5

My question could be silly, but I haven't found confirmations on the topic

Does using a TPM improve Windows BitLocker's performance than relying only on PIN/USB/token authentication?

In my case I need to change motherboard to get TPM support, but I won't change the CPU, which is an AMD Phenom II.

To my recollection the answer should be a plain NO because the TPM acts only as cryptographic storage of keys and cryptographic operations on the disk's data is done by the CPU with performance based on hardware encryption acceleration.

That would mean the performance downgrade depends on the ability of the Phenom (or any other CPU) to perform ciphering fast.

This question is not obviously about security. And pre-boot authentication delay (e.g. the time to type the PIN) does not count as performance to me.

usr-local-ΕΨΗΕΛΩΝ
  • 4,592
  • 16
  • 67
  • 103
  • Yes but when using PIN + TPM the tpm holds the key. When pin only there is no hardware involved in key store and decryption – usr-local-ΕΨΗΕΛΩΝ Nov 07 '17 at 17:42
  • Well, I have tried to focus the scope of my question on data cipher performance. I just don't care about pre-boot authentication phase, but the whole question could be rephrased as "do I get better disk I/O benchmarks with a TPM?" – usr-local-ΕΨΗΕΛΩΝ Nov 07 '17 at 19:15

1 Answers1

7

The TPM is not used during normal encrypted data access operations.

BitLocker doesn't use the TPM to store the key used to perform the on-the-fly decrypt/encrypt operations that protect data on a BitLocker-encrypted volume. It's a little complicated, but here is a brief explanation of how the relevant keys are used:

  1. Data written to a BitLocker-protected volume is encrypted with a full-volume encryption key (FVEK). This key does not change until BitLocker is completely removed from a volume.
  2. The FVEK is encrypted with the volume master key (VMK) then stored (in its encrypted form) in the volume's metadata.
  3. The VMK in turn is encrypted with one or more protectors, such as a TPM or Recovery key.

You can combine the TPM with a numeric PIN or with a partial key stored on a USB drive for increased security. Each of these is a form of two-factor authentication. If your computer does not have a compatible TPM chip and BIOS, BitLocker can be configured to store a key protector completely on a USB drive. This is called a startup key. BitLocker can be disabled without decrypting the data; in this case, the VMK is protected only by a new key protector that is stored unencrypted. Note that this clear key allows the system to access the drive as if it were unprotected.

The following picture displays the reverse process happening when user authenticates with BitLocker (note that authentication usually mean hardware attestation from the TPM)

Scheme of disk decryption

It's clear that the TPM's role is to simply "store" an encrypted copy of the VMK, which in turn is used to decrypt the FVEK. It's the FVEK that's used in the actual encryption/decryption process used when data is accessed on the disk.

More information about this process can be found on TechNet.

I say Reinstate Monica
  • 25,487
  • 19
  • 95
  • 131
  • I am going to edit the answer and add some excerpts of the excellent TechNet article, and then accept it. That was just exactly what I wanted to know, confirming my understanding of FDE inner workings – usr-local-ΕΨΗΕΛΩΝ Nov 08 '17 at 13:00
  • I'm just so tired. Not op, but I wanted my personal PC disk encrypted for the sole purpose of protecting from a thief walking out the door with work files on it. My Mac is encrypted by default. PC? I had to buy a TPM module, then find out device encryption fails due to Modern Standby and DMA Capable Bus (???). Conflicting info from Microsoft and all over the web as to what does what and what requires what. Pay to upgrade Win Home to Pro... Bitlocker works! So why did device encryption fail? Now I discover the TPM module doesn't do the encryption and the CPU does. Why is this so inaccessible??? – square_eyes Jul 21 '21 at 20:57