Chapter 9 Encrypting Volumes. FIGURE 9.0.F01: A hard drive volume with full-disk encryption (FDE).

Slides:



Advertisements
Similar presentations
Chapter 4: Modes of Operation CS 472: Fall Encrypting a Large Massage 1.Electronic Code Book (ECB) 2.Cipher Block Chaining (CBC) 3.Output Feedback.
Advertisements

ECE454/CS594 Computer and Network Security
“Advanced Encryption Standard” & “Modes of Operation”
CS470, A.SelcukStream Ciphers1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Encipherment Using Modern Symmetric-Key Ciphers. 8.2 Objectives ❏ To show how modern standard ciphers, such as DES or AES, can be used to encipher long.
Modern Symmetric-Key Ciphers
Modern Symmetric-Key Ciphers
8.1 Chapter 8 Encipherment Using Modern Symmetric-Key Ciphers Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Modern Symmetric-Key Ciphers
Cryptography & Security Presented April 16, 2010 By Dave Stycos, Zocalo Data Systems.
Cryptography and Network Security Chapter 6 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 6. Chapter 6 – Block Cipher Operation Many savages at the present day regard their names as vital parts of themselves,
Cryptography1 CPSC 3730 Cryptography Chapter 6 Triple DES, Block Cipher Modes of Operation.
1 Lect. 9 : Mode of Operation. 2 Modes of Operation – ECB Mode  Electronic Code Book Mode Break a message into a sequence of plaintext blocks Each plaintext.
Chapter 5 Cryptography Protecting principals communication in systems.
Modes of Operation CS 795. Electronic Code Book (ECB) Each block of the message is encrypted with the same secret key Problems: If two identical blocks.
March R. Smith - University of St Thomas - Minnesota QMCS Class Today Finish the other presentationFinish the other presentation Cipher ModesCipher.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
Lecture 23 Symmetric Encryption
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
CS470, A.SelcukModes of Operation1 Encrypting with Block Ciphers CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Network Security Chapter
Block Cipher Transmission Modes CSCI 5857: Encoding and Encryption.
Modes of Operation. Topics  Overview of Modes of Operation  EBC, CBC, CFB, OFB, CTR  Notes and Remarks on each modes.
Chapter 20 Symmetric Encryption and Message Confidentiality.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII.
TE/CS 536 Network Security Spring 2006 – Lectures 6&7 Secret Key Cryptography.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Cryptography and Network Security
Professional Encryption Software FINECRYPT 8.1. Contents Introduction Introduction Features Features Installation Installation Tests Tests Results Results.
Chapter 8 Secret and Public Keys. FIGURE 8.0.F01: Using a passphrase for a file encryption key.
Cryptography Chapter 7 Part 2 Pages 781 to 812. Symmetric Cryptography Secret Key Figure 7-10 on page 782 Key distribution problem – Secure courier Many.
3DES and Block Cipher Modes of Operation CSE 651: Introduction to Network Security.
Chapter 9: Algorithms Types and Modes Dulal C. Kar Based on Schneier.
Encryption Types & Modes Chapter 9 Encryption Types –Stream Ciphers –Block Ciphers Encryption Modes –ECB - Electronic Codebook –CBC - Cipher Block Chaining.
More About DES Cryptography and Network Security Reference: Sec 3.1 of Stallings Text.
Data Encryption Standard (DES) © 2000 Gregory Kesden.
1.1 Chapter 8 Encipherment Using Modern Symmetric-Key Ciphers Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
BLOCK CIPHER SYSTEMS OPERATION MODES OF DATA ENCRYPTION STANDARD (DES)
Introduction to Computer Security ©2004 Matt Bishop Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security.
Modes of Usage Dan Fleck CS 469: Security Engineering These slides are modified with permission from Bill Young (Univ of Texas) 11 Coming up: Modes of.
Modes of Operation INSTRUCTOR: DANIA ALOMAR. Modes of Operation A block cipher can be used in various methods for data encryption and decryption; these.
1 Symmetric-Key Encryption CSE 5351: Introduction to Cryptography Reading assignment: Chapter 3 Read sections first (skipping 3.2.2)
Stream Ciphers and Block Ciphers A stream cipher is one that encrypts a digital data stream one bit or one byte at a time. Examples of classical stream.
Cryptography and Network Security Chapter 6 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Chapter 6 Authenticating People. FIGURE 6.0.F01: Authentication to protect computer resources.
Chapter 12 End-to-End Networking. FIGURE 12.0.F01: UDP packet fields.
Lecture 5 Block Diagrams Modes of Operation of Block Ciphers.
Lecture 23 Symmetric Encryption
Ln Lou Modern Cyphers. 0. Security System Key Plain Text Cipher Text Encryption (K × P → C) Decryption (K × C → P)
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security PART VII.
1 Symmetric key cryptography: DES DES: Data Encryption Standard US encryption standard [NIST 1993] 56-bit symmetric key, 64 bit plaintext input How secure.
Chapter 5 Storing Files. FIGURE 5.0.F01: A simple magnetic tape drive. Photographed by Dr. Richard Smith at the Computer History Museum, California A.
Cryptography and Network Security
Cipher Transmission and Storage Modes Part 2: Stream Cipher Modes CSCI 5857: Encoding and Encryption.
Block Cipher Modes Last Updated: Aug 25, ECB Mode Electronic Code Book Divide the plaintext into fixed-size blocks Encrypt/Decrypt each block independently.
CS480 Cryptography and Information Security
Block Cipher Modes CS 465 Make a chart for the mode comparisons
مروري برالگوريتمهاي رمز متقارن(كليد پنهان)
Block cipher and modes of encryptions
Algorithm Types & Algorithm Modes
Symmetric-Key Encryption
Block vs Stream Ciphers
Block Ciphers: DES and AES
Counter Mode, Output Feedback Mode
Elect. Codebook, Cipher Block Chaining
Secret-Key Encryption
Presentation transcript:

Chapter 9 Encrypting Volumes

FIGURE 9.0.F01: A hard drive volume with full-disk encryption (FDE).

TABLE 9.0.T01: Effectiveness of access control and encryption

TABLE 9.0.T02: Policy statements for an unencrypted volume

TABLE 9.0.T03: Policy statements for volume encryption

FIGURE 9.0.F02: A block cipher encrypts data in fixed-sized blocks.

FIGURE 9.0.F03: Triple DES encryption.

FIGURE 9.0.F04: Encryption failure using a block cipher. Courtesy of Dr. Richard Smith

FIGURE 9.0.F05: Identical blocks encrypt to identical ciphertext.

FIGURE 9.0.F06: Using a mixing mode with a block cipher. Courtesy of Dr. Richard Smith

FIGURE 9.0.F07: Key stream made with OFB (output feedback mode).

FIGURE 9.0.F08: Include the IV with the ciphertext when required.

FIGURE 9.0.F09: Mode encryption diagram: Encrypting with OFB.

FIGURE 9.0.F10: Key stream with CTR—the counter mode.

FIGURE 9.0.F11: Mode encryption diagram for CFB (cipher feedback mode).

FIGURE 9.0.F12: Mode encryption diagram for CBC (cipher block chaining).

FIGURE 9.0.F13: Mode decryption diagram for CBC.

FIGURE 9.0.F14: Full disk encryption in software.

FIGURE 9.0.F15: Password prompt to mount an encrypted volume. Screen shot reprinted with permission from Apple Inc.

FIGURE 9.0.F16: Encrypting disk data with AES and Counter mode.

FIGURE 9.0.F17: Sector encryption with CBC and ESSIV.

FIGURE 9.0.F18: XTS mode to encrypt data on a disk sector.

FIGURE 9.0.F19: Internal functions of a self-encrypting drive.

FIGURE 9.0.F20: Block diagram of a self-encrypting drive controller.

FIGURE 9.0.F21: Self-encrypting drive controller’s state diagram.

FIGURE 9.0.F22: Preboot authentication with software encryption.

FIGURE 9.0.F23: Passphrase interception risks.