ANSI IEEE 1619.1-2007 Standard for Authenticated Encryption with Length Expansion for Storage Devices (IEEE Computer Society)《存储装置用带有长度扩展的校验加密用标准》.pdf

上传人:孙刚 文档编号:435237 上传时间:2018-11-14 格式:PDF 页数:57 大小:307.20KB
下载 相关 举报
ANSI IEEE 1619.1-2007 Standard for Authenticated Encryption with Length Expansion for Storage Devices (IEEE Computer Society)《存储装置用带有长度扩展的校验加密用标准》.pdf_第1页
第1页 / 共57页
ANSI IEEE 1619.1-2007 Standard for Authenticated Encryption with Length Expansion for Storage Devices (IEEE Computer Society)《存储装置用带有长度扩展的校验加密用标准》.pdf_第2页
第2页 / 共57页
ANSI IEEE 1619.1-2007 Standard for Authenticated Encryption with Length Expansion for Storage Devices (IEEE Computer Society)《存储装置用带有长度扩展的校验加密用标准》.pdf_第3页
第3页 / 共57页
ANSI IEEE 1619.1-2007 Standard for Authenticated Encryption with Length Expansion for Storage Devices (IEEE Computer Society)《存储装置用带有长度扩展的校验加密用标准》.pdf_第4页
第4页 / 共57页
ANSI IEEE 1619.1-2007 Standard for Authenticated Encryption with Length Expansion for Storage Devices (IEEE Computer Society)《存储装置用带有长度扩展的校验加密用标准》.pdf_第5页
第5页 / 共57页
亲,该文档总共57页,到这儿已超出免费预览范围,如果喜欢就下载吧!
资源描述

1、IEEE Std 1619.1-2007IEEE Standard for AuthenticatedEncryption with Length Expansionfor Storage Devices IEEE3 Park Avenue New York, NY 10016-5997, USA16 May 2008IEEE Computer SocietySponsored by theStorage Systems Standards CommitteeandInformation Assurance Standards Committee1619.1TMRecognized as an

2、 IEEE Std 1619.1-2007 American National Standard (ANSI) IEEE Standard for Authenticated Encryption with Length Expansion for Storage Devices Sponsor Information Assurance Standards Committee and Storage Systems Standards Committee of the IEEE Computer Society Approved 15 April 2008 American National

3、 Standards Institute Approved 5 December 2007 IEEE-SA Standards Board Abstract: Cryptographic and data authentication procedures for storage devices that support length expansion, such as tape drives, are specified. Such procedures include the following cryptographic modes of operation for the AES b

4、lock cipher: CCM, GCM, CBC-HMAC, and XTS-HMAC. Keywords: authentication, CBC, CCM, cryptography, data storage, encryption, GCM, HMAC, security, tape drive, variable-length block, XTS _ The Institute of Electrical and Electronics Engineers, Inc. 3 Park Avenue, New York, NY 10016-5997, USA Copyright 2

5、008 by the Institute of Electrical and Electronics Engineers, Inc. All rights reserved. Published 16 May 2008. Printed in the United States of America. IEEE is a registered trademark in the U.S. Patent and Trademark Office, owned by the Institute of Electrical and Electronics Engineers, Incorporated

6、. PDF: ISBN 978-0-7381-5360-5 STD95753 Print: ISBN 978-0-7381-5361-2 STDPD95753 No part of this publication may be reproduced in any form, in an electronic retrieval system or otherwise, without the prior written permission of the publisher. IEEE Standards documents are developed within the IEEE Soc

7、ieties and the Standards Coordinating Committees of the IEEE Standards Association (IEEE-SA) Standards Board. The IEEE develops its standards through a consensus development process, approved by the American National Standards Institute, which brings together volunteers representing varied viewpoint

8、s and interests to achieve the final product. Volunteers are not necessarily members of the Institute and serve without compensation. While the IEEE administers the process and establishes rules to promote fairness in the consensus development process, the IEEE does not independently evaluate, test,

9、 or verify the accuracy of any of the information contained in its standards. Use of an IEEE Standard is wholly voluntary. The IEEE disclaims liability for any personal injury, property or other damage, of any nature whatsoever, whether special, indirect, consequential, or compensatory, directly or

10、indirectly resulting from the publication, use of, or reliance upon this, or any other IEEE Standard document. The IEEE does not warrant or represent the accuracy or content of the material contained herein, and expressly disclaims any express or implied warranty, including any implied warranty of m

11、erchantability or fitness for a specific purpose, or that the use of the material contained herein is free from patent infringement. IEEE Standards documents are supplied “AS IS.” The existence of an IEEE Standard does not imply that there are no other ways to produce, test, measure, purchase, marke

12、t, or provide other goods and services related to the scope of the IEEE Standard. Furthermore, the viewpoint expressed at the time a standard is approved and issued is subject to change brought about through developments in the state of the art and comments received from users of the standard. Every

13、 IEEE Standard is subjected to review at least every five years for revision or reaffirmation. When a document is more than five years old and has not been reaffirmed, it is reasonable to conclude that its contents, although still of some value, do not wholly reflect the present state of the art. Us

14、ers are cautioned to check to determine that they have the latest edition of any IEEE Standard. In publishing and making this document available, the IEEE is not suggesting or rendering professional or other services for, or on behalf of, any person or entity. Nor is the IEEE undertaking to perform

15、any duty owed by any other person or entity to another. Any person utilizing this, and any other IEEE Standards document, should rely upon the advice of a competent professional in determining the exercise of reasonable care in any given circumstances. Interpretations: Occasionally questions may ari

16、se regarding the meaning of portions of standards as they relate to specific applications. When the need for interpretations is brought to the attention of IEEE, the Institute will initiate action to prepare appropriate responses. Since IEEE Standards represent a consensus of concerned interests, it

17、 is important to ensure that any interpretation has also received the concurrence of a balance of interests. For this reason, IEEE and the members of its societies and Standards Coordinating Committees are not able to provide an instant response to interpretation requests except in those cases where

18、 the matter has previously received formal consideration. At lectures, symposia, seminars, or educational courses, an individual presenting information on IEEE standards shall make it clear that his or her views should be considered the personal views of that individual rather than the formal positi

19、on, explanation, or interpretation of the IEEE. Comments for revision of IEEE Standards are welcome from any interested party, regardless of membership affiliation with IEEE. Suggestions for changes in documents should be in the form of a proposed change of text, together with appropriate supporting

20、 comments. Comments on standards and requests for interpretations should be addressed to: Secretary, IEEE-SA Standards Board 445 Hoes Lane Piscataway, NJ 08854 USA Authorization to photocopy portions of any individual standard for internal or personal use is granted by the Institute of Electrical an

21、d Electronics Engineers, Inc., provided that the appropriate fee is paid to Copyright Clearance Center. To arrange for payment of licensing fee, please contact Copyright Clearance Center, Customer Service, 222 Rosewood Drive, Danvers, MA 01923 USA; +1 978 750 8400. Permission to photocopy portions o

22、f any individual standard for educational classroom use can also be obtained through the Copyright Clearance Center. iv Copyright 2008 IEEE. All rights reserved. Introduction This introduction is not part of IEEE Std 1619.1-2007, IEEE Standard for Authenticated Encryption with Length Expansion for S

23、torage Devices. The problem of data storage protection has become increasingly important due to legislation that requires the protection of sensitive information. To address this issue, the Security in Storage Working Group (SISWG) is developing standards for the protection of information on storage

24、 media. This standard provides strong data protection by specifying encryption with authentication and length expansion. This standard provides methods suitable for ensuring the privacy and integrity of stored data within applications requiring a high level of assurance. To this end, this standard s

25、pecifies the Advanced Encryption Standard (AES) cipher as used in authenticated-encryption modes. There are many modes of non-cryptographic attacks that are outside the scope of this standard. See B.1 for a discussion. Notice to users Laws and regulations Users of these documents should consult all

26、applicable laws and regulations. Compliance with the provisions of this standard does not imply compliance to any applicable regulatory requirements. Implementers of the standard are responsible for observing or referring to the applicable regulatory requirements. IEEE does not, by the publication o

27、f its standards, intend to urge action that is not in compliance with applicable laws, and these documents may not be construed as doing so. Copyrights This document is copyrighted by the IEEE. It is made available for a wide variety of both public and private uses. These include both use, by refere

28、nce, in laws and regulations, and use in private self-regulation, standardization, and the promotion of engineering practices and methods. By making this document available for use and adoption by public authorities and private users, the IEEE does not waive any rights in copyright to this document.

29、 Updating of IEEE documents Users of IEEE standards should be aware that these documents may be superseded at any time by the issuance of new editions or may be amended from time to time through the issuance of amendments, corrigenda, or errata. An official IEEE document at any point in time consist

30、s of the current edition of the document together with any amendments, corrigenda, or errata then in effect. In order to determine whether a given document is the current edition and whether it has been amended through the issuance of amendments, corrigenda, or errata, visit the IEEE Standards Assoc

31、iation website at http:/ieeexplore.ieee.org/xpl/standards.jsp, or contact the IEEE at the address listed previously. For more information about the IEEE Standards Association or the IEEE standards development process, visit the IEEE-SA website at http:/standards.ieee.org. v Copyright 2008 IEEE. All

32、rights reserved. Errata Errata, if any, for this and all other standards can be accessed at the following URL: http:/standards.ieee.org/reading/ieee/updates/errata/index.html. Users are encouraged to check this URL for errata periodically. Interpretations Current interpretations can be accessed at t

33、he following URL: http:/standards.ieee.org/reading/ieee/interp/ index.html. Patents Attention is called to the possibility that implementation of this guide may require use of subject matter covered by patent rights. By publication of this guide, no position is taken with respect to the existence or

34、 validity of any patent rights in connection therewith. The IEEE is not responsible for identifying Essential Patent Claims for which a license may be required, for conducting inquiries into the legal validity or scope of Patents Claims or determining whether any licensing terms or conditions provid

35、ed in connection with submission of a Letter of Assurance, if any, or in any licensing agreements are reasonable or non-discriminatory. Users of this guide are expressly advised that determination of the validity of any patent rights, and the risk of infringement of such rights, is entirely their ow

36、n responsibility. Further information may be obtained from the IEEE Standards Association. Participants When work on this standard began, the Security in Storage Working Group had the following officers: James P. Hughes, Chair Serge Plotkin, Vice-chair Fabio Maino, Secretary At the time this standar

37、d was submitted to the IEEE-SA Standards Board for approval, the Security in Storage Working Group operated under the following sponsorship: John L. Cole, Sponsor Curtis Anderson, Co-Sponsor At the time this standard was submitted to the IEEE-SA Standards Board for approval, the Security in Storage

38、Working Group had the following officers: Matthew V. Ball, Chair Eric A. Hibbard, Vice-chair Fabio Maino, Secretary At the time this standard was submitted to the IEEE-SA Standards Board for approval, the P1619.1 Task Group had the following membership: Matthew V. Ball, Chair, Technical Editorvi Cop

39、yright 2008 IEEE. All rights reserved. Gideon Avida Matthew V. Ball Mark Benedikt Jon Buckingham William G. Colvin Russel S. Dietz Robert Drennan Hal Finney John Geldman Robert W. Griffin Shai Halevi (past technical editor) Laszlo Hars Eric A. Hibbard Larry D. Hofer Jon Holdman Walter A. Hubis James

40、 P. Hughes (past technical editor) Glen Jaquette (past technical editor) Curt Kolovson Robert A. Lockhart Fabio R. Maino Charlie Martin Dalit Naor Landon Curt Noll Jim Norton Scott Painter David Peterson Serge Plotkin David B. Sheehy Robert N. Snively Alexander (Sandy) Stewart Greg Unruh Douglas L.

41、Whiting Christopher L. Williams Mike WitkowskiSpecial thanks to Brian Gladman, David McGrew, Michael Torla, and Danh Tran The following members of the balloting committee voted on this standard. Balloters may have voted for approval, disapproval, or abstention. Danilo Antonelli Matthew V. Ball Rahul

42、 B. Bhushan Juan C. Carreon Lidong Chen Keith Chow Roger Cummings Geoffrey Darnton Russell S. Dietz Thomas J. Dineen Robert C. Elliott Michael D. Geipel John Geldman Brian Goodman Robert W. Griffin Randall Groves Eric A. Hibbard Werner Hoelzl Larry D. Hofer Walter A. Hubis Raj Jain Robert A. Lockhar

43、t William Lumpkins Fabio R. Maino Edward McCall Michael Newman Landon Curt Noll Mark Overby Serge Plotkin Ulrich Pohl Venkatesha Prasad Michael D. Rush David B. Sheehy Avraham Shimor Robert N. Snively Thomas Starai Walter Struppler Joseph Tardo Wen Tong Thomas Tullia Christopher L. Williams Oren Yue

44、n When the IEEE-SA Standards Board approved this standard on 5 December 2007, it had the following membership: Steve M. Mills, Chair Robert M. Grow, Vice Chair Don Wright, Past Chair Judith Gorman, Secretary Richard DeBlasio Alex Gelman William R. Goldbach Arnold M. Greenspan Joanna N. Guenin Julian

45、 Forster* Kenneth S. Hanus William B. Hopf Richard H. Hulett Hermann Koch Joseph L. Koepfinger* John Kulick David J. Law Glenn Parsons Ronald C. Petersen Tom A. Prevost Narayanan Ramachandran Greg Ratta Robby Robson Anne-Marie Sahazizian Virginia C. Sulzberger Malcolm V. Thaden Richard L. Townsend H

46、oward L. Wolfman *Member Emeritus Also included are the following nonvoting IEEE-SA Standards Board liaisons: Satish K. Aggarwal, NRC Representative Alan H. Cookson, NIST Representative vii Copyright 2008 IEEE. All rights reserved. Lorraine Patsco IEEE Standards Program Manager, Document Development

47、 Michael Kipness IEEE Standards Program Manager, Technical Program Development viii Copyright 2008 IEEE. All rights reserved. CONTENTS 1. Overview 1 1.1 Scope . 1 1.2 Purpose 1 1.3 Description of clauses and annexes . 1 2. Normative references 2 3. Keywords, definitions, acronyms, and abbreviations

48、. 2 3.1 Keywords. 2 3.2 Definitions . 3 3.3 Acronyms and abbreviations . 6 3.4 Mathematical conventions. 6 4. General concepts 6 4.1 Introduction . 6 4.2 Components. 8 4.3 Plaintext record formatter 10 4.4 Plaintext record de-formatter. 10 4.5 Encryption routine . 11 4.6 Decryption routine. 11 4.7 C

49、ryptographic parameters 13 5. Cryptographic modes 13 5.1 Overview . 13 5.2 Counter with cipher block chaining-message authentication code (CCM) 14 5.3 Galois/Counter Mode (GCM) 15 5.4 Cipher block chaining with keyed-hash message authentication code (CBC-HMAC) . 15 5.5 Xor-encrypt-xor with tweakable block-cipher with keyed-hash message authentication code (XTS-HMAC) 17 6. Cryptographic key management and initialization vector requirements. 19 6.1 Random bit generator 19 6.2 Cryptographic key entry and export 20 6.3 Handling the cipher key. 20 6.4 Cryp

展开阅读全文
相关资源
  • ANSI Z97 1-2009 American National Standard for Safety Glazing Materials used in Buildings - Safety Performance Specifications and Methods of Test《建筑物中窗用玻璃材料安全性用.pdfANSI Z97 1-2009 American National Standard for Safety Glazing Materials used in Buildings - Safety Performance Specifications and Methods of Test《建筑物中窗用玻璃材料安全性用.pdf
  • ANSI Z97 1 ERTA-2010 Re ANSI Z97 1 - 2009 Errata《修订版 美国国家标准学会Z97 1-2009标准的勘误表》.pdfANSI Z97 1 ERTA-2010 Re ANSI Z97 1 - 2009 Errata《修订版 美国国家标准学会Z97 1-2009标准的勘误表》.pdf
  • ANSI Z21 40 2a-1997 Gas-Fired Work Activated Air-Conditioning and Heat Pump Appliances (Same as CGA 2 92a)《燃气、工作激活空气调节和热泵器具(同 CGA 2 92a)》.pdfANSI Z21 40 2a-1997 Gas-Fired Work Activated Air-Conditioning and Heat Pump Appliances (Same as CGA 2 92a)《燃气、工作激活空气调节和热泵器具(同 CGA 2 92a)》.pdf
  • ANSI Z124 9-2004 American National Standard for Plastic Urinal Fixtures《塑料小便器用美国国家标准》.pdfANSI Z124 9-2004 American National Standard for Plastic Urinal Fixtures《塑料小便器用美国国家标准》.pdf
  • ANSI Z124 4-2006 American National Standard for Plastic Water Closet Bowls and Tanks《塑料抽水马桶和水箱用美国国家标准》.pdfANSI Z124 4-2006 American National Standard for Plastic Water Closet Bowls and Tanks《塑料抽水马桶和水箱用美国国家标准》.pdf
  • ANSI Z124 3-2005 American National Standard for Plastic Lavatories《塑料洗脸盆用美国国家标准》.pdfANSI Z124 3-2005 American National Standard for Plastic Lavatories《塑料洗脸盆用美国国家标准》.pdf
  • ANSI T1 659-1996 Telecommunications - Mobility Management Application Protocol (MMAP) RCF-RACF Operations《电信 可移动管理应用协议(MMAP) RCF-RACF操作》.pdfANSI T1 659-1996 Telecommunications - Mobility Management Application Protocol (MMAP) RCF-RACF Operations《电信 可移动管理应用协议(MMAP) RCF-RACF操作》.pdf
  • ANSI T1 651-1996 Telecommunications – Mobility Management Application Protocol (MMAP)《电信 可移动性管理应用协议》.pdfANSI T1 651-1996 Telecommunications – Mobility Management Application Protocol (MMAP)《电信 可移动性管理应用协议》.pdf
  • ANSI T1 609-1999 Interworking between the ISDN User-Network Interface Protocol and the Signalling System Number 7 ISDN User Part《电信 ISDN用户间网络接口协议和7号信令系统ISDN用户部分.pdfANSI T1 609-1999 Interworking between the ISDN User-Network Interface Protocol and the Signalling System Number 7 ISDN User Part《电信 ISDN用户间网络接口协议和7号信令系统ISDN用户部分.pdf
  • ANSI T1 605-1991 Integrated Services Digital Network (ISDN) - Basic Access Interface for S and T Reference Points (Layer 1 Specification)《综合服务数字网络(ISDN) S和T基准点的.pdfANSI T1 605-1991 Integrated Services Digital Network (ISDN) - Basic Access Interface for S and T Reference Points (Layer 1 Specification)《综合服务数字网络(ISDN) S和T基准点的.pdf
  • 猜你喜欢
    相关搜索

    当前位置:首页 > 标准规范 > 国际标准 > ANSI

    copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
    备案/许可证编号:苏ICP备17064731号-1