Monday, March 3, 2014

- Apple iOS Security Paper


Snippets:

Every iOS device has a dedicated AES 256 crypto engine built into the DMA path between the flash storage and main system memory, making file encryption highly efficient


Data Protection is implemented by constructing and managing a hierarchy of keys, and builds on the hardware encryption technologies built into each iOS device. Data Protection is controlled on a per-file basis by assigning each file to a class; accessibility is determined by whether the class keys have been unlocked.

The passcode is “tangled” with the device’s UID, so brute-force attempts must be per- formed on the device under attack. A large iteration count is used to make each attempt slower. The iteration count is calibrated so that one attempt takes approximately 80 milliseconds. This means it would take more than 5½ years to try all combinations of a six-character alphanumeric passcode with lowercase letters and numbers



Link Below:

http://images.apple.com/iphone/business/docs/iOS_Security_Feb14.pdf

No comments:

Post a Comment