Download presentation
Presentation is loading. Please wait.
Published byMaud Lamb Modified over 8 years ago
1
Chapter 9 Encrypting Volumes
2
FIGURE 9.0.F01: A hard drive volume with full-disk encryption (FDE).
3
TABLE 9.0.T01: Effectiveness of access control and encryption
4
TABLE 9.0.T02: Policy statements for an unencrypted volume
5
TABLE 9.0.T03: Policy statements for volume encryption
6
FIGURE 9.0.F02: A block cipher encrypts data in fixed-sized blocks.
7
FIGURE 9.0.F03: Triple DES encryption.
8
FIGURE 9.0.F04: Encryption failure using a block cipher. Courtesy of Dr. Richard Smith
9
FIGURE 9.0.F05: Identical blocks encrypt to identical ciphertext.
10
FIGURE 9.0.F06: Using a mixing mode with a block cipher. Courtesy of Dr. Richard Smith
11
FIGURE 9.0.F07: Key stream made with OFB (output feedback mode).
12
FIGURE 9.0.F08: Include the IV with the ciphertext when required.
13
FIGURE 9.0.F09: Mode encryption diagram: Encrypting with OFB.
14
FIGURE 9.0.F10: Key stream with CTR—the counter mode.
15
FIGURE 9.0.F11: Mode encryption diagram for CFB (cipher feedback mode).
16
FIGURE 9.0.F12: Mode encryption diagram for CBC (cipher block chaining).
17
FIGURE 9.0.F13: Mode decryption diagram for CBC.
18
FIGURE 9.0.F14: Full disk encryption in software.
19
FIGURE 9.0.F15: Password prompt to mount an encrypted volume. Screen shot reprinted with permission from Apple Inc.
20
FIGURE 9.0.F16: Encrypting disk data with AES and Counter mode.
21
FIGURE 9.0.F17: Sector encryption with CBC and ESSIV.
22
FIGURE 9.0.F18: XTS mode to encrypt data on a disk sector.
23
FIGURE 9.0.F19: Internal functions of a self-encrypting drive.
24
FIGURE 9.0.F20: Block diagram of a self-encrypting drive controller.
25
FIGURE 9.0.F21: Self-encrypting drive controller’s state diagram.
26
FIGURE 9.0.F22: Preboot authentication with software encryption.
27
FIGURE 9.0.F23: Passphrase interception risks.
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.