft released an updated version of the firmware for Infineon TPM chips that fixes the flaw via Windows Update.[65]

See also

[edit]

References

[edit]
  1. ^ a b Hakala, Trudy (January 29, 2020). "What's new in Windows 10, versions 1507 and 1511". TechNet. Microsoft. Retrieved March 7, 2020.
  2. ^ a b "Windows BitLocker Drive Encryption Frequently Asked Questions". TechNet Library. Microsoft. March 22, 2012. Retrieved March 7, 2020.
  3. ^ a b Ferguson, Niels (August 2006). "AES-CBC + Elephant Diffuser: A Disk Encryption Algorithm for Windows Vista" (PDF). Microsoft. Retrieved March 7, 2020.
  4. ^ a b Biddle, Peter (2004). "Next-Generation Secure Computing Base". Microsoft. Archived from the original (PPT) on August 27, 2006. Retrieved March 7, 2020.
  5. ^ Thurrott, Paul (September 9, 2005). "Pre-PDC Exclusive: Windows Vista Product Editions". Supersite for Windows. Penton. Archived from the original on April 2, 2015. Retrieved March 7, 2020.
  6. ^ a b Microsoft (April 22, 2005). "Secure Startup–Full Volume Encryption: Technical Overview" (DOC). Retrieved March 7, 2020.
  7. ^ Microsoft (April 21, 2005). "Secure Startup – Full Volume Encryption: Executive Overview" (DOC). Retrieved March 7, 2020.
  8. ^ a b "What's New in BitLocker". TechNet Library. Microsoft. August 31, 2016. Retrieved March 7, 2020.
  9. ^ "BitLocker Drive Encryption in Windows Vista". TechNet. Microsoft. Archived from the original on November 17, 2016. Retrieved March 7, 2020.
  10. ^ "BitLocker Drive Encryption Overview". TechNet. Microsoft. November 17, 2009. Retrieved March 7, 2020.
  11. ^ "Compare Windows 10 Editions". Windows for Business. Microsoft. Retrieved March 7, 2020.
  12. ^ "Finding your BitLocker recovery key in Windows". Windows support. Microsoft. Retrieved December 2, 2021.
  13. ^ Yegulalp, Serdar (August 7, 2007). "Vista's BitLocker Encryption". Computerworld. Retrieved May 15, 2024.
  14. ^ Hynes, Byron (September 8, 2016). "Advances in BitLocker Drive Encryption". TechNet Magazine. Microsoft. Retrieved March 7, 2020.
  15. ^ "Description of BitLocker To Go Reader". Microsoft. Archived from the original on September 24, 2019. Retrieved April 25, 2017.
  16. ^ "Enabling BitLocker by Using the Command Line". TechNet. Microsoft. September 12, 2012. Retrieved March 7, 2020.
  17. ^ "Encrypted Hard Drive". TechNet. Microsoft. August 31, 2016. Retrieved March 7, 2020.
  18. ^ "Encrypted Hard Drive Device Guide". MSDN. Microsoft. June 1, 2017. Retrieved March 7, 2020.
  19. ^ "BitLocker". TechNet. Microsoft. Retrieved March 7, 2020.
  20. ^ "Windows To Go: Frequently Asked Questions". TechNet. Microsoft. October 23, 2013. Retrieved March 7, 2020.
  21. ^ a b "Device Encryption". Device Encryption. Microsoft. November 18, 2015. Retrieved March 7, 2020.
  22. ^ Cunningham, Andrew (October 17, 2013). "Windows 8.1 includes seamless, automatic disk encryption—if your PC supports it". Ars Technica. Condé Nast. Retrieved March 7, 2020.
  23. ^ a b "Help protect your files with device encryption". Windows Help portal. Microsoft. Archived from the original on May 2, 2016. Retrieved March 7, 2020.
  24. ^ Thurrott, Paul (June 4, 2013). "In Blue: Device Encryption". Paul Thurrott's SuperSite for Windows. Penton Media. Archived from the original on June 9, 2013. Retrieved March 7, 2020.
  25. ^ "BitLocker drive encryption in Windows 10 for OEMs". docs.microsoft.com. November 16, 2018. Retrieved March 7, 2020.
  26. ^ "BitLocker drive encryption in Windows 11 for OEMs". learn.microsoft.com. May 22, 2024. Retrieved October 18, 2024.
  27. ^ "Microsoft confirms Windows 11 24H2 turns on Device Encryption by default". May 8, 2024.
  28. ^ "September 24, 2019—KB4516071 (OS Build 16299.1420)". support.microsoft.com. Retrieved March 7, 2020.
  29. ^ Cimpanu, Catalin (November 5, 2018). "Flaws in self-encrypting SSDs let attackers bypass disk encryption". ZDNet. Retrieved March 7, 2020.
  30. ^ "BitLocker Drive Encryption". Data Encryption Toolkit for Mobile PCs: Security Analysis. Microsoft. April 4, 2007. Archived from the original on October 23, 2007. Retrieved March 7, 2020.
  31. ^ Dansimp. "Using BitLocker with other programs FAQ (Windows 10) - Windows security". docs.microsoft.com. Retrieved July 27, 2022.
  32. ^ "ProtectKeyWithTPM method of the Win32_EncryptableVolume class". MSDN Library. Microsoft. March 31, 2018. Retrieved March 7, 2020.
  33. ^ "ProtectKeyWithTPMAndPIN method of the Win32_EncryptableVolume class". MSDN Library. Microsoft. March 31, 2018. Retrieved March 7, 2020.
  34. ^ "ProtectKeyWithTPMAndPINAndStartupKey method of the Win32_EncryptableVolume class". MSDN Library. Microsoft. March 31, 2018. Retrieved March 7, 2020.
  35. ^ "ProtectKeyWithTPMAndStartupKey method of the Win32_EncryptableVolume class". MSDN Library. Microsoft. March 31, 2018. Retrieved March 7, 2020.
  36. ^ "ProtectKeyWithExternalKey method of the Win32_EncryptableVolume class". MSDN Library. Microsoft. March 31, 2018. Retrieved March 7, 2020.
  37. ^ "ProtectKeyWithNumericalPassword method of the Win32_EncryptableVolume class". MSDN Library. Microsoft. March 31, 2018. Retrieved March 7, 2020.
  38. ^ a b c "BitLocker Drive Encryption in Windows 7: Frequently Asked Questions". TechNet. Microsoft. September 12, 2012. Retrieved March 7, 2020.
  39. ^ "Windows BitLocker Drive Encryption Step-by-Step Guide". TechNet. Microsoft. July 2, 2012. Retrieved March 7, 2020.
  40. ^ "Description of the BitLocker Drive Preparation Tool". Microsoft. December 21, 2011. Retrieved March 7, 2020.
  41. ^ a b c Andrew, Bettany; Halsey, Mike (2013). Exam Ref 70-687: Configuring Windows 8 (1 ed.). Microsoft Press. p. 307. ISBN 978-0-7356-7392-2. OCLC 851209981.
  42. ^ Jerry, Honeycutt (2012). Introducing Windows 8: An Overview for IT professionals. Microsoft. p. 121. ISBN 978-0-7356-7050-1. OCLC 819519777.
  43. ^ Ou, George (February 28, 2007). "Prevent data theft with Windows Vista's Encrypted File System (EFS) and BitLocker". TechRepublic. CBS Interactive. Retrieved March 7, 2020.
  44. ^ Byron, Hynes (September 7, 2016). "Keys to Protecting Data with BitLocker Drive Encryption". TechNet Magazine. Microsoft. Retrieved March 7, 2020.
  45. ^ a b Halderman, J. Alex; Schoen, Seth D.; Heninger, Nadia; Clarkson, William; Paul, William; Calandrino, Joseph A.; Feldman, Ariel J.; Appelbaum, Jacob; Felten, Edward W (February 21, 2008). Lest We Remember: Cold Boot Attacks on Encryption Keys (PDF) (Thesis). Princeton University. Retrieved March 7, 2020.
  46. ^ "Systems and methods for safely moving short term memory devices while preserving, protecting and examining their digital data". Retrieved March 7, 2020.
  47. ^ "Microsoft Security Bulletin MS15-122 – Important". Security TechCenter. Microsoft. October 11, 2017. Retrieved March 7, 2020.
  48. ^ "From Stolen Laptop to Inside the Company Network". Dolos Group. July 28, 2021. Retrieved December 2, 2021.
  49. ^ Thurrott, Paul (June 10, 2015). "No Back Doors: Microsoft Opens Windows Source Code to EU Governments". Petri. Retrieved March 7, 2020.
  50. ^ "Shared Source Initiative". www.microsoft.com. Retrieved March 7, 2020.
  51. ^ "Back-door nonsense". System Integrity Team Blog. Microsoft. March 2, 2006. Retrieved March 7, 2020.
  52. ^ Stone-Lee, Ollie (February 16, 2006). "UK holds Microsoft security talks". BBC. Retrieved March 7, 2020.
  53. ^ a b Evers, Joris (March 6, 2006). "Microsoft: Vista won't get a backdoor". CNET. CBS Interactive. Retrieved March 7, 2020.
  54. ^ Franceschi-Bicchierai, Lorenzo (September 11, 2013). "Did the FBI Lean On Microsoft for Access to Its Encryption Software?". Mashable. Retrieved March 7, 2020.
  55. ^ Trefny, Vojtech (January 25, 2020). BitLocker disk encryption on Linux (PDF). DevConf CZ.
  56. ^ "BitLocker Overview". technet.microsoft.com. August 31, 2016. Retrieved March 7, 2020.
  57. ^ Rosendorf, Dan (May 23, 2013). "Bitlocker: A little about the internals and what changed in Windows 8" (PDF). Archived from the original (PDF) on October 22, 2021. Retrieved March 7, 2020.
  58. ^ Lee, Micah (June 4, 2015). "Microsoft Gives Details About Its Controversial Disk Encryption". The Intercept. Retrieved March 7, 2020.
  59. ^ "Blocking the SBP-2 driver and Thunderbolt controllers to reduce 1394 DMA and Thunderbolt DMA threats to BitLocker". Microsoft. November 7, 2018. Retrieved March 7, 2020.
  60. ^ "Kernel DMA Protection for Thunderbolt 3". Microsoft. March 26, 2019. Retrieved March 16, 2020.
  61. ^ "PCILeech". Ulf Frisk. June 6, 2024. Retrieved June 13, 2024.
  62. ^ "Securing BitLocker: Initial Setup and Defending Against Attacks". VidraSec. March 15, 2024. Retrieved June 13, 2024.
  63. ^ "PCILeech". Microsoft. March 20, 2023. Retrieved June 13, 2024.
  64. ^ Goodin, Dan (October 16, 2017). "Millions of high-security crypto keys crippled by newly discovered flaw". Ars Technica. Condé Nast. Retrieved March 7, 2020.
  65. ^ Busvine, Douglas (October 16, 2017). "Infineon says has fixed encryption flaw found by researchers". Reuters. Retrieved March 7, 2020.
[edit]
灰指甲用什么药最好 那英姓什么 穿青人是什么民族 皮肤瘙痒是什么病的前兆 118代表什么意思
粉蒸肉的粉是什么粉 什么叫韵母 四肢麻木是什么病 马上风为什么拔不出来 豆花是什么
611是什么意思 四季平安是什么生肖 女人山根低代表什么 冷萃是什么意思 色盲是什么意思
签发是什么意思 农历七月初七俗称什么 不自觉是什么意思 84年什么命 胃蛋白酶原1偏低是什么意思
有缘无份什么意思1949doufunao.com 什么是早孕hcv9jop2ns3r.cn 绿豆芽不能和什么一起吃96micro.com 茄子是什么意思hcv8jop9ns8r.cn 萌字五行属什么hcv8jop9ns5r.cn
1202是什么星座hcv8jop4ns1r.cn 内痔疮吃什么药好得快hcv8jop7ns4r.cn 丙氨酸氨基转移酶高是什么意思hcv8jop5ns2r.cn 韩红是什么民族tiangongnft.com 2015年属什么生肖hcv9jop6ns8r.cn
磨豆浆是什么意思hcv8jop7ns5r.cn b-h是什么药hcv9jop5ns4r.cn 贷款是什么意思hcv9jop8ns3r.cn 手麻是什么原因jingluanji.com nicu是什么意思hcv8jop6ns1r.cn
东厂是什么意思hcv9jop1ns2r.cn 为什么会有湿疹520myf.com 什么肉好消化hcv7jop6ns6r.cn 头发粗硬是什么原因hcv8jop4ns6r.cn 上面白下面本念什么hcv8jop6ns3r.cn
百度