- Source: Data Protection API
Data Protection Application Programming Interface (DPAPI) is a simple cryptographic application programming interface available as a built-in component in Windows 2000 and later versions of Microsoft Windows operating systems. In theory, the Data Protection API can enable symmetric encryption of any kind of data; in practice, its primary use in the Windows operating system is to perform symmetric encryption of asymmetric private keys, using a user or system secret as a significant contribution of entropy. A detailed analysis of DPAPI inner-workings was published in 2011 by Bursztein et al.
For nearly all cryptosystems, one of the most difficult challenges is "key management" – in part, how to securely store the decryption key. If the key is stored in plain text, then any user that can access the key can access the encrypted data. If the key is to be encrypted, another key is needed, and so on. DPAPI allows developers to encrypt keys using a symmetric key derived from the user's logon secrets, or in the case of system encryption, using the system's domain authentication secrets.
The DPAPI keys used for encrypting the user's RSA keys are stored under %APPDATA%\Microsoft\Protect\{SID} directory, where {SID} is the Security Identifier of that user. The DPAPI key is stored in the same file as the master key that protects the users private keys. It usually is 64 bytes of random data.
Security properties
DPAPI doesn't store any persistent data for itself; instead, it simply receives plaintext and returns ciphertext (or conversely).
DPAPI security relies upon the Windows operating system's ability to protect the master key and RSA private keys from compromise, which in most attack scenarios is most highly reliant on the security of the end user's credentials. A main encryption/decryption key is derived from user's password by PBKDF2 function. Particular data binary large objects can be encrypted in a way that salt is added and/or an external user-prompted password (aka "Strong Key Protection") is required. The use of a salt is a per-implementation option – i.e. under the control of the application developer – and is not controllable by the end user or system administrator.
Delegated access can be given to keys through the use of a COM+ object. This enables IIS web servers to use DPAPI.
Active Directory backup keys
When a computer is a member of a domain, DPAPI has a backup mechanism to allow data deprotection in case the user's password is lost, which is named "Credential Roaming".
When installing a new domain on a domain controller, a public and private key pair is generated, associated with DPAPI.
When a master key is generated on a client workstation, the client communicates through an authenticated RPC call with a domain controller to retrieve a copy of the domain's public key. The client encrypts the master key with the domain controller's public key. Finally, it stores this new backup master key in its AppData directory, just like traditional master key storage.
Use of DPAPI by Microsoft software
While not universally implemented in all Microsoft products, the use of DPAPI by Microsoft products has increased with each successive version of Windows. However, many applications from Microsoft and third-party developers still prefer to use their own protection approach or have only recently switched to use DPAPI. For example, Internet Explorer versions 4.0–6.0, Outlook Express and MSN Explorer used the older Protected Storage (PStore) API to store saved credentials such as passwords etc. Internet Explorer 7 now protects stored user credentials using DPAPI.
Picture password, PIN and fingerprint in Windows 8
Encrypting File System in Windows 2000 and later
SQL Server Transparent Data Encryption (TDE) Service Master Key encryption
Internet Explorer 7, both in the standalone version available for Windows XP and in the integrated versions available in Windows Vista and Windows Server 2008
Microsoft Edge
Windows Mail and Windows Live Mail
Outlook for S/MIME
Internet Information Services for SSL/TLS
Windows Rights Management Services client v1.1 and later
Windows 2000 and later for EAP/TLS (VPN authentication) and 802.1x (WiFi authentication)
Windows XP and later for stored user names and passwords (aka Credential Manager)
.NET Framework 2.0 and later for System.Security.Cryptography.ProtectedData
Microsoft.Owin (Katana) authentication by default when self-hosting (including cookie authentication and OAuth tokens)
References
External links
Le fonctionnement de DPAPI par Processus Thief (FR) Archived 2022-10-20 at the Wayback Machine
Windows Data Protection API (DPAPI) white paper by NAI Labs
Data encryption with DPAPI
How To: Use DPAPI (User Store) from ASP.NET 1.1 with Enterprise Services
System.Security.Cryptography.ProtectedData in .NET Framework 2.0 and later
Discussion of the use of MS BackupKey Remote Protocol by DPAPI to protect user secrets
The Windows PStore
Kata Kunci Pencarian:
- Kota Depok
- Kota Bandung
- Lokomotif CC205
- Stasiun Yogyakarta
- Britania Raya
- Stasiun Gambir
- Stasiun Pasar Senen
- Daerah Istimewa Yogyakarta
- Jawa Timur
- Majapahit
- Data Protection API
- Windows 2000
- API
- Open Database Connectivity
- Transparent data encryption
- Executable-space protection
- Features new to Windows XP
- KeePass
- List of PBKDF2 implementations
- Carbon (API)