Disk encryption... (not only) in Linux. Milan Brož
|
|
|
- Barnard Floyd
- 10 years ago
- Views:
Transcription
1 Disk encryption... (not only) in Linux Milan Brož
2 FDE - Full Disk Encryption FDE (Full Disk Encryption) whole disk FVE (Full Volume Encryption) just some volumes (dis)advantages? + for notebook, external drives (offline protection) + transparent for filesystem + no user decision later what to (not) encrypt + hibernation, swap + key removal = easy data disposal - more users whole disk accessible - key disclosure complete data leak - for sw sometimes performance problems
3 FDE - Full Disk Encryption Examples (illustrative) sw userspace sw driver Truecrypt (FUSE handled) dm-crypt, Truecrypt (native), loop-aes,... (encryption on CPU) driver + hw AES-NI, Via Padlock, special chips (mobile) (hw acceleration) hw disk controller Chipset FDE External disk drives with USB interface with "full hw encryption" on-disk HDD FDE special SSD/USB drives
4 Block device, sector Sector disk atomic IO unit 512 bytes, 4096 bytes Block device disk, partition, virtual block devices (MD, device-mapper, loop) block device stacking To avoid block/sector confusion here sector = disk unit (typically 512 bytes) block = encryption block (typically 16 bytes) FDE encrypted block device -> decrypted block device
5 Plaintext & ciphertext plaintext original (open) data - virtual device ciphertext encrypted data - hw disk symmetric algorithms (secret key) speed, throughput block as atomic unit (~16 bytes) (~disk) plaintext (readable data) block cipher ciphertext (encrypted data) block key
6 Cipher block mode, Initialization vector BLOCK (of cipher) < SECTOR (of disk) split sector to blocks chained/parallel processing block mode IV block1 (~16 bytes) block2 Problem: same data in different sectors different ciphertext initialization vector IV (tweak) (different for every sector) block3... Cipher block mode blockx Sector usually derived from seq. sector number (and key, if needed) e.g. ESSIV Encrypted Salt-Sector IV
7 Cipher block mode examples How a single change in plaintext changes ciphertext? CBC cipher block chaining CBC sector sector ciphertext XOR with next block XTS / XEX (XOR encrypt XOR) XTS internally 2 keys - key for tweak - encryption key IV can be directly sector number (known to attacker) changed byte (in plaintext) changed block (in ciphertext)
8 Block mode vs sector Goal: arbitrary change (plaintext) change of the whole sector (ciphertext) Solution: wide mode (encryption block size = sector size) requires at least 2x encryption loop modes are patent encumbered (~ but free standard EME-2) not used in implementations additional operations example Elephant diffuser in Bitlocker special operation before CBC (mix/rotate input) tweak key (independent of encryption key)
9 Disk encryption + data channel encryption Example: iscsi exported encrypted disk, decryption on client side. Is there plain data on data channel? No. So it is secure? No. FDE is offline protection (stolen disk) attacker cannot access snapshots in time (repeated access to hw, much worse attack vectors) mode designed for transparent disk access (IV is always constant for sector) Encrypted data channel Attacker can listen the whole communication but he cannot replay data reply attack. NEVER use encryption designed for exact use for something else, solve problems separately (FDE + ipsec).
10 Key Management
11 Key generator very important for the encryption system security Note difference: encryption key / unlocking passphrase encryption key random, unique generated by RNG (Random Number Generator) or derived from passphrase - i.e. PBKDF2 (Password Based Key Derivation) - usually not desirable (~restricted in security policy)
12 Key storage outside of encrypted device token, SmartCard, TPM, EEPROM file (protected by another encryption system) (encrypted) on another disk (separation of metadata) on the same disk (with encrypted data) metadata (header) unlocking using passphrase of different key brute force and dictionary attack contermeasures (slow down attack) hw problems (e.g. firmware sector reallocation) integration with key management tools enterprise use (LDAP, Active Directory,...)
13 Key removal key removal (wipe of key storage area) = data disposal intended (secure disk disposal) unintended (error) the most common problem metadata overwrite operator error hw error, bad sector, controller, TPM,...
14 Key recovery Trade-off between security and user-friendly approach. disk copy (metadata) Key Escrow (key backup to diferent system) duplicated metadata on disk recovery key to regenerate encryption key wrongly designed user-friendly "extensions" destroys security Examples (3rd party Linux based NAS...) CVE undocumented recovery key in flash memory, allows local users decrypt the hard drive. CVE use the rand library to generate recovery key, brute-force attack possible. CVE firmware stores a partition encryption key in an unencrypted file with base64 encoding....
15 Attacks...
16 Attacks always get better, they never get worse. Attacks to algorithm Attacks to implementation - e.g. side channels Obtaining key or passphrase in open form - hw attack (keylogger, Cold Boot) - malware boot / OS / hypervisor modification - social engineering If you let your machine out of your sight, it s no longer your machine.
17 Examples of FDE implementations
18 Chipset FDE Encryption on disk controller example: USB3 external disk enclosure standard SATA disk AES-256 encryption on chipset
19 Chipset FDE Encryption on disk controller which mode is used? where and how is the encryption key stored? HW board failure what happens? Recovery: you need the same board / firmware Encryption always present (even if password is empty!) weak part: connectors on board proprietary key storage format proprietary key handling protocols
20 Truecrypt Truecrypt, the most known "opensource" disk encryption system AES, Twofish, Serpent chained ciphers (e.g. AES-Twofish) XTS mode hidden disk (including disk with OS), bootloader not using TPM on-disk metadata encrypted (no detectable header) duplicated metadata recovery CD on Linux with dm-crypt backend tc-play reimplementation with BSD license
21 loop-aes loop-aes, loop-aes.sourceforge.org project outside of the main kernel tree loop device extension AES, (Twofish, Serpent) modified CBC mode (IV derived from sector, key and plaintext) multikey 64 keys (modulo sector) + key for IV external store for key in file (GPG encrypted) dm-crypt / crypsetup loop-aes compatible mode
22 BitLocker (Windows proprietary) Native FDE in Windows Ultimate edition in future combined with "secure boot" (Windows 8) many options (system policy) TPM TPM + PIN TPM + Startup Key Clear Key Startup/Recovery Key Recovery Password RSA AES AES 128 CBC AES 128 CBC + Elephant diffuser AES 256 CBC AES 256 CBC + Elephant diffuser Volume Master Key AES Volume Encryption Key
23 BitLocker (Windows)
24 LUKS / dm-crypt Native on Linux strict separation of disk encryption engine dm-crypt device-mapper crypto target (kernel) key management (LUKS) and configuration cryptsetup userspace never implements crypto primitives itself kernel cryptoapi userspace crypto libraries variability supports most of the other subsystem formats (with exception of diffuser and nonstandard encrypted sector size)
25 dm-crypt (kernel) maps virtual plaintext device no key management (ioctl uses key directly) device stacking (~ chained ciphers) Cipher specification examples aes-cbc-essiv:sha256 (AES, CBC, ESSIV) aes-xts-plain64 (AES, XTS, IV is sector number) aes:64-cbc-lmk (loop-aes multikey compatible mode)... and many other compatible modes (not secure) twofish-ecb serpent-cbc-plain64...
26 LUKS (Linux Unified Key Setup) Simple key / passphrase management system for dm-crypt de facto standard for disk encrytpion in Linux, portable more passphrases (keyslots) uses iterated PBKDF2 store key slow down dictionary attacks passphrase change no need to reencrypt disk AF-splitter anti-forensic (fw sector reallocation issue) LUKS DISK LUKS hdr params password key material key material... slot 1 slot 8 volume key DATA
27 thanks for your attention
Analysis of FileVault 2: Apple's full disk encryption. Omar Choudary Felix Grobert Joachim Metz
Analysis of FileVault 2: Apple's full disk encryption Omar Choudary Felix Grobert Joachim Metz FileVault 2 Project Overview Goal reverse engineer and analyse Apple's full disk encryption (aka File Vault)
Secure Storage. Lost Laptops
Secure Storage 1 Lost Laptops Lost and stolen laptops are a common occurrence Estimated occurrences in US airports every week: 12,000 Average cost of a lost laptop for a corporation is $50K Costs include
Encrypted File Systems. Don Porter CSE 506
Encrypted File Systems Don Porter CSE 506 Goals Protect confidentiality of data at rest (i.e., on disk) Even if the media is lost or stolen Protecting confidentiality of in-memory data much harder Continue
What users should know about Full Disk Encryption based on LUKS
What users should know about Full Disk Encryption based on LUKS Andrea VISCONTI Department of Computer Science Università degli Studi di Milano BunnyTN15 [email protected] December 17, 2015 1 /
Disk Encryption. Aaron Howard IT Security Office
Disk Encryption Aaron Howard IT Security Office Types of Disk Encryption? Folder Encryption Volume or Full Disk Encryption OS / Boot Volume Data Volume Managed or Unmanaged Key Backup and Data Assurance
Encrypting the Private Files on Your Computer Presentation by Eric Moore, CUGG June 12, 2010
Encrypting the Private Files on Your Computer Presentation by Eric Moore, CUGG June 12, 2010 I. File Encryption Basics A. Encryption replaces data within a file with ciphertext which resembles random data
Whitepaper Enhancing BitLocker Deployment and Management with SimplySecure. Addressing the Concerns of the IT Professional Rob Weber February 2015
Whitepaper Enhancing BitLocker Deployment and Management with SimplySecure Addressing the Concerns of the IT Professional Rob Weber February 2015 Page 2 Table of Contents What is BitLocker?... 3 What is
Full Drive Encryption Security Problem Definition - Encryption Engine
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 Full Drive Encryption Security Problem Definition - Encryption Engine Introduction for the FDE Collaborative Protection Profiles
Introduction to BitLocker FVE
Introduction to BitLocker FVE (Understanding the Steps Required to enable BitLocker) Exploration of Windows 7 Advanced Forensic Topics Day 3 What is BitLocker? BitLocker Drive Encryption is a full disk
USB Portable Storage Device: Security Problem Definition Summary
USB Portable Storage Device: Security Problem Definition Summary Introduction The USB Portable Storage Device (hereafter referred to as the device or the TOE ) is a portable storage device that provides
Forensic Decryption of FAT BitLocker Volumes
Forensic Decryption of FAT BitLocker Volumes P. Shabana Subair, C. Balan (&), S. Dija, and K.L. Thomas Centre for Development of Advanced Computing, PO Box 6520, Vellayambalam, Thiruvananthapuram 695033,
BitLocker Drive Encryption Hardware Enhanced Data Protection. Shon Eizenhoefer, Program Manager Microsoft Corporation
BitLocker Drive Encryption Hardware Enhanced Data Protection Shon Eizenhoefer, Program Manager Microsoft Corporation Agenda Security Background BitLocker Drive Encryption TPM Overview Building a BitLocker
File System Encryption with Integrated User Management
File System Encryption with Integrated User Management Stefan Ludwig Corporate Technology Siemens AG, Munich [email protected] Prof. Dr. Winfried Kalfa Operating Systems Group Chemnitz University of
FIPS 140 2 Non Proprietary Security Policy: Kingston Technology DataTraveler DT4000 Series USB Flash Drive
FIPS 140 2 Non Proprietary Security Policy Kingston Technology Company, Inc. DataTraveler DT4000 G2 Series USB Flash Drive Document Version 1.8 December 3, 2014 Document Version 1.8 Kingston Technology
GROUP TEST. Encryption. On Test. You ll find lots of encryption software in your distribution s package repository
GROUP TEST ENCRYPTION ENCRYPTION GROUP TEST Mayank Sharma gathers the best file encryption tools to help you take charge of your personal privacy. On Test URL www.truecrypt.org Version 7.1a Licence The
An Introduction to Key Management for Secure Storage. Walt Hubis, LSI Corporation
Walt Hubis, LSI Corporation SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals may use this material in presentations and literature
Practical Methods for Dealing with Full Disk Encryption. Jesse Kornblum
C Y B E R S E C T O R Practical Methods for Dealing with Full Disk Encryption Jesse Kornblum Outline Introduction Types of Targets Finding Keys Tool Marks Example - BitLocker BitLocker Weakness Conclusion
Recipe for Mobile Data Security: TPM, Bitlocker, Windows Vista and Active Directory
Recipe for Mobile Data Security: TPM, Bitlocker, Windows Vista and Active Directory Tom Olzak October 2007 If your business is like mine, laptops regularly disappear. Until recently, centrally managed
Encrypting stored data. Tuomas Aura T-110.4206 Information security technology
Encrypting stored data Tuomas Aura T-110.4206 Information security technology Outline 1. Scenarios 2. File encryption 3. Encrypting file system 4. Full disk encryption 5. Data recovery Simple applications
Windows 7 BitLocker Drive Encryption Security Policy For FIPS 140-2 Validation
Windows 7 BitLocker Security Policy Page 1 of 16 Windows 7 BitLocker Drive Encryption Security Policy For FIPS 140-2 Validation For Windows 7 Document version 1.0 08/31/2011 1. Table of Contents 1. TABLE
Cryptographic Filesystems. Background and Implementations for Linux and OpenBSD
Cryptographic Filesystems Background and Implementations for Linux and OpenBSD Background Loop device primer Keys, cipher modes, salting, key hashing Journaling file systems and encrypted swap Offset,
USB Portable Storage Device: Security Problem Definition Summary
USB Portable Storage Device: Security Problem Definition Summary Introduction The USB Portable Storage Device (hereafter referred to as the device or the TOE ) is a portable storage device that provides
Bypassing Local Windows Authentication to Defeat Full Disk Encryption. Ian Haken
Bypassing Local Windows Authentication to Defeat Full Disk Encryption Ian Haken Who Am I? Currently a security researcher at Synopsys, working on application security tools and Coverity s static analysis
Key & Data Storage on Mobile Devices
Key & Data Storage on Mobile Devices Advanced Computer Networks 2015/2016 Johannes Feichtner [email protected] Outline Why is this topic so delicate? Keys & Key Management High-Level Cryptography
Functional diagram: Secure encrypted data. totally encrypted. XOR encryption. RFID token. fingerprint reader. 128 bit AES in ECB mode Security HDD
Secure encrypted data Encryption Access Control XOR encryption RFID token 128 bit AES in ECB mode Security HDD fingerprint reader enter password by keyboard 256 bit AES in CBC mode 1-2-3-4-5-6-7-8 PIN
GostCrypt User Guide. Laboratoire de Cryptologie et de Virologie Opérationnelles - France
GostCrypt User Guide Laboratoire de Cryptologie et de Virologie Opérationnelles - France Copyright c 2014 Laboratoire de Cryptologie et de Virologie Opératoinnelles - France GOSTCRYPT.ORG Contents 1 Introduction.................................................
Using BitLocker As Part Of A Customer Data Protection Program: Part 1
Using BitLocker As Part Of A Customer Data Protection Program: Part 1 Tech Tip by Philip Cox Source: searchsecuritychannel.com As an information security consultant, one of my jobs is to help my clients
SAS Data Set Encryption Options
Technical Paper SAS Data Set Encryption Options SAS product interaction with encrypted data storage Table of Contents Introduction: What Is Encryption?... 1 Test Configuration... 1 Data... 1 Code... 2
ERNW Newsletter 42 / December 2013
ERNW Newsletter 42 / December 2013 Dangers of Disabled Pre-Boot Authentication in Corporate Environments: Attacking Check Point s Full Disk Encryption with Activated WIL Version: 1.1 Date: 12/16/2013 Author(s):
Cautions When Using BitLocker Drive Encryption on PRIMERGY
Cautions When Using BitLocker Drive Encryption on PRIMERGY July 2008 Fujitsu Limited Table of Contents Preface...3 1 Recovery mode...4 2 Changes in hardware configurations...5 3 Prior to hardware maintenance
SecureDoc Disk Encryption Cryptographic Engine
SecureDoc Disk Encryption Cryptographic Engine FIPS 140-2 Non-Proprietary Security Policy Abstract: This document specifies Security Policy enforced by SecureDoc Cryptographic Engine compliant with the
Encrypting with BitLocker for disk volumes under Windows 7
Encrypting with BitLocker for disk volumes under Windows 7 Summary of the contents 1 Introduction 2 Hardware requirements for BitLocker Driver Encryption 3 Encrypting drive 3.1 Operating System Drive 3.1.1
Navigating Endpoint Encryption Technologies
Navigating Endpoint Encryption Technologies Whitepaper November 2010 THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL INACCURACIES. THE CONTENT IS
Open Source Encrypted Filesystems for Free Unix Systems
Open Source Encrypted Filesystems for Free Unix Systems George Kargiotakis [email protected] Introduction Users seek ways to secure their data with maximum comfort and minimum requirements. No application
How Drive Encryption Works
WHITE PAPER: HOW DRIVE ENCRYPTION WORKS........................................ How Drive Encryption Works Who should read this paper Security and IT administrators Content Introduction to Drive Encryption.........................................................................................
Practical Cryptographic Key Recovery
SMA CYBER Sector Practical Cryptographic Key Recovery Jesse Kornblum Outline Introduction Targets Current Methods Tool Marks Example - BitLocker Conclusion Targets Documented Open Source TrueCrypt Undocumented
The Linux CryptoAPI A User s Perspective
The Linux CryptoAPI A User s Perspective David Bryson May 31, 2002 Abstract Today we are going to talk about using strong cryptography inside Linux. With currently available kernel patches discussed in
EMC DATA DOMAIN ENCRYPTION A Detailed Review
White Paper EMC DATA DOMAIN ENCRYPTION A Detailed Review Abstract The proliferation of publicized data loss, coupled with new governance and compliance regulations, is driving the need for customers to
How to enable Disk Encryption on a laptop
How to enable Disk Encryption on a laptop Skills and pre-requisites Intermediate IT skills required. You need to: have access to, and know how to change settings in the BIOS be confident that your data
YubiKey Integration for Full Disk Encryption
YubiKey Integration for Full Disk Encryption Pre-Boot Authentication Version 1.2 May 7, 2012 Introduction Disclaimer yubico Yubico is the leading provider of simple, open online identity protection. The
VMware Horizon Workspace Security Features WHITE PAPER
VMware Horizon Workspace WHITE PAPER Table of Contents... Introduction.... 4 Horizon Workspace vapp Security.... 5 Virtual Machine Security Hardening.... 5 Authentication.... 6 Activation.... 6 Horizon
Innovative Secure Boot System (SBS) with a smartcard.
Managed Security Services Desktop Security Services Secure Notebook Desktop Security Services. Secure Notebook. Today s business environment demands mobility, and the notebook computer has become an indispensable
Self-Encrypting Drives
Jon Tanguy Senior SSD Technical Marketing Engineer Micron Technology, Inc. February 14, 2014 What is Encryption? In its simplest form, encryption is a mechanism used to obscure data from any unintended
Password-based encryption in ZIP files
Password-based encryption in ZIP files Dmitri Gabbasov December 15, 2015 Abstract In this report we give an overview of the encryption schemes used in the ZIP file format. We first give an overview of
Protection Profile for Full Disk Encryption
Protection Profile for Full Disk Encryption Mitigating the Risk of a Lost or Stolen Hard Disk Information Assurance Directorate 01 December 2011 Version 1.0 Table of Contents 1 Introduction to the PP...
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:
An Improved Trusted Full Disk Encryption Model
An Improved Trusted Full Disk Encryption Model Prasenjit Das and Nirmalya Kar Department of Computer Sc. & Engineering, National Institute of Technology Agartala, India. e-mail: [email protected]; [email protected]
Guidelines on use of encryption to protect person identifiable and sensitive information
Guidelines on use of encryption to protect person identifiable and sensitive information 1. Introduction David Nicholson, NHS Chief Executive, has directed that there should be no transfers of unencrypted
YOUR DATA UNDER SIEGE. DEFEND IT WITH ENCRYPTION.
YOUR DATA UNDER SIEGE. DEFEND IT WITH ENCRYPTION. With Kaspersky, now you can. kaspersky.com/business Be Ready for What s Next Your Data Under Siege. Defend it with Encryption. 1.0 Keeping up with the
EmulexSecure 8Gb/s HBA Architecture Frequently Asked Questions
EmulexSecure 8Gb/s HBA Architecture Frequently Asked Questions Security and Encryption Overview... 2 1. What is encryption?... 2 2. What is the AES encryption standard?... 2 3. What is key management?...
Reverse engineering hardware for software reversers: studying an encrypted external HDD
Reverse engineering hardware for software reversers: studying an encrypted external HDD Joffrey Czarny & Raphaël Rigo / AGI / TX5IT 2015-10-02 / Hardwear.io 2015-10-02 / Hardwear.io 2 Introduction Why
Trustworthy Computing
Stefan Thom Senior Software Development Engineer and Security Architect for IEB, Microsoft Rob Spiger, Senior Security Strategist Trustworthy Computing Agenda Windows 8 TPM Scenarios Hardware Choices with
PGP Whole Disk Encryption Training
PGP Whole Disk Encryption Training Agenda WDE Overview Licensing Universal Server & Client Basics Installation Password Recovery OS Maintenance Support Questions 2 Whole Disk Encryption Protects against:
PLATFORM ENCRYPTlON ARCHlTECTURE. How to protect sensitive data without locking up business functionality.
PLATFORM ENCRYPTlON ARCHlTECTURE How to protect sensitive data without locking up business functionality. 1 Contents 03 The need for encryption Balancing data security with business needs Principles and
collaborative Protection Profile for Full Drive Encryption - Encryption Engine
PP Reference: collaborative Protection Profile for collaborative Protection Profile for Full Drive Encryption - Encryption Engine Version 0. Acknowledgements This collaborative Protection Profile (cpp)
How Endpoint Encryption Works
WHITE PAPER: HOW ENDPOINT ENCRYPTION WORKS........................................ How Endpoint Encryption Works Who should read this paper Security and IT administrators Content Introduction to Endpoint
How to Encrypt your Windows 7 SDS Machine with Bitlocker
How to Encrypt your Windows 7 SDS Machine with Bitlocker ************************************ IMPORTANT ******************************************* Before encrypting your SDS Windows 7 Machine it is highly
Secure Password Managers and Military-Grade Encryption on Smartphones: Oh, Really? Andrey Belenko and Dmitry Sklyarov Elcomsoft Co. Ltd.
Secure Password Managers and Military-Grade Encryption on Smartphones: Oh, Really? Andrey Belenko and Dmitry Sklyarov Elcomsoft Co. Ltd. Securing Data-at-Rest: PC vs Smartphone Threat Model BlackBerry
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy 21 June 2010 Table of Contents Introduction Module Specification Ports and Interfaces Approved Algorithms Test Environment Roles
Microsoft Windows Common Criteria Evaluation
Microsoft Windows Common Criteria Evaluation Microsoft Windows 8 Microsoft Windows Server 2012 Full Disk Encryption Security Target Document Information Version Number 1.0 Updated On April 3, 2014 Microsoft
Encrypting Data at Rest
Encrypting Data at Rest Ken Beer Ryan Holland November 2014 Contents Contents Abstract Introduction The Key to Encryption: Who Controls the Keys? Model A: You control the encryption method and the entire
Windows Server 2008 R2 Boot Manager Security Policy For FIPS 140-2 Validation
Boot Manager Security Policy Windows Server 2008 R2 Boot Manager Security Policy For FIPS 140-2 Validation v 1.3 6/8/11 1 INTRODUCTION... 1 1.1 Cryptographic Boundary for BOOTMGR... 1 2 SECURITY POLICY...
collaborative Protection Profile for Full Drive Encryption - Encryption Engine January 26, 2015
PP Reference: collaborative Protection Profile for Full Drive Encryption - Encryption Engine collaborative Protection Profile for Full Drive Encryption - Encryption Engine January 26, 2015 Version 1.0
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
IT Networks & Security CERT Luncheon Series: Cryptography
IT Networks & Security CERT Luncheon Series: Cryptography Presented by Addam Schroll, IT Security & Privacy Analyst 1 Outline History Terms & Definitions Symmetric and Asymmetric Algorithms Hashing PKI
BestCrypt Volume Encryption Help File
BestCrypt Volume Encryption Help File Introduction Introduction What is Volume Encryption Main Features New features in version 3 2 Introduction BestCrypt Volume Encryption software provides transparent
Symantec Corporation Symantec Enterprise Vault Cryptographic Module Software Version: 1.0.0.2
Symantec Corporation Symantec Enterprise Vault Cryptographic Module Software Version: 1.0.0.2 FIPS 140 2 Non Proprietary Security Policy FIPS Security Level: 1 Document Version: 1.1 Prepared for: Prepared
Comodo Disk Encryption
Comodo Disk Encryption Version 2.0 User Guide Version 2.0.122010 Versi Comodo Security Solutions 525 Washington Blvd. Jersey City, NJ 07310 Table of Contents 1.Comodo Disk Encryption Introduction... 3
FIPS 140-2 Security Policy
Red Hat Enterprise Linux 6.2 dm-crypt Cryptographic Module v2.0 Version 1.4 Last Update: 2013-04-03 Contents 1 Cryptographic Module Specification...3 1.1 Description of Module...3 1.2 Description of Modes
Do "standard tools" meet your needs when it comes to providing security for mobile PCs and data media?
Product Insight Do "standard tools" meet your needs when it comes to providing security for mobile PCs and data media? Author Version Document Information Utimaco Product Management Device Security 4.30.00
Fall. Forensic Examination of Encrypted Systems Matthew Postinger COSC 374
Fall 2011 Forensic Examination of Encrypted Systems Matthew Postinger COSC 374 Table of Contents Abstract... 3 File System Encryption... 3 Windows EFS... 3 Apple FileVault... 4 Full Disk Encryption...
TPM. (Trusted Platform Module) Installation Guide V3.3.0. for Windows Vista
TPM (Trusted Platform Module) Installation Guide V3.3.0 for Windows Vista Table of contents 1 Introduction 1.1 Convention... 4 1.2 TPM - An Overview... 5 2 Using TPM for the first time 2.1 Enabling TPM...
introducing COMPUTER ANTI FORENSIC TECHNIQUES
introducing COMPUTER ANTI FORENSIC TECHNIQUES COMPUTER FORENSIC DATA RECOVERY TECHNIQUES AND SOLUTIONS WORKSHOP Executive Summary Computer Forensics, a term that precisely identifies the discipline that
Implementing deniable storage encryption for file system using PDE
Implementing deniable storage encryption for file system using PDE Mr. S.J.Vivekanandhan, AP/CSE, Sugangya.R M.Tech(Computer Science), PRIST University, Thanjavur. ABSTRACT Mobile devices are increasingly
White Paper: Whole Disk Encryption
How Whole Disk Encryption Works White Paper: Whole Disk Encryption How Whole Disk Encryption Works Contents Introduction to Whole Disk Encryption.....................................................................
Storing Encrypted Plain Text Files Using Google Android
Storing Encrypted Plain Text Files Using Google Android Abstract Jared Hatfield University of Louisville Google Android is an open source operating system that is available on a wide variety of smart phones
ios Security Decoded Dave Test Classroom and Lab Computing Penn State ITS Feedback - http://j.mp/psumac33
ios Security Decoded Dave Test Classroom and Lab Computing Penn State ITS Feedback - http://j.mp/psumac33 Why care about ios Security? 800M 800 million ios devices activated 130 million in last year 98%
Visualisation of potential weakness of existing cipher engine implementations in commercial on-the-fly disk encryption software
Visualisation of potential weakness of existing cipher engine implementations in commercial on-the-fly disk encryption software C. B. Roellgen Global IP Telecommunications, Ltd. & PMC Ciphers, Inc. August
LVM2 data recovery. Milan Brož [email protected]. LinuxAlt 2009, Brno
LVM2 data recovery Milan Brož [email protected] LinuxAlt 2009, Brno Linux IO storage stack [ VFS ] filesystem [ volumes ] MD / LVM / LUKS / MPATH... [ partitions ] legacy partition table recovery from the
How to create a portable encrypted USB Key using TrueCrypt
How to create a portable encrypted USB Key using TrueCrypt INTRODUCTION TrueCrypt Traveler Mode provides secure encryption for programs/files on portable devices such as USB Memory keys. It uses strong
Encrypting Your Files. Because nobody else will And would you trust them if they did?
Encrypting Your Files Because nobody else will And would you trust them if they did? Why? Sensitive personal information NSA Identity thieves Linux Disk Encryption Dm-crypt is default under Linux Full
Penetration Testing Windows Vista TM BitLocker TM
Penetration Testing BitLocker TM Drive Encryption Douglas MacIver Penetration Engineer System Integrity Group, Corporation Hack In The Box 2006/09/21 2006 Corporation. All rights reserved. Trustworthy
ELCE 2013 - Secure Embedded Linux Product (A Success Story)
ELCE 2013 - Secure Embedded Linux Product (A Success Story) Marcin Bis http://bis-linux.com [email protected] Edinburgh - 2013.10.25 1 / 31 About me Marcin Bis Entrepreneur Embedded Linux: system development,
The Shortcut Guide To
tm The Shortcut Guide To Securing Your Exchange Server and Unified Communications Infrastructure Using SSL Don Jones Ch apter 3: Best Practices for Securing Your Exchange Server... 32 Business Level Concerns
BestCrypt Volume Encryption Enterprise Edition. Administrator Guide
BestCrypt Volume Encryption Enterprise Edition Administrator Guide 1 Introduction Introduction What is Volume Encryption 2 Introduction BestCrypt Volume Encryption Enterprise is a set of utilities and
BATTENING DOWN THE DISKS
COVER STORY CD Encryption Burning CDs and DVDS with an encrypted filesystem BATTENING DOWN THE DISKS petris, Fotolia An encrypted hard disk on your server is no help if valuable data on CDs or DVDs falls
SecureAge SecureDs Data Breach Prevention Solution
SecureAge SecureDs Data Breach Prevention Solution In recent years, major cases of data loss and data leaks are reported almost every week. These include high profile cases like US government losing personal
EMBASSY Remote Administration Server (ERAS) BitLocker Deployment Guide
EMBASSY Remote Administration Server (ERAS) BitLocker Deployment Guide BitLocker Deployment Guide Document Version 0.0.0.5 http://www.wave.com ERAS v 2.8 Wave Systems Corp. 2010 Contents Contents... 2
