Apple's 'Unbreakable' iOS Device Encryption Highlighted

apple security iconTechnology Review takes a look at the evolution of security on the iPhone, noting how Apple has been able to gain acceptance in government and enterprise by overcoming its initially lax stance on device security to roll out industry-leading encryption options that can defeat essentially all attempts at accessing properly protected devices.

At the heart of Apple's security architecture is the Advanced Encryption Standard algorithm (AES), a data-scrambling system published in 1998 and adopted as a U.S. government standard in 2001. After more than a decade of exhaustive analysis, AES is widely regarded as unbreakable. The algorithm is so strong that no computer imaginable for the foreseeable future—even a quantum computer—would be able to crack a truly random 256-bit AES key. The National Security Agency has approved AES-256 for storing top-secret data.

As Apple highlights in a recent white paper (PDF) on iOS security, this hardware security involves the incorporation of a unique AES-256 key fused into each iOS device and which can not be directly read.

Access to the device's software can be restricted with a PIN passcode, and while the default passcode option for iOS is a four-digit number, users can opt to use significantly longer and more complex passcodes. And with brute-force attacks required to break iOS passcodes needing to be run on the device itself at a speed of 80 milliseconds per attempt, a device with an eight-digit passcode could take up to 15 years to compromise.

"There are a lot of issues when it comes to extracting data from iOS devices," says Amber Schroader, CEO of Paraben, a supplier of forensic software, hardware, and services for cell phones. "We have had many civil cases we have not been able to process ... for discovery because of encryption blocking us."

Most of the information included in this report is not particularly new, and Apple's white paper goes into more detail on the company's efforts to address security on iOS devices, but the report offers an overview of the layers of security Apple has built into its products.

Popular Stories

Generic iOS 18

Apple Announces iOS 18.2 Launching Today With These New Features

Wednesday December 11, 2024 5:23 am PST by
Apple has announced that iOS 18.2, iPadOS 18.2, and macOS Sequoia 15.2 will be released today following more than six weeks of beta testing. For the iPhone 15 Pro and iPhone 16 models, the update introduces additional Apple Intelligence features, including Genmoji for creating custom emoji, Image Playground and Image Wand for generating images, and ChatGPT integration for Siri. There is also ...
iphone 17 pro concept render cameras

Major iPhone 17 Pro Redesign Backed by Supply Chain Info, Claims Leaker

Thursday December 12, 2024 4:36 am PST by
Next year's iPhone 17 Pro models will reportedly feature a major redesign, specifically centering around changes to the rear camera module, and now new supply chain information appears to confirm the striking change, according to a Chinese leaker. iPhone 17 Pro concept render Late last month, The Information's Wayne Ma claimed that the rear of the ‌iPhone 17‌ Pro and ‌iPhone 17‌ Pro...
m4 mac mini hands on

Cloud-Based M4 and M4 Pro Mac Mini Models Now Available

Wednesday December 11, 2024 7:34 am PST by
Developers now have access to cloud-based M4 and M4 Pro Mac mini units via MacWeb, a Silicon Valley-based provider of cloud services. The company has launched three configurations of the new Mac mini, powered by Apple's M4 and M4 Pro chips. Developers and IT teams can rent these machines for tasks ranging from basic development to advanced artificial intelligence modeling, providing an...
macOS Sequoia Night Feature

Apple Releases macOS Sequoia 15.2 With New Apple Intelligence Features

Wednesday December 11, 2024 10:02 am PST by
Apple today released macOS Sequoia 15.2, the second update to the macOS Sequoia operating system that was released in September. macOS Sequoia 15.2 comes over a month after the release of macOS Sequoia 15.1. Mac users can download the ‌macOS Sequoia‌ update through the Software Update section of System Settings. macOS Sequoia 15.2 adds Image Playground, an app that lets you create...
maxresdefault

Apple Releases iOS 18.2 and iPadOS 18.2 With Genmoji, Image Playground, Siri ChatGPT and More

Wednesday December 11, 2024 10:03 am PST by
Apple today released iOS 18.2 and iPadOS 18.2, the second major updates to the iOS 18 and iPadOS 18 updates that came out in September. The new updates come over a month after Apple released iOS 18.1 and iPadOS 18.1. Subscribe to the MacRumors YouTube channel for more videos. The new software can be downloaded on eligible iPhones and iPads over-the-air by going to Settings > General >...
macbook air m2 13 inch

macOS Sequoia 15.2 Confirms New M4 MacBook Air Models Are Coming

Wednesday December 11, 2024 10:54 am PST by
Apple today made a mistake with its macOS Sequoia 15.2 update, releasing the software for two Macs that have yet to be launched. There is a software file for "Mac16,12" and "Mac16,13," which are upcoming MacBook Air models. The leaked software references the "MacBook Air (13-inch, M4, 2025)" and the "MacBook Air (15-inch, M4, 2025)," confirming that new M4 MacBook Air models are in...
Generic iOS 18

Apple Seeds Second Release Candidate Versions of iOS 18.2 and More With Genmoji, Image Playground and ChatGPT Integration

Monday December 9, 2024 10:06 am PST by
Apple today seeded the second release candidate versions of upcoming iOS 18.2, iPadOS 18.2, and macOS 15.2 updates to developers and public beta testers for testing purposes, a week after releasing the first RCs. The first iOS 18.2 RC had a build number of 22C150, while the second RC's build number is 22C151. Release candidates represent the final version of beta software that's expected to see a ...

Top Rated Comments

chainprayer Avatar
161 months ago
Will Apple phone tech support tell you your key if you give them your home address and last 4 digits of your credit card number?
Score: 44 Votes (Like | Disagree)
BC2009 Avatar
161 months ago
So the best approach would be to hack the user instead of the device...
*Phone Rings*

Hi this is Tom calling from Apple. We noticed some recent activity on your iTunes account potentially originating from your iPhone and we need your iPhone device passcode to verify whether or not these charges for $45,912 are fraudulent so we can refund your money.

...
Score: 14 Votes (Like | Disagree)
KnightWRX Avatar
161 months ago
Security works in layers. Implementing a layer is as important as implementing the whole. People saying this is useless are only looking at it at the layer level.

Sure the passkey can be gotten from social engineering. However, this is not what this layer of security protects. This protects someone from accessing what is on the NAND memory if they have physical access to the device itself, but not the user (stolen/lost iPhone). This is a requirement for enterprises as they do not want their secrets to fall into the wrong hands.

As such, Blackberries were highly regarded.
Score: 8 Votes (Like | Disagree)
Zunjine Avatar
161 months ago
Not to be picky.

"Not to be picky" is as certain the preceed pickiness as "with all due respect" is certain to forshadow an utter lack thereof.
Score: 8 Votes (Like | Disagree)
Bezetos Avatar
161 months ago
Big deal. Most smartphones use encryption.

Moreover:

(...) a device with an eight-digit passcode could take up to 15 years to compromise.
That's not true.

Direct quote from Apple's white paper (http://images.apple.com/ipad/business/docs/iOS_Security_May12.pdf):
The iteration count is calibrated so that one attempt takes approximately 80 milliseconds. This means it would take more than 5½ years to try all combinations of a six-character alphanumeric passcode with lowercase letters and numbers, or 2½ years for a nine-digit passcode with numbers only.

An eight-digit passcode would "only" take 92 days to compromise. A four-digit passcode (from my experience the most popular one) would only take 13 minutes to compromise.
Score: 7 Votes (Like | Disagree)
gjwfoasfsaevg Avatar
161 months ago
So Apple is using AES. Big deal. Most systems are not cracked by breaking the encryption algorithm, but by exploiting weaknesses in key management. XBOX, PS3, Bluray, iCloud, FileVault are notable examples where the best encryption algorithm in the world wouldn't have changed anything.
Score: 7 Votes (Like | Disagree)