ImageVerifierCode 换一换
格式:PDF , 页数:91 ,大小:670.05KB ,
资源ID:1242389      下载积分:10000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-1242389.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(ANSI IEEE 1619 2-2010 Wide-Block Encryption for Shared Storage Media (IEEE Computer Society)《共享存储媒体分块加密标准》.pdf)为本站会员(bonesoil321)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

ANSI IEEE 1619 2-2010 Wide-Block Encryption for Shared Storage Media (IEEE Computer Society)《共享存储媒体分块加密标准》.pdf

1、 IEEE Standard for Wide-Block Encryption for Shared Storage Media IEEE Computer Society Sponsored by the Information Assurance Standards Committee and Storage Systems Standards Committee IEEE 3 Park Avenue New York, NY 10016-5997 USA 8 March 2011 IEEE Std 1619.22010 IEEE Std 1619.2-2010 IEEE Standar

2、d for Wide-Block Encryption for Shared Storage Media Sponsor Information Assurance Standards Committee and Storage Systems Standards Committee of the IEEE Computer Society Approved 30 September 2010 IEEE-SA Standards Board Approved 5 May 2011 American National Standards Institute Abstract: EME2-AES

3、and XCB-AES wide-block encryption with associated data (EAD) modes of the NIST AES block cipher, providing usage guidelines and test vectors, are described. A wide-block encryption algorithm behaves as a single block cipher with a large plaintext input and ciphertext output, but uses a narrow block

4、cipher in this case Advanced Encryption Standard (AES) internally. These encryption modes are oriented toward random access storage devices that do not provide authentication, but need to reduce the granularity of a potential attack. Keywords: data-at-rest security, encryption, encryption with assoc

5、iated data (EAD), encrypt-mix-encrypt-v2 mode of operation (EME2), extended codebook mode of operation (XCB), IEEE 1619.2, security, storage The Institute of Electrical and Electronics Engineers, Inc. 3 Park Avenue, New York, NY 10016-5997, USA Copyright 2011 by the Institute of Electrical and Elect

6、ronics Engineers, Inc. All rights reserved. Published 8 March 2011. Printed in the United States of America. IEEE is a registered trademark in the U.S. Patent +1 978 750 8400. Permission to photocopy portions of any individual standard for educational classroom use can also be obtained through the C

7、opyright Clearance Center. iv Copyright 2011 IEEE. All rights reserved. Introduction This introduction is not part of IEEE Std 1619.2-2010, IEEE Standard for Wide-Block Encryption for Shared Storage Media. The purpose of this standard, similar to IEEE Std 1619-2007 B2, is to describe a method of enc

8、ryption for data stored in logical block-based devices, where the threat model includes possible access to stored data by the adversary.aAs in IEEE Std 1619-2007, this standard specifies length-preserving encryption algorithms to be applied to the plaintext logical block before storing it on the sto

9、rage media. This standard improves on IEEE Std 1619-2007 by defining wide-block encryption algorithms. This means that they act on the whole logical block at once, and each bit on the input plaintext influences every bit of the output ciphertext (and vice versa for decryption). In particular, this s

10、tandard specifies the EME2-AES and the XCB-AES wide-block encryption algorithms. Wide-block encryption better hides plaintext statistics and provides better protection than the narrow-block encryption, defined in IEEE Std 1619-2007, against attacks that involve traffic analysis and/or manipulations

11、of ciphertext on the raw storage media. Notice to users Laws and regulations Users of these documents should consult all applicable laws and regulations. Compliance with the provisions of this standard does not imply compliance to any applicable regulatory requirements. Implementers of the standard

12、are responsible for observing or referring to the applicable regulatory requirements. IEEE does not, by the publication of its standards, intend to urge action that is not in compliance with applicable laws, and these documents may not be construed as doing so. Copyrights This document is copyrighte

13、d by the IEEE. It is made available for a wide variety of both public and private uses. These include both use, by reference, in laws and regulations, and use in private self-regulation, standardization, and the promotion of engineering practices and methods. By making this document available for us

14、e and adoption by public authorities and private users, the IEEE does not waive any rights in copyright to this document. aThe numbers in brackets correspond to those of the bibliography in Annex A. v Copyright 2011 IEEE. All rights reserved. Updating of IEEE documents Users of IEEE standards should

15、 be aware that these documents may be superseded at any time by the issuance of new editions or may be amended from time to time through the issuance of amendments, corrigenda, or errata. An official IEEE document at any point in time consists of the current edition of the document together with any

16、 amendments, corrigenda, or errata then in effect. In order to determine whether a given document is the current edition and whether it has been amended through the issuance of amendments, corrigenda, or errata, visit the IEEE Standards Association web site at http:/ieeexplore.ieee.org/xpl/standards

17、.jsp, or contact the IEEE at the address listed previously. For more information about the IEEE Standards Association or the IEEE standards development process, visit the IEEE-SA web site at http:/standards.ieee.org. Errata Errata, if any, for this and all other standards can be accessed at the foll

18、owing URL: http:/standards.ieee.org/reading/ieee/updates/errata/index.html. Users are encouraged to check this URL for errata periodically. Interpretations Current interpretations can be accessed at the following URL: http:/standards.ieee.org/reading/ieee/interp/ index.html. Patents Attention is cal

19、led to the possibility that implementation of this standard may require use of subject matter covered by patent rights. By publication of this standard, no position is taken with respect to the existence or validity of any patent rights in connection therewith. A patent holder or patent applicant ha

20、s filed a statement of assurance that it will grant licenses under these rights without compensation or under reasonable rates, with reasonable terms and conditions that are demonstrably free of any unfair discrimination to applicants desiring to obtain such licenses. Other Essential Patent Claims m

21、ay exist for which a statement of assurance has not been received. The IEEE is not responsible for identifying Essential Patent Claims for which a license may be required, for conducting inquiries into the legal validity or scope of Patents Claims, or determining whether any licensing terms or condi

22、tions provided in connection with submission of a Letter of Assurance, if any, or in any licensing agreements are reasonable or non-discriminatory. Users of this standard are expressly advised that determination of the validity of any patent rights, and the risk of infringement of such rights, is en

23、tirely their own responsibility. Further information may be obtained from the IEEE Standards Association. vi Copyright 2011 IEEE. All rights reserved. Participants At the time this standard was submitted to the IEEE-SA Standards Board for approval, the Security in Storage Working Group had the follo

24、wing sponsorship: James P. Hughes, Sponsor Chair (IASC) Eric A. Hibbard, Sponsor Vice Chair (IASC) John L. Cole, Past Sponsor Chair (IASC) Curtis Anderson, Co-Sponsor Chair (SSSC) At the time this standard was submitted to the IEEE-SA Standards Board for approval, the Security in Storage Working Gro

25、up had the following membership: Matthew V. Ball, Chair Eric A. Hibbard, Vice Chair Walter Hubis, Secretary Fabio Maino, Technical Editor and Past Secretary James P. Hughes, Past Chair Gideon Avida Jim Coomes Robert Elliott Hal Finney John Geldman Bob Griffin Cyril Guyot Shai Halevi Laszlo Hars Larr

26、y Hofer Glen Jaquette Scott Kipp Curt Kolovson Robert Lockhart Charlie Martin David McGrew Gary Moorhead Bob Nixon Landon Curt Noll Jim Norton Scott Painter Dave Peterson Serge Plotkin Niels Reimers Subhash Sankuratripati David Sheehy Bob Snively Joel Spencer Doug Whiting Mike Witkowski Special than

27、ks for their important technical contribution to this standard to the following individuals: Hal Finney Brian Gladman Shai Halevi David McGrew vii Copyright 2011 IEEE. All rights reserved. The following members of the individual balloting committee voted on this standard. Balloters may have voted fo

28、r approval, disapproval, or abstention. Johann Amsenga Khin Mi Mi Aung Matthew V. Ball Rahul Bhushan Juan Carreon Keith Chow John Cole Geoffrey Darnton Russell Dietz Thomas Dineen Robert Elliott Andrew Fieldsend C. Fitzgerald John Geldman Ron Greenthaler Randall Groves Laszlo Hars Eric A. Hibbard We

29、rner Hoelzl Larry Hofer Walter Hubis Raj Jain Scott Kipp Susan Land Kenneth Lang Daniel Levesque Robert Lockhart William Lumpkins G. Luri Fabio Maino Edward McCall Jeffrey Moore Finnbarr Murphy Michael S. Newman Landon Curt Noll Ulrich Pohl Randall Safier Bartien Sayogo Stephen Schwarm Akihiro Shimu

30、ra Gil Shultz Steven Smith Kapil Sood Thomas Starai Rene Struik Walter Struppler Joseph Tardo Brian Weis Oren Yuen When the IEEE-SA Standards Board approved this standard on 30 September 2010, it had the following membership: Robert M. Grow, Chair Richard H. Hulett, Vice Chair Steve M. Mills, Past C

31、hair Judith Gorman, Secretary Karen Bartleson Victor Berman Ted Burse Clint Chaplin Andy Drozd Alexander Gelman Jim Hughes Young Kyun Kim Joseph L. Koepfinger* John Kulick David J. Law Hung Ling Oleg Logvinov Ted Olsen Ronald C. Petersen Thomas Prevost Jon Walter Rosdahl Sam Sciacca Mike Seavey Curt

32、is Siller Don Wright *Member Emeritus Also included are the following nonvoting IEEE-SA Standards Board liaisons: Satish K. Aggarwal, NRC Representative Richard DeBlasio, DOE Representative Michael Janezic, NIST Representative Michelle Turner IEEE Standards Program Manager, Document Development Mich

33、ael D. Kipness IEEE Standards Program Manager, Technical Program Development viii Copyright 2011 IEEE. All rights reserved. Contents 1. Overview 1 1.1 Scope . 1 1.2 Purpose 1 2. Normative references 1 3. Definitions, acronyms, and abbreviations 2 3.1 Definitions . 2 3.2 Keywords. 2 3.3 Acronyms and

34、abbreviations . 3 4. Mathematical conventions 3 5. Wide-block encryption algorithms . 4 5.1 Encryption with associated data 4 5.2 EME2-AES algorithm . 6 5.3 XCB-AES algorithm 12 6. Compliance. 18 Annex A (informative) Bibliography . 19 Annex B (informative) Implementation guidance 20 Annex C (inform

35、ative) Test vectors . 22 1 Copyright 2011 IEEE. All rights reserved. IEEE Standard for Wide-Block Encryption for Shared Storage Media IMPORTANT NOTICE: This standard is not intended to ensure safety, security, health, or environmental protection. Implementers of the standard are responsible for dete

36、rmining appropriate safety, security, environmental, and health practices or regulatory requirements. This IEEE document is made available for use subject to important notices and legal disclaimers. These notices and disclaimers appear in all publications containing this document and may be found un

37、der the heading “Important Notice” or “Important Notices and Disclaimers Concerning IEEE Documents.” They can also be obtained on request from IEEE or viewed at http:/standards.ieee.org/IPR/disclaimers.html. 1. Overview 1.1 Scope This standard specifies an architecture for encryption of data in rand

38、om access storage devices, oriented toward applications that benefit from wide encryption-block sizes of 512 bytes and above. 1.2 Purpose This standard specifies an architecture for media security and enabling components. Wide encryption blocks are well suited to environments where the attacker has

39、repeated access to cryptographic communication or ciphertext, or is able to perform traffic analysis of data access patterns. The standard is oriented toward fixed-size encryption blocks without data expansion, but anticipates an optional data expansion mode to resist attacks involving data tamperin

40、g. 2. Normative references The following referenced documents are indispensable for the application of this document (i.e., they must be understood and used, so each referenced document is cited in text and its relationship to this document is explained). For dated references, only the edition cited

41、 applies. For undated references, the latest edition of the referenced document (including any amendments or corrigenda) applies. IEEE Std 1619.2-2010 IEEE Standard for Wide-Block Encryption for Shared Storage Media 2 Copyright 2011 IEEE. All rights reserved. NIST Federal Information Processing Stan

42、dard 197 (FIPS 197), Advanced Encryption Standard (AES). November 2001.1NIST Special Publication 800-38A (NIST SP 800-38A), Recommendation for Block Cipher Modes of OperationMethods and Techniques. 3. Definitions, acronyms, and abbreviations 3.1 Definitions For the purposes of this document, the fol

43、lowing terms and definitions apply. The IEEE Standards Dictionary: Glossary of Terms or that a certain course of action is preferred but not necessarily required; or that (in the negative form) a certain course of action is deprecated but not prohibited (should equals is recommended to). 1NIST publi

44、cations are available from the National Institute of Standards and Technology, NIST Public Inquiries, NIST, 100 Bureau Drive, Stop 3460, Gaithersburg, MD, 20899-3460, USA (www.nist.gov). 2The IEEE Standards Dictionary: Glossary of Terms more specifically, if the encryption of the plaintext P with th

45、e key K and the associated data A results in the ciphertext C, then the decryption of C with the key K and the associated data A results in the plaintext P. A conforming implementation shall include in the associated data only information that is available, in plaintext form, at the time of encrypti

46、on and the time of decryption. The associated data input shall uniquely identify the plaintext. This is because whenever the same plaintext is encrypted two different times using the same key but with distinct associated data values, the result is IEEE Std 1619.2-2010 IEEE Standard for Wide-Block En

47、cryption for Shared Storage Media 5 Copyright 2011 IEEE. All rights reserved. two distinct ciphertext values. Thus the use of distinct associated data values hides the equality of the plaintexts from an attacker. 5.1.2 Using EAD to protect a string of data blocks An EAD may be used to protect a stri

48、ng of data blocks, such as those in a data-storage disk. In this application, the associated data input to the encryption and decryption procedure should contain the logical index of the block on which the procedure is acting. When this information is included in the associated data, cases in which

49、two distinct data blocks contain identical plaintext values are hidden from an adversary. Figure 1 shows an example of how an EAD performs encryption and decryption. EADEncryptionProcedurePlaintext Block 00Plaintext Block 01Plaintext Block 02Plaintext Block 03Ciphertext Block 00Ciphertext Block 01Ciphertext Block 02Ciphertext Block 03Secret KeyPlaintextAssociated DataCiphertextEADDecryptionProcedurePlaintext Block 00Plaintext Block 01Plaintext Block 02Plaintext Block 03Ciphertext Block 00Ciphertext Block 01Ciphertext Block 02Ciphertext Block 03Secret Key

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1