BitLocker is a
full volume encryption feature included with
Microsoft Windows versions starting with
Windows Vista
Windows Vista is a major release of the Windows NT operating system developed by Microsoft. It was the direct successor to Windows XP, which was released five years before, at the time being the longest time span between successive releases of ...
. It is designed to protect data by providing
encryption
In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can dec ...
for entire
volumes. By default, it uses the
AES
AES may refer to:
Businesses and organizations Companies
* AES Corporation, an American electricity company
* AES Data, former owner of Daisy Systems Holland
* AES Eletropaulo, a former Brazilian electricity company
* AES Andes, formerly AES Gener ...
encryption algorithm in
cipher block chaining (CBC) or
XTS mode
with a 128-bit or 256-bit
key.
CBC is not used over the whole disk; it is applied to each individual
sector.
History
BitLocker originated as a part of Microsoft's
Next-Generation Secure Computing Base architecture in 2004 as a feature tentatively codenamed "Cornerstone"
and was designed to protect information on devices, particularly if a device was lost or stolen; another feature, titled "Code Integrity Rooting", was designed to validate the integrity of Microsoft Windows boot and system files.
When used in conjunction with a compatible
Trusted Platform Module (TPM), BitLocker can validate the integrity of boot and system files before decrypting a protected volume; an unsuccessful validation will prohibit access to a protected system.
BitLocker was briefly called Secure Startup before Windows Vista's
release to manufacturing
A software release life cycle is the sum of the stages of development and maturity for a piece of computer software ranging from its initial development to its eventual release, and including updated versions of the released version to help impro ...
.
BitLocker is available on:
* Ultimate and Enterprise editions of
Windows Vista
Windows Vista is a major release of the Windows NT operating system developed by Microsoft. It was the direct successor to Windows XP, which was released five years before, at the time being the longest time span between successive releases of ...
and
Windows 7
Windows 7 is a major release of the Windows NT operating system developed by Microsoft. It was released to manufacturing on July 22, 2009, and became generally available on October 22, 2009. It is the successor to Windows Vista, released nearl ...
* Pro and Enterprise editions of
Windows 8
Windows 8 is a major release of the Windows NT operating system developed by Microsoft. It was released to manufacturing on August 1, 2012; it was subsequently made available for download via MSDN and TechNet on August 15, 2012, and later to ...
and
8.1
* Pro, Enterprise, and Education editions of
Windows 10
Windows 10 is a major release of Microsoft's Windows NT operating system. It is the direct successor to Windows 8.1, which was released nearly two years earlier. It was released to manufacturing on July 15, 2015, and later to retail on ...
* Pro, Enterprise, and Education editions of
Windows 11
Windows 11 is the latest major release of Microsoft's Windows NT operating system, released in October 2021. It is a free upgrade to its predecessor, Windows 10 (2015), and is available for any Windows 10 devices that meet the new Windows 11 ...
*
Windows Server 2008 and later
Features
Initially, the graphical BitLocker interface in Windows Vista could only encrypt the
operating system
An operating system (OS) is system software that manages computer hardware, software resources, and provides common daemon (computing), services for computer programs.
Time-sharing operating systems scheduler (computing), schedule tasks for ef ...
volume. Starting with Windows Vista with Service Pack 1 and Windows Server 2008, volumes other than the operating system volume could be encrypted using the graphical tool. Still, some aspects of the BitLocker (such as turning autolocking on or off) had to be managed through a command-line tool called
manage-bde.wsf
.
The version of BitLocker included in Windows 7 and Windows Server 2008 R2 adds the ability to encrypt removable drives. On
Windows XP
Windows XP is a major release of Microsoft's Windows NT operating system. It was release to manufacturing, released to manufacturing on August 24, 2001, and later to retail on October 25, 2001. It is a direct upgrade to its predecessors, Wind ...
or Windows Vista, read-only access to these drives can be achieved through a program called BitLocker To Go Reader, if
FAT16,
FAT32
File Allocation Table (FAT) is a file system developed for personal computers. Originally developed in 1977 for use on floppy disks, it was adapted for use on hard disks and other devices. It is often supported for compatibility reasons by ...
or
exFAT filesystems are used. In addition, a new command-line tool called
manage-bde
replaced the old
manage-bde.wsf
.
Starting with Windows Server 2012 and Windows 8, Microsoft has complemented BitLocker with the Microsoft Encrypted Hard Drive specification, which allows the cryptographic operations of BitLocker encryption to be offloaded to the storage device's hardware. In addition, BitLocker can now be managed through
Windows PowerShell
PowerShell is a task automation and configuration management program from Microsoft, consisting of a command-line shell and the associated scripting language. Initially a Windows component only, known as Windows PowerShell, it was made open-s ...
. Finally, Windows 8 introduced
Windows To Go in its Enterprise edition, which BitLocker can protect.
Device encryption
Windows Mobile 6.5,
Windows RT and core editions of Windows 8.1 include device encryption, a feature-limited version of BitLocker that encrypts the whole system.
Logging in with a
Microsoft account with administrative privileges automatically begins the encryption process. The recovery key is stored to either the Microsoft account or
Active Directory, allowing it to be retrieved from any computer. While device encryption is offered on all versions of 8.1, unlike BitLocker, device encryption requires that the device meet the
InstantGo (formerly
Connected Standby) specifications,
which requires
solid-state drive
A solid-state drive (SSD) is a solid-state storage device that uses integrated circuit assemblies to store data persistently, typically using flash memory, and functioning as secondary storage in the hierarchy of computer storage. It i ...
s, non-removable RAM (to protect against
cold boot attacks) and a TPM 2.0 chip.
Starting with Windows 10 1703, the requirements for device encryption have changed, requiring a TPM 1.2 or 2.0 module with PCR 7 support,
UEFI Secure Boot, and that the device meets Modern Standby requirements or HSTI validation.
In September 2019 a new update was released (KB4516071) changing the default setting for BitLocker when encrypting a self-encrypting hard drive. Now, the default is to use software encryption for newly encrypted drives. This is due to hardware encryption flaws and security concerns related to those issues.
Encryption modes
Three authentication mechanisms can be used as building blocks to implement BitLocker encryption:
* Transparent operation mode: This mode uses the capabilities of TPM 1.2 hardware to provide for transparent user experience—the user powers up and logs into Windows as usual. The key used for
disk encryption is sealed (encrypted) by the TPM chip and will only be released to the OS loader code if the early boot files appear to be unmodified. The pre-OS components of BitLocker achieve this by implementing a Static Root of Trust Measurement—a methodology specified by the
Trusted Computing Group (TCG). This mode is vulnerable to a
cold boot attack, as it allows a powered-down machine to be
booted by an attacker. It is also vulnerable to a sniffing attack, as the volume encryption key is transferred in plain text from the TPM to the CPU during a successful boot.
* User authentication mode: This mode requires that the user provide some authentication to the pre-boot environment in the form of a pre-boot
PIN or password.
* USB Key Mode: The user must insert a USB device that contains a startup key into the computer to be able to boot the protected OS. Note that this mode requires that the BIOS on the protected machine supports the reading of USB devices in the pre-OS environment. BitLocker does not support smart cards for pre-boot authentication.
The following combinations of the above authentication mechanisms are supported, all with an optional
escrow recovery key:
* TPM only
* TPM + PIN
* TPM + PIN + USB Key
* TPM + USB Key
* USB Key
* Password only
Operation
BitLocker is a
logical volume encryption system. (A volume spans part of a
hard disk drive
A hard disk drive (HDD), hard disk, hard drive, or fixed disk is an electro-mechanical data storage device that stores and retrieves digital data using magnetic storage with one or more rigid rapidly rotating platters coated with magn ...
, the whole drive or more than one drive.) When enabled, TPM and BitLocker can ensure the integrity of the trusted boot path (e.g. BIOS and boot sector), in order to prevent most offline physical attacks and boot sector malware.
In order for BitLocker to encrypt the volume holding the operating system, at least two
NTFS-formatted volumes are required: one for the operating system (usually C:) and another with a minimum size of 100 MB, which remains unencrypted and
boots the operating system.
(In case of Windows Vista and
Windows Server 2008, however, the volume's minimum size is 1.5 GB and must have a
drive letter.) Unlike previous versions of Windows, Vista's "diskpart" command-line tool includes the ability to shrink the size of an NTFS volume so that this volume may be created from already allocated space. A tool called the BitLocker Drive Preparation Tool is also available from Microsoft that allows an existing volume on Windows Vista to be shrunk to make room for a new boot volume and for the necessary
bootstrapping
In general, bootstrapping usually refers to a self-starting process that is supposed to continue or grow without external input.
Etymology
Tall boots may have a tab, loop or handle at the top known as a bootstrap, allowing one to use fingers ...
files to be transferred to it.
Once an alternate boot partition has been created, the TPM module needs to be initialized (assuming that this feature is being used), after which the required disk-encryption key protection mechanisms such as TPM, PIN or
USB key are configured.
The volume is then encrypted as a background task, something that may take a considerable amount of time with a large disk as every logical sector is read, encrypted and rewritten back to disk.
The keys are only protected after the whole volume has been encrypted when the volume is considered secure. BitLocker uses a low-level device driver to encrypt and decrypt all file operations, making interaction with the encrypted volume transparent to applications running on the platform.
Encrypting File System (EFS) may be used in conjunction with BitLocker to provide protection once the operating system is running. Protection of the files from processes and users within the operating system can only be performed using encryption software that operates within Windows, such as EFS. BitLocker and EFS, therefore, offer protection against different classes of attacks.
In Active Directory environments, BitLocker supports optional key escrow to Active Directory, although a schema update may be required for this to work (i.e. if the Active Directory Services are hosted on a Windows version previous to Windows Server 2008).
BitLocker and other full disk encryption systems can be attacked by a
rogue boot manager. Once the malicious bootloader captures the secret, it can decrypt the Volume Master Key (VMK), which would then allow access to decrypt or modify any information on an encrypted hard disk. By configuring a TPM to protect the trusted boot pathway, including the
BIOS
In computing, BIOS (, ; Basic Input/Output System, also known as the System BIOS, ROM BIOS, BIOS ROM or PC BIOS) is firmware used to provide runtime services for operating systems and programs and to perform hardware initialization during the ...
and
boot sector, BitLocker can mitigate this threat. (Note that some non-malicious changes to the boot path may cause a
Platform Configuration Register check to fail, and thereby generate a false warning.)
Security concerns
TPM alone is not enough
The "Transparent operation mode" and "User authentication mode" of BitLocker use TPM hardware to detect if there are unauthorized changes to the pre-boot environment, including the
BIOS
In computing, BIOS (, ; Basic Input/Output System, also known as the System BIOS, ROM BIOS, BIOS ROM or PC BIOS) is firmware used to provide runtime services for operating systems and programs and to perform hardware initialization during the ...
and
MBR
MBR may refer to:
Computing
* Master boot record, the first sector of a partitioned data storage device, used for booting
* Memory buffer register
* Minimum bounding rectangle
* Minimum bit rate
Publications
* ''The Malaysia Book of Records''
* ...
. If any unauthorized changes are detected, BitLocker requests a recovery key on a USB device. This cryptographic secret is used to decrypt the Volume Master Key (VMK) and allow the
bootup process to continue.
However, TPM alone is not enough:
* In February 2008, a group of security researchers published details of a so-called "
cold boot attack" that allows full disk encryption systems such as BitLocker to be compromised by booting the machine from removable media, such as a USB drive, into another operating system, then
dumping the contents of pre-boot memory.
The attack relies on the fact that
DRAM retains information for up to several minutes (or even longer, if cooled) after the power has been removed. The
Bress/Menz device, described in US Patent 9,514,789, can accomplish this type of attack. Similar full disk encryption mechanisms of other vendors and other operating systems, including
Linux
Linux ( or ) is a family of open-source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991, by Linus Torvalds. Linux is typically packaged as a Linux distribution, which i ...
and
Mac OS X
macOS (; previously OS X and originally Mac OS X) is a Unix operating system developed and marketed by Apple Inc. since 2001. It is the primary operating system for Apple's Mac computers. Within the market of desktop and lapt ...
, are vulnerable to the same attack. The authors recommend that computers be powered down when not in physical control of the owner (rather than be left in a
sleep mode) and that the encryption software be configured to require a password to boot the machine.
* On 10 November 2015, Microsoft released a security update to mitigate a security vulnerability in BitLocker that allowed authentication to be bypassed by employing a malicious
Kerberos key distribution center, if the attacker had physical access to the machine, the machine was part of a domain and had no PIN or USB flash drive protection.
* BitLocker still does not properly support TPM 2.0 security features which, as a result, can lead to a complete bypass of privacy protection when keys are transmitted over
Serial Peripheral Interface
The Serial Peripheral Interface (SPI) is a synchronous serial communication interface specification used for short-distance communication, primarily in embedded systems. The interface was developed by Motorola in the mid-1980s and has become ...
in a motherboard.
All these attacks require physical access to the system and are thwarted by a secondary protector such as a USB flash drive or PIN code.
Upholding Kerckhoffs's principle
Although the AES encryption algorithm used in BitLocker is in the
public domain
The public domain (PD) consists of all the creative work to which no exclusive intellectual property rights apply. Those rights may have expired, been forfeited, expressly waived, or may be inapplicable. Because those rights have expired, ...
, its implementation in BitLocker, as well as other components of the software, are
proprietary; however, the code is available for scrutiny by Microsoft partners and enterprises, subject to a
non-disclosure agreement
A non-disclosure agreement (NDA) is a legal contract or part of a contract between at least two parties that outlines confidential material, knowledge, or information that the parties wish to share with one another for certain purposes, but wis ...
.
According to Microsoft sources, BitLocker does not contain an intentionally built-in
backdoor, i.e., there is no way for
law enforcement
Law enforcement is the activity of some members of government who act in an organized manner to enforce the law by discovering, deterring, rehabilitating, or punishing people who violate the rules and norms governing that society. The term ...
to have a guaranteed passage to the data on the user's drives that is provided by Microsoft. In 2006, the
UK Home Office expressed concern over the lack of a backdoor and tried entering into talks with Microsoft to get one introduced. Microsoft developer and cryptographer
Niels Ferguson
Niels T. Ferguson (born 10 December 1965, Eindhoven) is a Dutch cryptographer and consultant who currently works for Microsoft. He has worked with others, including Bruce Schneier, designing cryptographic algorithms, testing algorithms and protoco ...
denied the backdoor request and said, "over my dead body."
Microsoft engineers have said that
FBI agents also put pressure on them in numerous meetings in order to add a backdoor, although no formal, written request was ever made; Microsoft engineers eventually suggested to the FBI that agents should look for the
hard copy
''Hard Copy'' is an American tabloid television show that ran in syndication from 1989 to 1999. ''Hard Copy'' was aggressive in its use of questionable material on television, including gratuitous violence.
The original hosts of ''Hard Copy' ...
of the key that the BitLocker program suggests its users to make.
Niels Ferguson's position that "back doors are simply not acceptable"
is in accordance with
Kerckhoffs's principle. Stated by Netherlands born cryptographer
Auguste Kerckhoffs
Auguste Kerckhoffs (19 January 1835 – 9 August 1903) was a Dutch linguistics, linguist and cryptographer in the late 19th century.
Biography
Kerckhoffs was born in Nuth, the Netherlands, as Jean Guillaume Auguste Victor François Huber ...
in the 19th century, the principle holds that a
cryptosystem should be secure, even if everything about the system, except the
key, is public knowledge.
Other concerns
Starting with Windows 8 and Windows Server 2012, Microsoft removed the Elephant Diffuser from the BitLocker scheme for no declared reason. Dan Rosendorf's research shows that removing the Elephant Diffuser had an "undeniably negative impact" on the security of BitLocker encryption against a targeted attack. Microsoft later cited performance concerns, and noncompliance with the
Federal Information Processing Standards
The Federal Information Processing Standards (FIPS) of the United States are a set of publicly announced standards Standard may refer to:
Symbols
* Colours, standards and guidons, kinds of military signs
* Standard (emblem), a type of a lar ...
(FIPS), to justify the diffuser's removal. Starting with Windows 10 version 1511, however, Microsoft added a new FIPS-compliant
XTS-AES encryption algorithm to BitLocker.
Starting with Windows 10 version 1803, Microsoft added a new feature called "Kernel DMA Protection" to BitLocker, against DMA attacks via
Thunderbolt 3 ports.
In October 2017, it was reported that a flaw (
ROCA vulnerability) in a code library developed by
Infineon, which had been in widespread use in security products such as
smartcard
A smart card, chip card, or integrated circuit card (ICC or IC card) is a physical electronic authentication device, used to control access to a resource. It is typically a plastic credit card-sized card with an embedded integrated circuit (IC) c ...
s and TPMs, enabled private keys to be inferred from
public keys. This could allow an attacker to bypass BitLocker encryption when an affected TPM chip is used.
Microsoft released an updated version of the firmware for Infineon TPM chips that fixes the flaw via Windows Update.
See also
*
Features new to Windows Vista
*
List of Microsoft Windows components
*
Vista IO technologies
Windows Vista introduced a number of new I/O functions to the Microsoft Windows line of operating systems. They are intended to shorten the time taken to boot the system, improve the responsiveness of the system, and improve the reliability of dat ...
*
Next-Generation Secure Computing Base
*
FileVault
References
External links
BitLocker Drive Encryption Technical OverviewSystem Integrity Team Blog
{{Windows commands
Windows Server 2008
Windows 11
Windows 10
Windows 8
Windows 7
Windows Vista
Cryptographic software
Microsoft Windows security technology
Disk encryption