Hi Skyler,

> Sorry for jumping in at the last minute, but to encrypt
> something in RAM, wouldn't you need an external hardware

No, you can work as if you were swapping: The 386 and newer
CPU allow you to flag memory areas as "not accessible" and
trigger a call which allows you to make the area useable on
demand, for example by swapping it back in from disk.

You can also make a driver which makes areas "unuseable" by
encrypting them and automatically decrypting them as soon
as anything tries to access them. A task in the background
can continuously try to make as many pages "unuseable" as
possible. Then, if you make sure that the key is zapped at
reboot (e.g. because it is at a place overwritten at boot)
you can be sure that only very small areas are useable by
an attacker who wants to steal your RAM contents.

You can also combine swapping out to disk and encrypting,
as long as your driver still knows which of the two kinds
of "not accessible" is the case when that make-useable-on-
demand call is triggered.

Eric




------------------------------------------------------------------------------
Create and Deploy Rich Internet Apps outside the browser with Adobe(R)AIR(TM)
software. With Adobe AIR, Ajax developers can use existing skills and code to
build responsive, highly engaging applications that combine the power of local
resources and data with the reach of the web. Download the Adobe AIR SDK and
Ajax docs to start building applications today-http://p.sf.net/sfu/adobe-com
_______________________________________________
Freedos-user mailing list
Freedos-user@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/freedos-user

Reply via email to