Advertisement

Security Notions for Disk Encryption

  • Kristian Gjøsteen
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3679)

Abstract

We define security goals and attack models for disk encryption, and prove several results for the resulting security notions, as well as some relationships. We give concrete constructions for every security notion along with security proofs. We briefly discuss the security of some implementations and standards for disk encryption.

Keywords

Block Cipher Storage Medium Security Goal Read Request Security Notion 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    Bellare, M., Canetti, R., Krawczyk, H.: Keying hash functions for message authentication. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 1–15. Springer, Heidelberg (1996)Google Scholar
  2. 2.
    Bellare, M., Desai, A., Jokipii, E., Rogaway, P.: A concrete security treatment of symmetric encryption. In: FOCS 1997, pp. 394–403 (1997)Google Scholar
  3. 3.
    FIPS 197. Advanced Encryption Standard. Federal Information Processing Standards Publication. National Technical Information Service, Springfield, Virginia (November 2001)Google Scholar
  4. 4.
    Halevi, S., Rogaway, P.: A tweakable enciphering mode. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 482–499. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  5. 5.
    Hughes, J.: Chair of the IEEE security in storage working group (2004), http://www.siswg.org/
  6. 6.
    Iwata, T., Kurosawa, K.: OMAC: One-key CBC MAC. In: Johansson, T. (ed.) FSE 2003. LNCS, vol. 2887, pp. 129–153. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  7. 7.
    Kamp, P.-H.: GBDE – GEOM based disk encryption. In: BSDCON 2003 (2003), http://phk.freebsd.dk/pubs/bsdcon-03.gbde.paper.pdf
  8. 8.
    Katz, J., Yung, M.: Complete characterization of security notions for probabilistic private-key encryption. In: Proceedings of the 32nd Annual Symposium on Theory of Computing, pp. 245–254. ACM, New York (2000)Google Scholar
  9. 9.
    Krawczyk, H.: The order of encryption and authentication for protecting communications (or: How secure is SSL?). In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 310–331. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  10. 10.
    Liskov, M., Rivest, R.L., Wagner, D.: Tweakable block ciphers. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 31–46. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  11. 11.
    Ruusu, J.: LoopAES (2005), http://loop-aes.sourceforge.net/

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Kristian Gjøsteen
    • 1
  1. 1.Department of TelematicsNorwegian University of Science and TechnologyTrondheimNorway

Personalised recommendations