BitLocker Drive Encryption Flow
BitLocker Drive Encryption Flow
Abstract
This paper provides information about Microsoft® BitLocker™, a security feature
that is available in certain Microsoft Windows® operating systems. It provides
guidelines for IT administrators and advanced users to understand the different
scenarios that BitLocker supports, the user interfaces that help set up and manage
keys in the product, and the user experience flow.
This information applies for the Microsoft Windows Vista™ operating system.
The current version of this paper is maintained on the Web at:
http://www.microsoft.com/whdc/system/platform/hwsecurity/BitLockerFlow.mspx
Contents
Overview.................................................................................................................................. 3
Basic BitLocker Use Scenario (TPM-Only)..............................................................................5
Two-Layer Protection Use Scenarios.......................................................................................6
Two-Factor Protection: TPM and PIN..................................................................................7
Two-Layer Protection: TPM and Startup Key......................................................................8
Startup Key-Only Use Scenario.............................................................................................10
Recovery Use Scenarios.......................................................................................................12
Accessing a Protected Volume by Using a Recovery Key................................................13
Accessing a Protected Volume by Using a Recovery Password......................................14
Disabling Protection Use Scenario........................................................................................16
BitLocker Setup Wizard User Experience..............................................................................17
Control Panel Main Page..................................................................................................18
Option to Use a Startup Key or PIN for Added Security....................................................18
Save a Startup Key on a USB Drive.................................................................................19
Set a Startup PIN..............................................................................................................20
Create a Recovery Password...........................................................................................21
Option to Save the Recovery Password...........................................................................22
Save a Recovery Password to a USB Drive.....................................................................22
Show the Recovery Password..........................................................................................23
Print the Recovery Password............................................................................................23
Save the Password in a Folder.........................................................................................24
Recovery Warning.............................................................................................................24
Encrypt the Volume...........................................................................................................25
Pre-Windows Boot and Recovery User Experience..............................................................25
Key Management User Experience.......................................................................................29
Manage Keys Options.......................................................................................................30
Duplicating the Recovery Password.................................................................................31
Duplicating the Startup Key...............................................................................................31
Resetting the PIN..............................................................................................................31
Definitions.............................................................................................................................. 31
Appendix................................................................................................................................ 33
Key Architecture and Design.............................................................................................33
Administration................................................................................................................... 36
BitLocker Drive Encryption: Scenarios, User Experience, and Flow - 2
Disclaimer
This is a preliminary document and may be changed substantially prior to final commercial release of the
software described herein.
The information contained in this document represents the current view of Microsoft Corporation on the
issues discussed as of the date of publication. Because Microsoft must respond to changing market
conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot
guarantee the accuracy of any information presented after the date of publication.
This White Paper is for informational purposes only. MICROSOFT MAKES NO WARRANTIES,
EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT.
Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights
under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval
system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or
otherwise), or for any purpose, without the express written permission of Microsoft Corporation.
Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property
rights covering subject matter in this document. Except as expressly provided in any written license
agreement from Microsoft, the furnishing of this document does not give you any license to these
patents, trademarks, copyrights, or other intellectual property.
Unless otherwise noted, the example companies, organizations, products, domain names, e-mail
addresses, logos, people, places and events depicted herein are fictitious, and no association with any
real company, organization, product, domain name, email address, logo, person, place or event is
intended or should be inferred.
Microsoft, Active Directory, BitLocker, Windows, Windows Server, and Windows Vista are either
registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.
The names of actual companies and products mentioned herein may be the trademarks of their
respective owners.
Overview
Microsoft® BitLocker™ Drive Encryption is a feature in Microsoft Windows Vista™
Enterprise and Ultimate editions that protects data when a computer is in
unauthorized hands or is running an exploiting operating system. BitLocker does
this by preventing an unauthorized user who boots another operating system or
runs a software hacking tool from breaking Windows Vista file and system
protections, or even viewing the files that make up the operating system itself. The
same technology also cryptographically secures the hibernation file, which contains
all programs and documents that were open when the computer hibernated.
BitLocker is a hardware-based security feature that addresses the growing need for
better data protection. The feature uses a hardware device, the Trusted Platform
Module (TPM) 1.2 to protect user data and to ensure that a PC that is running
Windows Vista has not been tampered with while the system was offline. BitLocker
provides both mobile and office enterprise information workers with more data
protection when their systems are lost or stolen. Specific logo requirements must be
satisfied to ensure proper functioning of BitLocker with TPM. BitLocker can also be
used on Windows Vista computers without a TPM.
Note: The TPM is a microcontroller root of trust and can be leveraged to provide a
variety of cryptographic services. TPM v1.2 with compatible BIOS upgrades gives
BitLocker the ability to validate the integrity of critical early boot components and a
transparent startup experience. The nature of this chip ensures that the information
that is stored there is more secure from external software attacks and physical theft.
BitLocker can be transparent to the user and is easy to deploy and manage. When
a system is compromised, BitLocker has a simple and efficient recovery process for
authorized users.
BitLocker Drive Encryption:
Ensures boot integrity because it is:
Resilient to attack. It protects the system from offline software-based
attacks.
Locks the system when tampered with. If any monitored files are
altered or deleted, the system will not boot. This alerts users to changes in
their system.
VMK is an indirect way of protecting data on the disk volume. The addition of the
VMK allows the system to rekey easily when keys upstream in the trust chain are
lost or compromised, given that decrypting and reencrypting the entire disk volume
is expensive.
In the basic use scenario, the VMK is bound, or sealed, to the TPM 1.2 security
hardware. Access to data on the protected operating system volume is possible if
the TPM successfully validates the integrity of critical early boot components in the
operating system. The default TPM platform validation profile secures the VMK
against changes to the Master Boot Record (MBR) Code (PCR 4), the NTFS Boot
Sector (PCR 8), the NTFS Boot Block (PCR 9), the NTFS Boot Manager (PCR 10),
and the Volume Key and Critical Components (PCR 11).
Recovery mechanisms exist for authorized users who encounter legitimate recovery
scenarios. For example, if the TPM fails validation due to a necessary upgrade, if
the system board that contains the TPM is replaced, or if the hard drive that
contains the operating system volume is moved to another computer, the system
enters recovery mode and the user can use a recovery key that is stored on a USB
key.
After BitLocker authenticates access to a protected operating system volume, a
filter driver in the Windows Vista file system stack uses the FVEK to encrypt and
decrypt disk sectors transparently as data is written to and read from the protected
volume. When the computer hibernates, an encrypted hibernation file is saved to
the protected volume. Pending access authentication, this saved file is decrypted
when the computer resumes from hibernation.
This document presents multiple BitLocker user scenarios and describes setup,
management, and recovery. Screenshots, diagrams, and examples demonstrate
how a local or domain administrator can use the BitLocker Setup Wizard, the key
management user interface (UI), or easily-deployable scripts to turn on and manage
BitLocker, and how a users can access their data in recovery scenarios.
Note that because Windows Vista has not been released, actual screenshots, text,
and flows may change.
Notes on Terminology in This Document
The term volume means an area of storage on a hard disk. A volume is
formatted by using a file system, such as NTFS, and has a drive letter that is
assigned to it. This is different from a partition, which is a portion of a physical
disk that functions as though it were a physically separate disk. After a partition
is created, it must be formatted and assigned a drive letter before data can be
stored on it. A volume could exist for each partition on a hard drive, or volumes
can span multiple partitions. BitLocker works with volumes, not partitions.
The term boot volume is the volume that contains the Windows operating
system and its support files, In this document, the Windows Vista terminology
operating system volume is used. The system volume is the volume that
contains the required hardware-specific files to load Windows on x86-based
computers after the BIOS has booted the platform. In this document, this is
called the system (active) volume. For BitLocker to work, the system volume
must not be encrypted, must differ from the operating system volume, and must
be formatted with NTFS.
Scripting Support
Note: The method names in this section are exposed through the BITLOCKER
Windows Management Instrumentation (WMI) Provider, Win32_EncryptableVolume.
1. Use ProtectKeyWithTPM to secure the encryption key for the volume to the
TPM.
2. Create recovery binary large objects (BLOBs):
Use ProtectKeyWithExternalKey to create a recovery key.
Use ProtectKeyWithNumericalPassword to create a recovery
password.
3. Use Encrypt to encrypt the volume.
4. Use GetConversionStatus to indicate when the volume is fully encrypted.
5. Use GetProtectionStatus to ensure that BitLocker protection is turned on.
6. Use Decrypt to decrypt the volume and turn off BitLocker protection.
In the first type, the user is authenticated with two-factor authentication: what the
user has (the TPM) and what the user knows (a PIN). In the second type, the user
uses two things (the TPM and a USB device) to authenticate.
Although the startup key is required from power-up until Windows logon, it should
be removed afterwards to secure two-layer authentication.
User Interface Support
1. In Control Panel, navigate to the BitLocker icon in the Security item to turn on
BitLocker and enable startup key support.
Click Turn On BitLocker to run the BitLocker Setup Wizard.
Create a recovery key and/or a recovery password as part of the setup
process.
Use the Create a startup key for added security dialog box to add a
startup key.
For more information, see screen 1 in Figure 7, later in this paper
2. Duplicate the startup key through the Manage Keys link in the Control Panel
BitLocker item.
The following security notes exist in Windows Vista:
After BitLocker protection is turned on, the startup key cannot be added
without first decrypting the disk and turning off BitLocker.
After the startup key is created and BitLocker protection is turned on, the
startup key cannot be removed without first turning off BitLocker.
After the startup key is created and BitLocker protection is turned on, the
startup key cannot be changed without first turning off BitLocker.
Scripting Support
1. Use ProtectKeyWithTPMAndStartupKey to secure the encryption key for the
volume to the TPM, enhanced with startup key authentication.
2. Create recovery BLOBs:
Use ProtectKeyWithExternalKey to create a recovery key.
Use ProtectKeyWithNumericalPassword to create a recovery
password.
3. Use Encrypt to encrypt the volume.
4. Use GetConversionStatus to indicate when the volume is fully encrypted.
5. Use GetProtectionStatus to ensure that BitLocker protection is turned on.
6. Use Decrypt to decrypt the volume and turn off BitLocker protection.
7. Use DeleteKeyProtector to remove the TPM-plus-startup-key authentication
BLOB.
8. Use ProtectKeyWithTPMAndStartupKey again to re-create the TPM-plus-
startup-key BLOB (with possibly a different startup key).
Panel. The system generates a startup key when the user inserts a USB flash drive,
and saves the startup key. The USB device is now required for booting (or resuming
from hibernation).
The user inserts the USB flash drive and turns on the computer. The PC boots into
the operating system, and the user can start using the system normally. For a
diagram of the process of decrypting data on a protected volume by using external
media only (for example, no TPM), see Figure 4.
Using the Control Panel BitLocker item, the user can create a backup (copy) of the
startup key on a destination of his choosing.
Another scenario is volume recovery. If the user’s system is damaged and he must
move the hard drive to a new machine, he can use the recovery key on his external
device to decrypt and recover the volume.
The overall BitLocker security of a system that uses a startup-key-only scenario is
not at the same high level as the security of a system that uses a TPM.
User Interface Support
1. Create and save a startup key as part of the BitLocker Setup Wizard.
For more information, see screen 1 in Figure 7, later in this paper.
2. Save the created startup key as part of the key management interface.
3. Insert the startup key as part of the boot process.
The following security notes exist in Windows Vista:
After creation, the startup key cannot be changed.
After creation, the startup key cannot be removed or revoked.
Scripting Support
1. Use ProtectKeyWithExternalKey to create an external key that is used as a
startup key for a computer without a compatible TPM.
2. Use SaveExternalKeyToFile to write a file that contains the startup key to a
USB flash drive or another location.
3. Use UnlockWithExternalKey to unlock a volume with a startup key.
4. Use GetKeyProtectors to list the created external keys for a disk volume.
5. Use DeleteKeyProtector to remove the external key authentication BLOB that is
associated with a created startup key.
6. Use GetKeyProtectorExternalKey to retrieve the key contents of a created
startup key BLOB.
Figure 4. Volume decryption process with startup key from external media
and no TPM
If an external device is lost, the startup key can be revoked through volume
reencryption. The volume must be recovered by using the recovery key or the
recovery password and a new startup key generated. All other volumes that also
use the lost startup key must undergo a similar procedure.
Scripting Support
1. Use ProtectKeyWithExternalKey to create a recovery key.
Note that this method can be used even if a recovery key BLOB already exists
or BitLocker protection has already been turned on.
2. Use SaveExternalKeyToFile to write a file that contains the recovery key to a
USB flash drive or another location.
3. Use UnlockWithExternalKey to unlock a volume with the recovery key.
4. Use GetKeyProtectors to list the created recovery keys for a disk volume.
5. Use DeleteKeyProtector to remove the external key authentication BLOB that is
associated with a created recovery key.
2. Save or print a copy of the created recovery password as part of the key
management interface.
3. Input the recovery password as part of the pre-Windows text-mode recovery
interface.
For more information, see "Pre-Windows Boot and Recovery User Experience,"
later in this paper.
The following security notes exist in Windows Vista:
After creation, the recovery password cannot be changed.
After creation, the recovery password cannot be removed or revoked.
After BitLocker is enabled, a new recovery password cannot be added.
Scripting Support
1. Use ProtectKeyWithNumericalPassword to create a recovery password.
Note that this method can be used even if a recovery password BLOB already
exists or BitLocker protection has already been turned on.
If Active Directory backup is enabled or required by Group Policy, this method
also stores the recovery password to Active Directory.
2. Use UnlockWithNumericalPassword to unlock a volume with a recovery
password.
3. Use GetKeyProtectors to list the created recovery passwords for a disk volume.
4. Use DeleteKeyProtector to remove the numerical password authentication
BLOB that is associated with a created recovery password.
5. Use GetKeyProtectorNumericalPassword to retrieve the numerical password
content of a created recovery password BLOB.
This screen is used to choose either a startup key (on a USB flash drive) or a PIN
for additional security, assuming that a TPM is present. Users can also choose not
to add this layer of protection.
If a TPM is not being used, only the Save a Startup Key on a USB Drive option is
available. The Set a Startup PIN and Don't Use a Startup Key or Pin options are
unavailable because they rely on a TPM.
For more information, see "Two-Layer Protection: TPM and Startup Key," earlier in
this paper.
This screen is used to choose a USB drive on which to save a startup key. With this
option, the user must insert the key before starting the computer.
This screen offers the option to enter a 4- to 20-digit PIN. Setting a PIN adds an
extra factor of authentication protection. For more information, see "Two-Factor
Protection: TPM and PIN," earlier in this paper.
Domain administrators can require or disallow PIN creation.
This screen is used to create a recovery password. For more information on how
the recovery password is used, see "Accessing a Protected Volume by Using a
Recovery Password," earlier in this paper. If the user chooses to create a recovery
password, screen 4 (shown in Figure 13) appears, which has options on the format
of the recovery password.
Domain administrators can use their Group Policy to require or disallow recovery
password creation.
This screen is used to save the recovery password to a USB drive or a folder, to
display the password, or to print the password. For more information on how the
recovery password is used, see "Accessing a Protected Volume Using a Recovery
Password," earlier in this paper.
This screen is used to save a recovery password on a USB flash drive. For more
information on how this recovery password is used, see "Recovery Scenario by
Using a Recovery Key," earlier in this paper.
Users should not save the recovery password on the same USB flash drive that
they use for the startup key. If they lose that flash drive, they may lose access to
their data.
Domain administrators can use Group Policy to require or disallow recovery
password creation.
This screen offers the option to save a recovery key as a file to a folder, such as a
folder on a network share. For more information on how this recovery key is used,
see "Recovery Scenario by Using a Recovery Key," earlier in this paper.
Domain administrators can use Group Policy to require or disallow recovery
password creation.
Recovery Warning
This screen appears only if none of these four recovery creation options has been
chosen:
Save a recovery password to a file.
Print a recovery password.
Save a recovery key to a pluggable USB storage device.
Save a recovery key file to a folder.
Domain administrators can turn off the appearance of this warning screen through
Group Policy.
This screen notifies the users that the encryption of the volume is about to begin.
The amount of time that this step takes is directly related to the size of the volume.
However, encryption is performed in the background so that the computer can
continue to be used while the volume is being encrypted. In addition, the
administrator can pause and resume encryption at any time. Encryption is
automatically paused when the computer is turned off or hibernated and can be
resumed when the computer is turned on again. Encryption takes approximately
one minute per gigabyte (GB).
Figure 20 illustrates the flow of this boot-time unlocking process and shows when
pre-Windows text-mode interface is presented to the user.
For all system boot process scenarios, if the required method of authentication is
present, the operating system volume unlocks and continues booting.
If the required method of authentication is not present, the interface appears as
shown in the following paragraphs.
If the Startup Key is not present (screen 1):
The key required to unlock this volume was not found.
Please insert removable storage media containing the Startup Key
or the Recovery Key.
Then press ENTER to reboot.
If the media is inserted and the correct key is found (screen 0 in Figure 20):
You may now remove the media.
When the PIN is enabled, when booting (or resuming from hibernation), the user
sees a screen that requests the PIN (screen 2 in Figure 20):
To start this computer, type its BitLocker Drive Encryption
startup PIN and then press Enter.
If the PIN that is entered is incorrect, the following error text appears (screen 3 in
Figure 20):
The startup PIN you entered is not correct for this disk volume.
Pressing ESC opens a screen that is determined by the recovery mechanism that
the user set up. If the user did not set up an external media recovery key, the
password-based recovery screen appears. If the user did set up a recovery key, the
external media-based recovery-key screen appears.
At boot time, if the USB storage device that contains the recovery key has not been
inserted, the key has not been found, or the key is incorrect, the following message
appears (screen 1 in Figure 20):
The key required to unlock this volume was not found.
The same message appears if the recovery key is not found on the inserted USB
storage device, is found but is invalid, and so on.
Pressing ESC opens the password-based recovery screen, if a recovery password
was set. The recovery screen now appears (screen 5 in Figure 20):
To start this computer, type its 48-digit BitLocker Drive
Encryption recovery password and then press Enter.
If an incorrect password was entered, the error text that is associated with this
screen appears (screen 6 in Figure 20):
The recovery password you entered is not correct for this disk
volume.
The flow for managing keys is shown in Figure 21. Each screenshot is subsequently
available at a larger scale later in this section.
This screen shows the user all the key management options that this feature offers:
Duplicate the recovery password
Duplicate the recovery key
Reset PIN
Each of these keys and authentication values is defined in earlier sections of this
document, along with use scenarios for each.
Definitions
BLOB
binary large object; any cryptographically-protected piece of data. For example,
the VMK is sealed to the TPM but the resulting BLOB returned by the
TPM_Seal operation is actually stored on disk. Similarly, the VMK can be
encrypted by a clear key, external key, or recovery password and stored on disk
as a BLOB.
BDE
BitLocker Drive Encryption; the Windows Vista feature that enables disk
volumes to be encrypted and protected with a TPM.
BitLocker disabled
A condition in which the disk volume is encrypted, but the FVEK that is used to
encrypt the operating system volume is freely available via a clear key. Although
the volume is encrypted, security is effectively disabled.
BitLocker enabled
A condition in which data on the volume is encrypted as it is written and
decrypted as it is read. When the computer starts, successful validation of
critical early boot components by the TPM (in conjunction with a startup key or
PIN, if configured), input of a recovery password, or a insertion of USB flash
drive that contains a recovery key is required to decrypt the VMK and access
the volume.
BitLocker off
When BitLocker protection is off on a disk volume, a condition in which the disk
volume is not encrypted and BitLocker protection is not in effect. This is a disk
volume with a standard clear text file format.
BitLocker on
Same as BitLocker enabled.
clear key
A key that is stored in the clear on the disk volume. This key is used to freely
access the VMK and, in turn, the FVEK when BitLocker protection is disabled
but the disk volume remains encrypted. See BitLocker disabled.
external key
A key that is stored external to the system (for example, USB flash drive). This
key can be used as a startup key or a recovery key. A copy of the external key
is stored encrypted on disk by the VMK and can be retrieved by an
administrator after Windows has loaded.
Appendix
Key Architecture and Design
To achieve a higher level of security without greatly affecting usability, BitLocker
supports different types of cryptographic algorithms and encryption layers, including
multifactor authentication. In general, to add additional layers of security when
protecting data, multifactor security uses:
What you have (for example, the TPM or a USB flash drive with a startup
key)
What you know (for example, a PIN)
What you are
The main goal of BitLocker is to protect user data on the operating system volume.
To achieve this, disk sectors are encrypted with a full-volume encryption key
(FVEK), which is always encrypted with the volume master key (VMK), which, in
turn, is bound to the TPM (in TPM scenarios).
The VMK directly protects the FVEK and therefore, protecting the VNK becomes
critical. This strategy of protecting the VMK indirectly protects the encrypted volume
and has the advantages that:
The system can regenerate keys upstream in the chain if one or more of
these keys are lost or compromised.
The recovery process can be done without decrypting and reencrypting the
entire volume, which is expensive in terms of the user’s time.
As Figure A1 shows, there are several different ways to encrypt the VMK.
Protecting the Volume Master Key (VMK)
Authentication VMK BLOB Algorithm to
scenario encrypt VMK
Default: TPM only SRK(VMK) RSA
TPM plus PIN (SRK+SHA256(PIN))(VMK) RSA
TPM plus startup key SHA256(SRK(DerivedKey), StartupKey) AES
(VMK)
Recovery key RecoveryKey(VMK) AES
Recovery password (Chained-hashing(Password),Salt)(VMK) AES
Clear key ClearKey(VMK) AES
Keys are generated at BitLocker setup time and related BLOBs are stored on the
protected disk volume.
The SRK is the storage root key that the TPM holds. It is a 2,048-bit RSA key pair
that is generated when ownership of the TPM is taken. The SRK referred to here as
an RSA key is actually the public key; the private key member of the pair is never
shown. The SRK is stored within the nonvolatile protected memory of the TPM and
cannot be removed. This helps ensure that the private key material cannot be
leaked and prevents keys from being used on any platform other than the one on
which they were created. However, mechanisms are available to migrate keys from
one TPM to another, for backup and disaster recovery purposes.
All TPM key operations are based off the SRK. When ownership of the TPM is
taken, the new owner must specify two pieces of authorization information: the
ownership authorization and the SRK usage authorization. This SRK usage
authorization is required for each TPM operation. Because this is undesirable from
a usability point of view and secure startup requires that this information be known
very early in the boot process, the TPM administrative tools sets this usage
authorization to a known value of all zeroes (20 bytes of 0). The SRK is rekeyed
each time the owner changes.
Derived keys are generated from other data (for example, numeric password) and
become part of the basis for another key. In the preceding table, DerivedKey is a
256-bit intermediate symmetric key, randomly generated and stored on disk that is
encrypted with the SRK.
The design to store the BLOBs with their corresponding disk volume implies that if a
volume is moved to another machine and then back onto a machine with the
original TPM, all existing protection BLOBs remain in effect and recovery is not
triggered.
The only way to change the VMK and FVEK for an encrypted volume is to decrypt
and reencrypt the volume. After BitLocker protection is on, the key management UI
allows administrators to reset the PIN and copy the startup key, recovery key, and
recovery password. Scripting allows administrators to add, remove, copy, and
change PIN, startup key, recovery key, and recovery password.
When the two-factor (or two-layer) authentication is enabled (for example, through
creating a PIN or startup key), the VMK BLOB that was encrypted with only the
TPM is removed. This causes the system, at next boot, to require the two-layer
authentication, instead of working with only a TPM. Script writers must remove any
TPM-only BLOBs from the disk volume if the intention is to apply the TPM-plus-PIN
or TPM-plus-startup-key authentication instead of the TPM-only authentication.
Administration
The administrator controls all aspects that are related to BitLocker Drive Encryption.
By using Group Policy (GP), the administrator can enable, disable, or make optional
authentication scenarios and recovery mechanisms.
By using BitLocker Group Policy, the administrator can:
Set Group Policy to enable backup of BitLocker and TPM recovery
information to Active Directory.
Set up UI policies to:
Establish which security scenarios are enabled, disabled, or optional.
Establish which recovery mechanisms are enabled, disabled, or
optional.
Modify as required default settings, which are everything optional,
except for the recovery password, which is mandatory. Note that there is no
scripting support for the UI setup GP configuration.
Set up encryption and validation policies (for example, the disk volume’s
encryption method).